From 56317f0e9d1a6601e98523cb24b7dcede470eec8 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 16 Jun 2025 14:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-06-16T14:00:19.614154+00:00 --- CVE-2023/CVE-2023-452xx/CVE-2023-45256.json | 4 +- CVE-2024/CVE-2024-255xx/CVE-2024-25573.json | 8 +- CVE-2024/CVE-2024-388xx/CVE-2024-38822.json | 4 +- CVE-2024/CVE-2024-388xx/CVE-2024-38823.json | 4 +- CVE-2024/CVE-2024-388xx/CVE-2024-38824.json | 4 +- CVE-2024/CVE-2024-388xx/CVE-2024-38825.json | 4 +- CVE-2024/CVE-2024-449xx/CVE-2024-44905.json | 4 +- CVE-2024/CVE-2024-449xx/CVE-2024-44906.json | 4 +- CVE-2024/CVE-2024-555xx/CVE-2024-55567.json | 4 +- CVE-2024/CVE-2024-75xx/CVE-2024-7562.json | 4 +- CVE-2025/CVE-2025-14xx/CVE-2025-1411.json | 8 +- CVE-2025/CVE-2025-20xx/CVE-2025-2091.json | 8 +- CVE-2025/CVE-2025-210xx/CVE-2025-21085.json | 8 +- CVE-2025/CVE-2025-222xx/CVE-2025-22236.json | 4 +- CVE-2025/CVE-2025-222xx/CVE-2025-22237.json | 4 +- CVE-2025/CVE-2025-222xx/CVE-2025-22238.json | 4 +- CVE-2025/CVE-2025-222xx/CVE-2025-22239.json | 4 +- CVE-2025/CVE-2025-222xx/CVE-2025-22240.json | 4 +- CVE-2025/CVE-2025-222xx/CVE-2025-22241.json | 4 +- CVE-2025/CVE-2025-222xx/CVE-2025-22242.json | 4 +- CVE-2025/CVE-2025-228xx/CVE-2025-22854.json | 8 +- CVE-2025/CVE-2025-243xx/CVE-2025-24311.json | 8 +- CVE-2025/CVE-2025-243xx/CVE-2025-24388.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24919.json | 8 +- CVE-2025/CVE-2025-249xx/CVE-2025-24922.json | 8 +- CVE-2025/CVE-2025-250xx/CVE-2025-25050.json | 8 +- CVE-2025/CVE-2025-252xx/CVE-2025-25215.json | 8 +- CVE-2025/CVE-2025-252xx/CVE-2025-25264.json | 8 +- CVE-2025/CVE-2025-252xx/CVE-2025-25265.json | 8 +- CVE-2025/CVE-2025-276xx/CVE-2025-27689.json | 4 +- CVE-2025/CVE-2025-27xx/CVE-2025-2745.json | 4 +- CVE-2025/CVE-2025-283xx/CVE-2025-28380.json | 8 +- CVE-2025/CVE-2025-283xx/CVE-2025-28381.json | 8 +- CVE-2025/CVE-2025-283xx/CVE-2025-28382.json | 8 +- CVE-2025/CVE-2025-283xx/CVE-2025-28384.json | 8 +- CVE-2025/CVE-2025-283xx/CVE-2025-28386.json | 8 +- CVE-2025/CVE-2025-283xx/CVE-2025-28388.json | 8 +- CVE-2025/CVE-2025-283xx/CVE-2025-28389.json | 8 +- CVE-2025/CVE-2025-297xx/CVE-2025-29744.json | 4 +- CVE-2025/CVE-2025-299xx/CVE-2025-29902.json | 4 +- CVE-2025/CVE-2025-303xx/CVE-2025-30399.json | 4 +- CVE-2025/CVE-2025-32xx/CVE-2025-3234.json | 8 +- CVE-2025/CVE-2025-331xx/CVE-2025-33108.json | 8 +- CVE-2025/CVE-2025-34xx/CVE-2025-3464.json | 8 +- CVE-2025/CVE-2025-360xx/CVE-2025-36041.json | 8 +- CVE-2025/CVE-2025-365xx/CVE-2025-36506.json | 4 +- CVE-2025/CVE-2025-365xx/CVE-2025-36539.json | 4 +- CVE-2025/CVE-2025-365xx/CVE-2025-36573.json | 4 +- CVE-2025/CVE-2025-366xx/CVE-2025-36631.json | 8 +- CVE-2025/CVE-2025-366xx/CVE-2025-36633.json | 8 +- CVE-2025/CVE-2025-392xx/CVE-2025-39240.json | 4 +- CVE-2025/CVE-2025-407xx/CVE-2025-40726.json | 8 +- CVE-2025/CVE-2025-407xx/CVE-2025-40727.json | 8 +- CVE-2025/CVE-2025-407xx/CVE-2025-40728.json | 8 +- CVE-2025/CVE-2025-407xx/CVE-2025-40729.json | 8 +- CVE-2025/CVE-2025-409xx/CVE-2025-40916.json | 8 +- CVE-2025/CVE-2025-412xx/CVE-2025-41233.json | 4 +- CVE-2025/CVE-2025-412xx/CVE-2025-41234.json | 4 +- CVE-2025/CVE-2025-41xx/CVE-2025-4187.json | 8 +- CVE-2025/CVE-2025-42xx/CVE-2025-4200.json | 8 +- CVE-2025/CVE-2025-42xx/CVE-2025-4216.json | 8 +- CVE-2025/CVE-2025-42xx/CVE-2025-4227.json | 4 +- CVE-2025/CVE-2025-42xx/CVE-2025-4228.json | 4 +- CVE-2025/CVE-2025-42xx/CVE-2025-4229.json | 4 +- CVE-2025/CVE-2025-42xx/CVE-2025-4230.json | 4 +- CVE-2025/CVE-2025-42xx/CVE-2025-4231.json | 4 +- CVE-2025/CVE-2025-42xx/CVE-2025-4232.json | 4 +- CVE-2025/CVE-2025-42xx/CVE-2025-4233.json | 4 +- CVE-2025/CVE-2025-438xx/CVE-2025-43863.json | 4 +- CVE-2025/CVE-2025-438xx/CVE-2025-43866.json | 4 +- CVE-2025/CVE-2025-440xx/CVE-2025-44019.json | 4 +- CVE-2025/CVE-2025-440xx/CVE-2025-44091.json | 4 +- CVE-2025/CVE-2025-44xx/CVE-2025-4417.json | 4 +- CVE-2025/CVE-2025-44xx/CVE-2025-4418.json | 4 +- CVE-2025/CVE-2025-459xx/CVE-2025-45984.json | 4 +- CVE-2025/CVE-2025-459xx/CVE-2025-45985.json | 4 +- CVE-2025/CVE-2025-459xx/CVE-2025-45986.json | 4 +- CVE-2025/CVE-2025-459xx/CVE-2025-45987.json | 4 +- CVE-2025/CVE-2025-459xx/CVE-2025-45988.json | 4 +- CVE-2025/CVE-2025-45xx/CVE-2025-4584.json | 4 +- CVE-2025/CVE-2025-45xx/CVE-2025-4585.json | 4 +- CVE-2025/CVE-2025-45xx/CVE-2025-4586.json | 4 +- CVE-2025/CVE-2025-45xx/CVE-2025-4592.json | 8 +- CVE-2025/CVE-2025-460xx/CVE-2025-46035.json | 4 +- CVE-2025/CVE-2025-460xx/CVE-2025-46060.json | 8 +- CVE-2025/CVE-2025-460xx/CVE-2025-46096.json | 8 +- CVE-2025/CVE-2025-467xx/CVE-2025-46710.json | 33 ++ CVE-2025/CVE-2025-467xx/CVE-2025-46783.json | 4 +- CVE-2025/CVE-2025-46xx/CVE-2025-4667.json | 8 +- CVE-2025/CVE-2025-478xx/CVE-2025-47868.json | 8 +- CVE-2025/CVE-2025-478xx/CVE-2025-47869.json | 8 +- CVE-2025/CVE-2025-479xx/CVE-2025-47959.json | 4 +- CVE-2025/CVE-2025-47xx/CVE-2025-4748.json | 8 +- CVE-2025/CVE-2025-488xx/CVE-2025-48825.json | 4 +- CVE-2025/CVE-2025-489xx/CVE-2025-48914.json | 8 +- CVE-2025/CVE-2025-489xx/CVE-2025-48915.json | 8 +- CVE-2025/CVE-2025-489xx/CVE-2025-48916.json | 8 +- CVE-2025/CVE-2025-489xx/CVE-2025-48917.json | 8 +- CVE-2025/CVE-2025-489xx/CVE-2025-48918.json | 8 +- CVE-2025/CVE-2025-489xx/CVE-2025-48919.json | 8 +- CVE-2025/CVE-2025-489xx/CVE-2025-48920.json | 8 +- CVE-2025/CVE-2025-490xx/CVE-2025-49080.json | 4 +- CVE-2025/CVE-2025-490xx/CVE-2025-49081.json | 4 +- CVE-2025/CVE-2025-494xx/CVE-2025-49467.json | 4 +- CVE-2025/CVE-2025-494xx/CVE-2025-49468.json | 4 +- CVE-2025/CVE-2025-495xx/CVE-2025-49575.json | 4 +- CVE-2025/CVE-2025-495xx/CVE-2025-49576.json | 4 +- CVE-2025/CVE-2025-495xx/CVE-2025-49577.json | 4 +- CVE-2025/CVE-2025-495xx/CVE-2025-49578.json | 4 +- CVE-2025/CVE-2025-495xx/CVE-2025-49579.json | 4 +- CVE-2025/CVE-2025-495xx/CVE-2025-49580.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49581.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49582.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49583.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49584.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49585.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49586.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49587.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49589.json | 4 +- CVE-2025/CVE-2025-495xx/CVE-2025-49596.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49597.json | 8 +- CVE-2025/CVE-2025-495xx/CVE-2025-49598.json | 8 +- CVE-2025/CVE-2025-49xx/CVE-2025-4987.json | 4 +- CVE-2025/CVE-2025-51xx/CVE-2025-5123.json | 4 +- CVE-2025/CVE-2025-52xx/CVE-2025-5233.json | 4 +- CVE-2025/CVE-2025-52xx/CVE-2025-5238.json | 8 +- CVE-2025/CVE-2025-52xx/CVE-2025-5282.json | 4 +- CVE-2025/CVE-2025-52xx/CVE-2025-5288.json | 4 +- CVE-2025/CVE-2025-53xx/CVE-2025-5336.json | 8 +- CVE-2025/CVE-2025-53xx/CVE-2025-5337.json | 8 +- CVE-2025/CVE-2025-54xx/CVE-2025-5484.json | 4 +- CVE-2025/CVE-2025-54xx/CVE-2025-5485.json | 4 +- CVE-2025/CVE-2025-54xx/CVE-2025-5487.json | 8 +- CVE-2025/CVE-2025-54xx/CVE-2025-5491.json | 4 +- CVE-2025/CVE-2025-55xx/CVE-2025-5589.json | 8 +- CVE-2025/CVE-2025-56xx/CVE-2025-5689.json | 44 +++ CVE-2025/CVE-2025-58xx/CVE-2025-5815.json | 4 +- CVE-2025/CVE-2025-58xx/CVE-2025-5841.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5923.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5926.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5928.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5930.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5938.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5939.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5950.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5964.json | 8 +- CVE-2025/CVE-2025-59xx/CVE-2025-5982.json | 4 +- CVE-2025/CVE-2025-59xx/CVE-2025-5990.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6012.json | 4 +- CVE-2025/CVE-2025-60xx/CVE-2025-6029.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6030.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6031.json | 4 +- CVE-2025/CVE-2025-60xx/CVE-2025-6035.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6040.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6052.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6055.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6059.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6061.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6062.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6063.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6064.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6065.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6070.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6083.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6089.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6090.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6091.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6092.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6093.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6094.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6095.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6096.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6097.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6098.json | 8 +- CVE-2025/CVE-2025-60xx/CVE-2025-6099.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6100.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6101.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6102.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6103.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6104.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6105.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6106.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6107.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6108.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6109.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6110.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6111.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6112.json | 4 +- CVE-2025/CVE-2025-61xx/CVE-2025-6113.json | 4 +- CVE-2025/CVE-2025-61xx/CVE-2025-6114.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6115.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6116.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6117.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6118.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6119.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6120.json | 149 ++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6121.json | 156 ++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6122.json | 149 ++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6123.json | 145 +++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6169.json | 8 +- CVE-2025/CVE-2025-61xx/CVE-2025-6172.json | 8 +- README.md | 52 ++- _state.csv | 395 ++++++++++---------- 203 files changed, 1798 insertions(+), 597 deletions(-) create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24388.json create mode 100644 CVE-2025/CVE-2025-467xx/CVE-2025-46710.json create mode 100644 CVE-2025/CVE-2025-56xx/CVE-2025-5689.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6120.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6121.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6122.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6123.json diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45256.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45256.json index 8297195f11d..6e653def379 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45256.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45256.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45256", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T17:15:26.507", - "lastModified": "2025-06-12T17:15:26.507", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25573.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25573.json index da75534acb9..30b65e5b658 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25573.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25573.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25573", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2025-06-15T16:15:18.683", - "lastModified": "2025-06-15T16:15:18.683", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unsanitized user-supplied data saved in the PingFederate Administrative Console could trigger the execution of JavaScript code in subsequent user processing." + }, + { + "lang": "es", + "value": "Los datos no depurados proporcionados por el usuario y guardados en la consola administrativa de PingFederate podr\u00edan desencadenar la ejecuci\u00f3n de c\u00f3digo JavaScript en el procesamiento posterior del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38822.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38822.json index 11689c976f3..f34a1297c8a 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38822.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38822.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38822", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:19.300", - "lastModified": "2025-06-13T07:15:19.300", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38823.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38823.json index 7c624b0d7d5..98b5901be41 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38823.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38823.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38823", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:20.580", - "lastModified": "2025-06-13T14:15:18.823", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38824.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38824.json index 1c62500279e..1d82029b476 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38824.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38824.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38824", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T08:15:18.800", - "lastModified": "2025-06-13T08:15:18.800", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38825.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38825.json index e90b52274d9..5d66e5b8ccc 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38825.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38825.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38825", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:20.717", - "lastModified": "2025-06-13T14:15:18.983", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44905.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44905.json index 81377c68351..d9c0f04e17e 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44905.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44905.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44905", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T16:15:22.007", - "lastModified": "2025-06-12T16:15:22.007", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44906.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44906.json index 5bbc79e0942..4ba0730c83e 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44906.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44906.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44906", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T16:15:22.140", - "lastModified": "2025-06-12T16:15:22.140", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55567.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55567.json index 10520ebaf67..0701d322b9f 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55567.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55567", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T17:15:28.707", - "lastModified": "2025-06-12T17:15:28.707", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7562.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7562.json index ae43acdcb0a..ad5a788ca14 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7562.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7562", "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "published": "2025-06-12T16:15:22.320", - "lastModified": "2025-06-12T16:15:22.320", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1411.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1411.json index 82d181cb167..62fe7ad6af6 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1411.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1411.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1411", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-15T13:15:32.027", - "lastModified": "2025-06-15T13:15:32.027", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security Verify Directory Container 10.0.0.0 through 10.0.3.1 could allow a local user to execute commands as root due to execution with unnecessary privileges." + }, + { + "lang": "es", + "value": "IBM Security Verify Directory Container 10.0.0.0 a 10.0.3.1 podr\u00eda permitir que un usuario local ejecute comandos como root debido a la ejecuci\u00f3n con privilegios innecesarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2091.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2091.json index 21ae5eb42df..dbe50393a6e 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2091.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2091.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2091", "sourceIdentifier": "security@m-files.com", "published": "2025-06-16T09:15:19.067", - "lastModified": "2025-06-16T09:15:19.067", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An open redirection vulnerability in M-Files mobile applications for Android and iOS prior to version 25.6.0 allows attackers to use maliciously crafted PDF files to trick other users into making requests to untrusted URLs." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de redirecci\u00f3n abierta en las aplicaciones m\u00f3viles M-Files para Android e iOS anteriores a la versi\u00f3n 25.6.0 permite a los atacantes utilizar archivos PDF manipulados con fines maliciosos para enga\u00f1ar a otros usuarios para que realicen solicitudes a URL no confiables." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21085.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21085.json index fc59ee8250a..1f1cae34c63 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21085.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21085.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21085", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2025-06-15T15:15:18.330", - "lastModified": "2025-06-15T15:15:18.330", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PingFederate OAuth2 grant duplication in PostgreSQL persistent storage allows OAuth2 requests to use excessive memory utilization." + }, + { + "lang": "es", + "value": "La duplicaci\u00f3n de concesiones OAuth2 de PingFederate en el almacenamiento persistente de PostgreSQL permite que las solicitudes OAuth2 utilicen una memoria excesiva." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22236.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22236.json index 7b18e210e97..4b134f468f6 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22236.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22236.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22236", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:20.863", - "lastModified": "2025-06-13T14:15:19.323", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22237.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22237.json index 1e235658d1f..25c721e857e 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22237.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22237.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22237", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:21.010", - "lastModified": "2025-06-13T14:15:19.467", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22238.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22238.json index 1136959bbab..57b8a454401 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22238.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22238.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22238", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:21.150", - "lastModified": "2025-06-13T14:15:19.610", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22239.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22239.json index 6b596aa315d..b35e3887fce 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22239.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22239.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22239", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:21.290", - "lastModified": "2025-06-13T14:15:19.747", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22240.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22240.json index e7e11a7f996..e9d760e3982 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22240.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22240.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22240", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:21.430", - "lastModified": "2025-06-13T14:15:19.893", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22241.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22241.json index 7aa2be5c7c1..4e7b5a170a6 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22241.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22241.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22241", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:21.567", - "lastModified": "2025-06-13T07:15:21.567", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22242.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22242.json index 0e4c1839908..77724737a6e 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22242.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22242.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22242", "sourceIdentifier": "security@vmware.com", "published": "2025-06-13T07:15:21.710", - "lastModified": "2025-06-13T07:15:21.710", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22854.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22854.json index 0ab6b08e394..6cfefa1f99d 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22854.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22854.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22854", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2025-06-15T15:15:19.150", - "lastModified": "2025-06-15T15:15:19.150", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of non-200 http responses in\u00a0the PingFederate Google Adapter\u00a0leads to thread exhaustion under normal usage conditions." + }, + { + "lang": "es", + "value": "El control inadecuado de respuestas http distintas de 200 en el adaptador de Google PingFederate provoca el agotamiento del hilo en condiciones de uso normales." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24311.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24311.json index 39990978ee3..bf9a65b59f5 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24311.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24311.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24311", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-13T21:15:20.197", - "lastModified": "2025-06-13T21:15:20.197", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability exists in the cv_send_blockdata \nfunctionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault3 Plus prior to 6.2.26.36. A specially crafted \nControlVault API call can lead to an information leak. An attacker can \nissue an API call to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites en la funci\u00f3n cv_send_blockdata de Dell ControlVault3 (versi\u00f3n anterior a la 5.15.10.14) y Dell ControlVault3 Plus (versi\u00f3n anterior a la 6.2.26.36). Una llamada a la API de ControlVault especialmente manipulada puede provocar una fuga de informaci\u00f3n. Un atacante puede ejecutar una llamada a la API para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24388.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24388.json new file mode 100644 index 00000000000..226a38057b3 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24388.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24388", + "sourceIdentifier": "security@otrs.com", + "published": "2025-06-16T12:15:18.737", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the OTRS Admin Interface and Agent Interface (versions before OTRS 8) allow parameter injection due to for an autheniticated agent or admin user.\n\nThis issue affects: \n\n * OTRS 7.0.X\n\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS 2024.X\n * OTRS 2025.X\n\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@otrs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@otrs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-184" + } + ] + } + ], + "references": [ + { + "url": "https://otrs.com/release-notes/otrs-security-advisory-2025-06/", + "source": "security@otrs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24919.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24919.json index ec35925f176..bb838a65283 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24919.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24919.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24919", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-13T22:15:18.320", - "lastModified": "2025-06-13T22:15:18.320", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A deserialization of untrusted input vulnerability exists in the cvhDecapsulateCmd functionality of Dell ControlVault3 prior to 5.15.10.14 and ControlVault3 Plus prior to 6.2.26.36. A specially crafted ControlVault response to a command can lead to arbitrary code execution. An attacker can compromise a ControlVault firmware and have it craft a malicious response to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de deserializaci\u00f3n de entradas no confiables en la funci\u00f3n cvhDecapsulateCmd de Dell ControlVault3 en versiones anteriores a la 5.15.10.14 y ControlVault3 Plus en versiones anteriores a la 6.2.26.36. Una respuesta de ControlVault especialmente manipulada a un comando puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede comprometer el firmware de ControlVault y configurarlo para que genere una respuesta maliciosa que active esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24922.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24922.json index a0bab86bd9d..be7b524ed99 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24922.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24922.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24922", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-13T21:15:20.390", - "lastModified": "2025-06-13T21:15:20.390", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the \nsecurebio_identify functionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault3 Plus prior to\u00a06.2.26.36. A \nspecially crafted malicious cv_object can lead to a arbitrary code \nexecution. An attacker can issue an API call to trigger this \nvulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n securebio_identify de Dell ControlVault3 (versi\u00f3n anterior a la 5.15.10.14) y Dell ControlVault3 Plus (versi\u00f3n anterior a la 6.2.26.36). Un objeto cv_object malicioso especialmente manipulado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede ejecutar una llamada a la API para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25050.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25050.json index 4d6ec7386fb..1089d4c0df5 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25050.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25050.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25050", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-13T21:15:20.560", - "lastModified": "2025-06-13T21:15:20.560", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write vulnerability exists in the \ncv_upgrade_sensor_firmware functionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault 3 Plus prior to 6.2.26.36.\n A specially crafted ControlVault API call can lead to an out-of-bounds \nwrite. An attacker can issue an API call to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escritura fuera de los l\u00edmites en la funci\u00f3n cv_upgrade_sensor_firmware de Dell ControlVault3 (versi\u00f3n anterior a la 5.15.10.14) y Dell ControlVault 3 Plus (versi\u00f3n anterior a la 6.2.26.36). Una llamada a la API de ControlVault especialmente manipulada puede provocar una escritura fuera de los l\u00edmites. Un atacante puede ejecutar una llamada a la API para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25215.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25215.json index 0da74d70c9f..b0cda1a8616 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25215.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25215.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25215", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-13T22:15:19.337", - "lastModified": "2025-06-13T22:15:19.337", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary free vulnerability exists in the cv_close functionality of \nDell ControlVault3 prior to 5.15.10.14 and Dell ControlVault3 Plus prior to 6.2.26.36. A specially crafted ControlVault API call \ncan lead to an arbitrary free. An attacker can forge a fake session to \ntrigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de liberaci\u00f3n arbitraria en la funci\u00f3n cv_close de Dell ControlVault3 (versi\u00f3n anterior a la 5.15.10.14) y Dell ControlVault3 Plus (versi\u00f3n anterior a la 6.2.26.36). Una llamada a la API de ControlVault especialmente manipulada puede provocar una liberaci\u00f3n arbitraria. Un atacante puede falsificar una sesi\u00f3n para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25264.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25264.json index 01d49cff57c..f268307c128 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25264.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25264.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25264", "sourceIdentifier": "info@cert.vde.com", "published": "2025-06-16T10:15:19.517", - "lastModified": "2025-06-16T10:15:19.517", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote attacker can take advantage of the current overly permissive CORS policy to gain access and read the responses, potentially exposing sensitive data or enabling further attacks." + }, + { + "lang": "es", + "value": "Un atacante remoto no autenticado puede aprovechar la actual pol\u00edtica CORS excesivamente permisiva para obtener acceso y leer las respuestas, exponiendo potencialmente datos confidenciales o posibilitando m\u00e1s ataques." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25265.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25265.json index 57e37d2c7a8..67a2e184e6a 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25265.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25265.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25265", "sourceIdentifier": "info@cert.vde.com", "published": "2025-06-16T10:15:20.807", - "lastModified": "2025-06-16T10:15:20.807", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows an unauthenticated remote attacker to read files from the system\u2019s file structure." + }, + { + "lang": "es", + "value": "Se puede acceder a una aplicaci\u00f3n web para configurar el controlador en una ruta espec\u00edfica. Contiene un endpoint que permite a un atacante remoto no autenticado leer archivos de la estructura de archivos del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27689.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27689.json index c8cb026d1dc..92fbe6d5a6a 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27689.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27689.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27689", "sourceIdentifier": "security_alert@emc.com", "published": "2025-06-12T21:15:20.113", - "lastModified": "2025-06-12T21:15:20.113", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2745.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2745.json index 6257a3e11b7..f69f601bf44 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2745.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2745.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2745", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-12T20:15:21.040", - "lastModified": "2025-06-12T20:15:21.040", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28380.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28380.json index 75abe7c60fc..ef80552074d 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28380.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28380.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28380", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.030", - "lastModified": "2025-06-15T17:15:18.007", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in OpenC3 COSMOS v6.0.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site-scripting (XSS) en OpenC3 COSMOS v6.0.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro URL." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json index 85f0e8bfd66..a2f111adb0c 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28381.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28381", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.177", - "lastModified": "2025-06-13T16:15:25.227", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A credential leak in OpenC3 COSMOS v6.0.0 allows attackers to access service credentials as environment variables stored in all containers." + }, + { + "lang": "es", + "value": "Una fuga de credenciales en OpenC3 COSMOS v6.0.0 permite a los atacantes acceder a las credenciales de servicio como variables de entorno almacenadas en todos los contenedores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28382.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28382.json index ea9dce48f00..799d6b0764f 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28382.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28382.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28382", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.440", - "lastModified": "2025-06-13T18:15:20.677", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the openc3-api/tables endpoint of OpenC3 COSMOS 6.0.0 allows attackers to execute a directory traversal." + }, + { + "lang": "es", + "value": "Un problema en el endpoint openc3-api/tables de OpenC3 COSMOS 6.0.0 permite a los atacantes ejecutar un directory traversal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28384.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28384.json index 284fdaf81f0..8e9d6da3e8b 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28384.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28384.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28384", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.590", - "lastModified": "2025-06-13T18:15:21.510", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the /script-api/scripts/ endpoint of OpenC3 COSMOS 6.0.0 allows attackers to execute a directory traversal." + }, + { + "lang": "es", + "value": "Un problema en el endpoint /script-api/scripts/ de OpenC3 COSMOS 6.0.0 permite a los atacantes ejecutar un directory traversal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json index 9a26dcd7ffc..2664d0df3d7 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28386", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.713", - "lastModified": "2025-06-13T14:15:20.713", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote code execution (RCE) vulnerability in the Plugin Management component of OpenC3 COSMOS v6.0.0 allows attackers to execute arbitrary code via uploading a crafted .txt file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en el componente de administraci\u00f3n de complementos de OpenC3 COSMOS v6.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo .txt manipulado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json index 2831cd4de4d..32c56de6964 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28388.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28388", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.883", - "lastModified": "2025-06-13T16:15:25.387", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenC3 COSMOS v6.0.0 was discovered to contain hardcoded credentials for the Service Account." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que OpenC3 COSMOS v6.0.0 conten\u00eda credenciales codificadas para la cuenta de servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json index 34343b9f224..c5851430d81 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28389.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28389", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:21.010", - "lastModified": "2025-06-13T16:15:25.550", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Weak password requirements in OpenC3 COSMOS v6.0.0 allow attackers to bypass authentication via a brute force attack." + }, + { + "lang": "es", + "value": "Los requisitos de contrase\u00f1a d\u00e9biles en OpenC3 COSMOS v6.0.0 permiten a los atacantes eludir la autenticaci\u00f3n mediante un ataque de fuerza bruta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29744.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29744.json index 6e35bdc160b..487b068f131 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29744.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29744.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29744", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T16:15:22.727", - "lastModified": "2025-06-12T16:15:22.727", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29902.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29902.json index fc2ca80634c..52ff928ca4f 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29902.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29902.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29902", "sourceIdentifier": "psirt@bosch.com", "published": "2025-06-13T10:15:20.693", - "lastModified": "2025-06-13T10:15:20.693", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30399.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30399.json index 56119fa5f3f..fed3ee0bc14 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30399.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30399.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30399", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-13T02:15:23.430", - "lastModified": "2025-06-13T02:15:23.430", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3234.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3234.json index 1ab48ef8aa5..bd38b1f543e 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3234.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3234.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3234", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T06:15:18.117", - "lastModified": "2025-06-14T06:15:18.117", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.8.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Administrators have the ability to extend file manager usage privileges to lower-level users including subscribers, which would make this vulnerability more severe on such sites." + }, + { + "lang": "es", + "value": "El complemento File Manager Pro \u2013 Filester para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en todas las versiones hasta la 1.8.8 incluida. Esto permite que atacantes autenticados, con acceso de administrador o superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que podr\u00eda posibilitar la ejecuci\u00f3n remota de c\u00f3digo. Los administradores pueden extender los privilegios de uso del administrador de archivos a usuarios de nivel inferior, incluidos los suscriptores, lo que agravar\u00eda esta vulnerabilidad en dichos sitios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-331xx/CVE-2025-33108.json b/CVE-2025/CVE-2025-331xx/CVE-2025-33108.json index 15368a199c5..b43f247879f 100644 --- a/CVE-2025/CVE-2025-331xx/CVE-2025-33108.json +++ b/CVE-2025/CVE-2025-331xx/CVE-2025-33108.json @@ -2,13 +2,17 @@ "id": "CVE-2025-33108", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-14T01:15:19.800", - "lastModified": "2025-06-14T01:15:19.800", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to a library unqualified call made by a BRMS program. A malicious actor could cause user-controlled code to run with component access to the host operating system." + }, + { + "lang": "es", + "value": "IBM Backup, Recovery and Media Services para i 7.4 y 7.5 podr\u00edan permitir que un usuario con la capacidad de compilar o restaurar un programa obtuviera privilegios elevados debido a una llamada no cualificada a una librer\u00eda realizada por un programa BRMS. Un agente malicioso podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo controlado por el usuario con acceso a componentes del sistema operativo host." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3464.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3464.json index 38d3741d78c..e0e4edd4eb0 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3464.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3464.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3464", "sourceIdentifier": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1", "published": "2025-06-16T09:15:19.233", - "lastModified": "2025-06-16T09:15:19.233", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition vulnerability exists in Armoury Crate. This vulnerability arises from a Time-of-check Time-of-use issue, potentially leading to authentication bypass.\nRefer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n en Armoury Crate. Esta vulnerabilidad se debe a un problema de tiempo de uso y tiempo de comprobaci\u00f3n, que podr\u00eda provocar la omisi\u00f3n de la autenticaci\u00f3n. Consulta la secci\u00f3n \"Actualizaci\u00f3n de seguridad para la app Armoury Crate\" en el Aviso de seguridad de ASUS para obtener m\u00e1s informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-360xx/CVE-2025-36041.json b/CVE-2025/CVE-2025-360xx/CVE-2025-36041.json index ebe778e999f..fcf8934e331 100644 --- a/CVE-2025/CVE-2025-360xx/CVE-2025-36041.json +++ b/CVE-2025/CVE-2025-360xx/CVE-2025-36041.json @@ -2,13 +2,17 @@ "id": "CVE-2025-36041", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-15T13:15:33.177", - "lastModified": "2025-06-15T13:15:33.177", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 through 3.5.3, and MQ Operator SC2 3.2.0 through 3.2.12 Native HA CRR could be configured with a private key and chain other than the intended key which could disclose sensitive information or allow the attacker to perform unauthorized actions." + }, + { + "lang": "es", + "value": "IBM MQ Operator LTS 2.0.0 a 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 a 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1 a 3.5.3 y MQ Operator SC2 3.2.0 a 3.2.12 Native HA CRR podr\u00edan configurarse con una clave privada y una cadena distinta a la clave prevista, lo que podr\u00eda revelar informaci\u00f3n confidencial o permitir que el atacante realice acciones no autorizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36506.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36506.json index 8cfe6fde64b..31c5c8a18cb 100644 --- a/CVE-2025/CVE-2025-365xx/CVE-2025-36506.json +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36506.json @@ -2,8 +2,8 @@ "id": "CVE-2025-36506", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-06-13T09:15:19.223", - "lastModified": "2025-06-13T09:15:19.223", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36539.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36539.json index 641cf600c47..02602d9adf1 100644 --- a/CVE-2025/CVE-2025-365xx/CVE-2025-36539.json +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36539.json @@ -2,8 +2,8 @@ "id": "CVE-2025-36539", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-12T20:15:21.250", - "lastModified": "2025-06-12T20:15:21.250", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36573.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36573.json index 25ac8b18815..8c5932b1b39 100644 --- a/CVE-2025/CVE-2025-365xx/CVE-2025-36573.json +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36573.json @@ -2,8 +2,8 @@ "id": "CVE-2025-36573", "sourceIdentifier": "security_alert@emc.com", "published": "2025-06-12T16:15:23.003", - "lastModified": "2025-06-12T16:15:23.003", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-366xx/CVE-2025-36631.json b/CVE-2025/CVE-2025-366xx/CVE-2025-36631.json index 4c748175710..4bf5c3f14a0 100644 --- a/CVE-2025/CVE-2025-366xx/CVE-2025-36631.json +++ b/CVE-2025/CVE-2025-366xx/CVE-2025-36631.json @@ -2,13 +2,17 @@ "id": "CVE-2025-36631", "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-06-13T15:15:19.627", - "lastModified": "2025-06-13T15:15:19.627", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege." + }, + { + "lang": "es", + "value": "En versiones de Tenable Agent anteriores a 10.8.5 en un host Windows, se descubri\u00f3 que un usuario no administrativo pod\u00eda sobrescribir archivos arbitrarios del sistema local con contenido de registro con privilegio SYSTEM." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-366xx/CVE-2025-36633.json b/CVE-2025/CVE-2025-366xx/CVE-2025-36633.json index f69c33214da..51430b31776 100644 --- a/CVE-2025/CVE-2025-366xx/CVE-2025-36633.json +++ b/CVE-2025/CVE-2025-366xx/CVE-2025-36633.json @@ -2,13 +2,17 @@ "id": "CVE-2025-36633", "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-06-13T15:15:20.183", - "lastModified": "2025-06-13T15:15:20.183", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation." + }, + { + "lang": "es", + "value": "En versiones de Tenable Agent anteriores a 10.8.5 en un host Windows, se descubri\u00f3 que un usuario no administrativo pod\u00eda eliminar arbitrariamente archivos del sistema local con privilegios de SYSTEM, lo que potencialmente pod\u00eda provocar una escalada de privilegios locales." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-392xx/CVE-2025-39240.json b/CVE-2025/CVE-2025-392xx/CVE-2025-39240.json index 7a53f79963e..2330ef46533 100644 --- a/CVE-2025/CVE-2025-392xx/CVE-2025-39240.json +++ b/CVE-2025/CVE-2025-392xx/CVE-2025-39240.json @@ -2,8 +2,8 @@ "id": "CVE-2025-39240", "sourceIdentifier": "hsrc@hikvision.com", "published": "2025-06-13T08:15:19.377", - "lastModified": "2025-06-13T08:15:19.377", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40726.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40726.json index 8f69795b07b..b39abf6c1ea 100644 --- a/CVE-2025/CVE-2025-407xx/CVE-2025-40726.json +++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40726.json @@ -2,13 +2,17 @@ "id": "CVE-2025-40726", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-06-16T09:15:19.427", - "lastModified": "2025-06-16T09:15:19.427", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) vulnerability in /pages/search-results-page in Nosto, which allows remote attackers to execute arbitrary code via the q GET request parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejado en /pages/search-results-page en Nosto, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud GET q." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40727.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40727.json index a73d6e5a024..7ab5ee572eb 100644 --- a/CVE-2025/CVE-2025-407xx/CVE-2025-40727.json +++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40727.json @@ -2,13 +2,17 @@ "id": "CVE-2025-40727", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-06-16T09:15:19.587", - "lastModified": "2025-06-16T09:15:19.587", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in '/search'\u00a0in Phoenix Site CMS from Phoenix, which allows remote attackers to execute arbitrary code via 's'\u00a0GET parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Reflejado en '/search' en Phoenix Site CMS de Phoenix, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro GET 's'." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40728.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40728.json index c555e0a9000..aa3b242f1a6 100644 --- a/CVE-2025/CVE-2025-407xx/CVE-2025-40728.json +++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40728.json @@ -2,13 +2,17 @@ "id": "CVE-2025-40728", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-06-16T09:15:19.733", - "lastModified": "2025-06-16T09:15:19.733", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in Customer Support System v1.0. This vulnerability allows an authenticated attacker to retrieve, create, update and delete databases via the id parameter in the /customer_support/manage_user.php endpoint." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Customer Support System v1.0. Esta vulnerabilidad permite a un atacante autenticado recuperar, crear, actualizar y eliminar bases de datos mediante el par\u00e1metro id en el endpoint /customer_support/manage_user.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40729.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40729.json index 7c186c24528..84794550b93 100644 --- a/CVE-2025/CVE-2025-407xx/CVE-2025-40729.json +++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40729.json @@ -2,13 +2,17 @@ "id": "CVE-2025-40729", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-06-16T09:15:19.873", - "lastModified": "2025-06-16T09:15:19.873", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) in /customer_support/index.php in Customer Support System v1.0, which allows remote attackers to execute arbitrary code via the page parameter." + }, + { + "lang": "es", + "value": "Cross-Site Scripting (XSS) Reflejado en /customer_support/index.php en Customer Support System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de p\u00e1gina." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-409xx/CVE-2025-40916.json b/CVE-2025/CVE-2025-409xx/CVE-2025-40916.json index 4eb0332d2f8..de7d179b019 100644 --- a/CVE-2025/CVE-2025-409xx/CVE-2025-40916.json +++ b/CVE-2025/CVE-2025-409xx/CVE-2025-40916.json @@ -2,13 +2,17 @@ "id": "CVE-2025-40916", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-06-16T11:15:17.793", - "lastModified": "2025-06-16T11:15:17.793", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha.\n\nThat version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure." + }, + { + "lang": "es", + "value": "La versi\u00f3n 1.05 de Mojolicious::Plugin::CaptchaPNG para Perl utiliza una fuente de n\u00fameros aleatorios d\u00e9bil para generar el captcha. Esta versi\u00f3n utiliza la funci\u00f3n rand() integrada para generar el texto del captcha, as\u00ed como el ruido de la imagen, lo cual es inseguro." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-412xx/CVE-2025-41233.json b/CVE-2025/CVE-2025-412xx/CVE-2025-41233.json index 6423ca8e06b..6cf0736948b 100644 --- a/CVE-2025/CVE-2025-412xx/CVE-2025-41233.json +++ b/CVE-2025/CVE-2025-412xx/CVE-2025-41233.json @@ -2,8 +2,8 @@ "id": "CVE-2025-41233", "sourceIdentifier": "security@vmware.com", "published": "2025-06-12T22:15:20.560", - "lastModified": "2025-06-12T22:15:20.560", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-412xx/CVE-2025-41234.json b/CVE-2025/CVE-2025-412xx/CVE-2025-41234.json index f0ce3bb6b3e..da07d51e614 100644 --- a/CVE-2025/CVE-2025-412xx/CVE-2025-41234.json +++ b/CVE-2025/CVE-2025-412xx/CVE-2025-41234.json @@ -2,8 +2,8 @@ "id": "CVE-2025-41234", "sourceIdentifier": "security@vmware.com", "published": "2025-06-12T22:15:21.090", - "lastModified": "2025-06-12T22:15:21.090", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4187.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4187.json index 313cf9596ab..20cbce8e1e8 100644 --- a/CVE-2025/CVE-2025-41xx/CVE-2025-4187.json +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4187.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4187", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:22.050", - "lastModified": "2025-06-14T09:15:22.050", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UserPro - Community and User Profile WordPress Plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 5.1.10 via the userpro_fbconnect() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento UserPro - Community and User Profile WordPress Plugin para WordPress es vulnerable a la navegaci\u00f3n de directorios en todas las versiones hasta la 5.1.10 incluida, a trav\u00e9s de la funci\u00f3n userpro_fbconnect(). Esto permite a atacantes no autenticados leer el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4200.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4200.json index f348fb59772..88101755981 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4200.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4200.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4200", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:22.990", - "lastModified": "2025-06-14T09:15:22.990", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zagg - Electronics & Accessories WooCommerce WordPress Theme theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.1 via the load_view() function that is called via at least three AJAX actions: 'load_more_post', 'load_shop', and 'load_more_product. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El tema Zagg - Electronics & Accessories WooCommerce WordPress Theme para WordPress es vulnerable a la Inclusi\u00f3n Local de Archivos en todas las versiones hasta la 1.4.1 incluida, a trav\u00e9s de la funci\u00f3n load_view(), que se invoca mediante al menos tres acciones AJAX: 'load_more_post', 'load_shop' y 'load_more_product'. Esto permite a atacantes no autenticados incluir y ejecutar archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en dichos archivos. Esto puede utilizarse para eludir los controles de acceso, obtener datos confidenciales o ejecutar c\u00f3digo cuando se pueden subir e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4216.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4216.json index 2f592b5ffbe..5d98305b8d9 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4216.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4216.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4216", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:23.160", - "lastModified": "2025-06-14T09:15:23.160", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DIOT SCADA with MQTT plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'diot' shortcode in all versions up to, and including, 1.0.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento DIOT SCADA con MQTT para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del shortcode \"diot\" del complemento en todas las versiones hasta la 1.0.5.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4227.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4227.json index f2f7f09d9a5..0ca6791f45f 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4227.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4227.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4227", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-06-13T06:15:22.253", - "lastModified": "2025-06-13T06:15:22.253", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4228.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4228.json index 5efea8a46e9..430269524d7 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4228.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4228.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4228", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-06-13T00:15:23.233", - "lastModified": "2025-06-13T00:15:23.233", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4229.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4229.json index fb15ca313e6..a1bd46367e0 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4229.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4229.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4229", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-06-13T06:15:22.490", - "lastModified": "2025-06-13T06:15:22.490", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4230.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4230.json index d555232ddcf..5589cdcb6d8 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4230.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4230.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4230", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-06-13T00:15:23.380", - "lastModified": "2025-06-13T00:15:23.380", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4231.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4231.json index 9f3b7c77e02..7b5d6876d3b 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4231.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4231.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4231", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-06-13T00:15:23.533", - "lastModified": "2025-06-13T00:15:23.533", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4232.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4232.json index 7b254a0c0a5..5085c495ed5 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4232.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4232.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4232", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-06-13T00:15:23.697", - "lastModified": "2025-06-13T00:15:23.697", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4233.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4233.json index 309f8e0f816..a3ff0cc44c9 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4233.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4233.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4233", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-06-12T23:15:21.983", - "lastModified": "2025-06-12T23:15:21.983", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-438xx/CVE-2025-43863.json b/CVE-2025/CVE-2025-438xx/CVE-2025-43863.json index f842a1d54ba..d85d4e5fc88 100644 --- a/CVE-2025/CVE-2025-438xx/CVE-2025-43863.json +++ b/CVE-2025/CVE-2025-438xx/CVE-2025-43863.json @@ -2,8 +2,8 @@ "id": "CVE-2025-43863", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T18:15:20.533", - "lastModified": "2025-06-12T18:15:20.533", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-438xx/CVE-2025-43866.json b/CVE-2025/CVE-2025-438xx/CVE-2025-43866.json index bc1a8e24956..4507fa1ef40 100644 --- a/CVE-2025/CVE-2025-438xx/CVE-2025-43866.json +++ b/CVE-2025/CVE-2025-438xx/CVE-2025-43866.json @@ -2,8 +2,8 @@ "id": "CVE-2025-43866", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T18:15:20.713", - "lastModified": "2025-06-12T18:15:20.713", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-440xx/CVE-2025-44019.json b/CVE-2025/CVE-2025-440xx/CVE-2025-44019.json index 9c49c44e32f..f0acf128c5a 100644 --- a/CVE-2025/CVE-2025-440xx/CVE-2025-44019.json +++ b/CVE-2025/CVE-2025-440xx/CVE-2025-44019.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44019", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-12T20:15:21.420", - "lastModified": "2025-06-12T20:15:21.420", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json b/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json index 3d5ab61f027..735020dddb0 100644 --- a/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json +++ b/CVE-2025/CVE-2025-440xx/CVE-2025-44091.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44091", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T21:15:21.347", - "lastModified": "2025-06-13T16:15:25.863", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4417.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4417.json index bff826f9f3d..73287d8744a 100644 --- a/CVE-2025/CVE-2025-44xx/CVE-2025-4417.json +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4417.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4417", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-12T20:15:21.760", - "lastModified": "2025-06-12T20:15:21.760", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4418.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4418.json index 85e94a945cd..049ba3f158c 100644 --- a/CVE-2025/CVE-2025-44xx/CVE-2025-4418.json +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4418.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4418", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-12T20:15:21.943", - "lastModified": "2025-06-12T20:15:21.943", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45984.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45984.json index d56bcaec20b..a50e6efbcf0 100644 --- a/CVE-2025/CVE-2025-459xx/CVE-2025-45984.json +++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45984.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45984", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T12:15:33.217", - "lastModified": "2025-06-13T15:15:20.423", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45985.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45985.json index 51efb28b4bb..ee02979479a 100644 --- a/CVE-2025/CVE-2025-459xx/CVE-2025-45985.json +++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45985.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45985", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T12:15:34.053", - "lastModified": "2025-06-13T15:15:20.580", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45986.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45986.json index cce069a1c25..ba7088f988c 100644 --- a/CVE-2025/CVE-2025-459xx/CVE-2025-45986.json +++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45986.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45986", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T12:15:34.167", - "lastModified": "2025-06-13T15:15:20.747", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45987.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45987.json index ed8436ab3ed..876b756b483 100644 --- a/CVE-2025/CVE-2025-459xx/CVE-2025-45987.json +++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45987.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45987", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T12:15:34.280", - "lastModified": "2025-06-13T15:15:20.947", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45988.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45988.json index 97107ee7193..70a9f5e5764 100644 --- a/CVE-2025/CVE-2025-459xx/CVE-2025-45988.json +++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45988.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45988", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T12:15:34.403", - "lastModified": "2025-06-13T15:15:21.097", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4584.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4584.json index a7ae989f899..c3196ccdd4a 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4584.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4584.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4584", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:51.420", - "lastModified": "2025-06-13T03:15:51.420", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4585.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4585.json index 67be118af8c..5600ff83005 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4585.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4585.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4585", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:51.583", - "lastModified": "2025-06-13T03:15:51.583", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4586.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4586.json index a1430603398..a85c6269e2a 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4586.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4586.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4586", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:51.710", - "lastModified": "2025-06-13T03:15:51.710", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4592.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4592.json index 5e43c8cc7a2..068ef65b88f 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4592.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4592.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4592", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:23.333", - "lastModified": "2025-06-14T09:15:23.333", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AI Image Lab \u2013 Free AI Image Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation on the 'wpz-ai-images' page. This makes it possible for unauthenticated attackers to update the plugin's API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento AI Image Lab \u2013 Free AI Image Generator para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.0.6 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina 'wpz-ai-images'. Esto permite que atacantes no autenticados actualicen la clave API del complemento mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-460xx/CVE-2025-46035.json b/CVE-2025/CVE-2025-460xx/CVE-2025-46035.json index 4c690431b7d..e4fb78ec878 100644 --- a/CVE-2025/CVE-2025-460xx/CVE-2025-46035.json +++ b/CVE-2025/CVE-2025-460xx/CVE-2025-46035.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46035", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-12T16:15:23.167", - "lastModified": "2025-06-12T16:15:23.167", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json b/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json index 8a35bda526a..e369bb83c7c 100644 --- a/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json +++ b/CVE-2025/CVE-2025-460xx/CVE-2025-46060.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46060", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T13:15:21.187", - "lastModified": "2025-06-13T16:15:26.030", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in TOTOLINK N600R v4.3.0cu.7866_B2022506 allows a remote attacker to execute arbitrary code via the UPLOAD_FILENAME component" + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en TOTOLINK N600R v4.3.0cu.7866_B2022506 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del componente UPLOAD_FILENAME" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json b/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json index 4ff47fa5aa5..88c9bc6d3d7 100644 --- a/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json +++ b/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46096", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T13:15:21.710", - "lastModified": "2025-06-13T16:15:26.193", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in solon v.3.1.2 allows a remote attacker to conduct XSS attacks via the solon-faas-luffy component" + }, + { + "lang": "es", + "value": "La vulnerabilidad de Directory Traversal en solon v.3.1.2 permite que un atacante remoto realice ataques XSS a trav\u00e9s del componente solon-faas-luffy" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46710.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46710.json new file mode 100644 index 00000000000..3f6d7e1fe75 --- /dev/null +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46710.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-46710", + "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", + "published": "2025-06-16T12:15:19.453", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Possible kernel exceptions caused by reading and writing kernel heap data after free." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", + "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46783.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46783.json index 99dec21d24e..469175ff847 100644 --- a/CVE-2025/CVE-2025-467xx/CVE-2025-46783.json +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46783.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46783", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-06-13T09:15:19.620", - "lastModified": "2025-06-13T09:15:19.620", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4667.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4667.json index af3e70a36d7..acafea9281e 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4667.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4667.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4667", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T10:15:18.853", - "lastModified": "2025-06-14T10:15:18.853", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ssa_admin_upcoming_appointments, ssa_admin_upcoming_appointments, and ssa_past_appointments shortcodes in all versions up to, and including, 1.6.8.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s de los shortcodes ssa_admin_upcoming_appointments, ssa_admin_upcoming_appointments y ssa_past_appointments en todas las versiones hasta la 1.6.8.30 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47868.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47868.json index db0ff8f6d99..c8483d589a5 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47868.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47868.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47868", "sourceIdentifier": "security@apache.org", "published": "2025-06-16T11:15:18.437", - "lastModified": "2025-06-16T11:15:18.437", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Write resulting in possible Heap-based Buffer Overflow vulnerability was discovered in tools/bdf-converter font conversion utility that is part of Apache NuttX RTOS repository. This standalone program is optional and neither part of NuttX RTOS nor Applications runtime, but active bdf-converter users may be affected when this tool is exposed to external provided user data data (i.e. publicly available automation).\n\nThis issue affects Apache NuttX: from 6.9 before 12.9.0.\n\nUsers are recommended to upgrade to version 12.9.0, which fixes the issue." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar un desbordamiento de b\u00fafer basado en el mont\u00f3n en la utilidad de conversi\u00f3n de fuentes tools/bdf-converter, que forma parte del repositorio de Apache NuttX RTOS. Este programa independiente es opcional y no forma parte de NuttX RTOS ni del entorno de ejecuci\u00f3n de aplicaciones, pero los usuarios activos de bdf-converter pueden verse afectados cuando esta herramienta se expone a datos de usuario externos (es decir, automatizaci\u00f3n p\u00fablica). Este problema afecta a Apache NuttX desde la versi\u00f3n 6.9 hasta la 12.9.0. Se recomienda actualizar a la versi\u00f3n 12.9.0, que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47869.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47869.json index efa6a6ce93c..4858d2b716c 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47869.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47869.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47869", "sourceIdentifier": "security@apache.org", "published": "2025-06-16T11:15:18.590", - "lastModified": "2025-06-16T11:15:18.590", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability was discovered in Apache NuttX RTOS apps/exapmles/xmlrpc application. In this example application device stats structure that stored remotely provided parameters had hardcoded buffer size which could lead to buffer overflow. Structure members buffers were updated to valid size of CONFIG_XMLRPC_STRINGSIZE+1.\n\nThis issue affects Apache NuttX RTOS users that may have used or base their code on example application as presented in releases from 6.22 before 12.9.0.\n\nUsers of XMLRPC in Apache NuttX RTOS are advised to review their code \nfor this pattern and update buffer sizes as presented in the version of \nthe example in release 12.9.0." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de restricci\u00f3n incorrecta de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en la aplicaci\u00f3n Apache NuttX RTOS apps/exapmles/xmlrpc. En esta aplicaci\u00f3n de ejemplo, la estructura de estad\u00edsticas del dispositivo, que almacenaba par\u00e1metros proporcionados remotamente, ten\u00eda un tama\u00f1o de b\u00fafer codificado, lo que pod\u00eda provocar un desbordamiento del b\u00fafer. Los b\u00faferes de los miembros de la estructura se actualizaron a un tama\u00f1o v\u00e1lido de CONFIG_XMLRPC_STRINGSIZE+1. Este problema afecta a los usuarios de Apache NuttX RTOS que hayan usado o basado su c\u00f3digo en la aplicaci\u00f3n de ejemplo presentada en versiones anteriores a la 6.22 y anteriores a la 12.9.0. Se recomienda a los usuarios de XMLRPC en Apache NuttX RTOS que revisen su c\u00f3digo para detectar este patr\u00f3n y actualicen los tama\u00f1os de b\u00fafer seg\u00fan la versi\u00f3n del ejemplo en la versi\u00f3n 12.9.0." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47959.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47959.json index 9e32ed5b238..9e9e1590c24 100644 --- a/CVE-2025/CVE-2025-479xx/CVE-2025-47959.json +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47959.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47959", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-13T02:15:29.180", - "lastModified": "2025-06-13T02:15:29.180", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4748.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4748.json index b12baaacf6c..8e7158583f4 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4748.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4748.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4748", "sourceIdentifier": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db", "published": "2025-06-16T11:15:18.730", - "lastModified": "2025-06-16T11:15:18.730", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2\u00a0unless the memory option is passed.\n\nThis issue affects OTP from OTP 17.0 until OTP\u00a028.0.1, OTP\u00a027.3.4.1 and OTP\u00a026.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Erlang OTP (m\u00f3dulos stdlib) permite Absolute Path Traversal y la manipulaci\u00f3n de archivos. Esta vulnerabilidad est\u00e1 asociada a los archivos de programa lib/stdlib/src/zip.erl y a las rutinas zip:unzip/1, zip:unzip/2, zip:extract/1 y zip:extract/2, a menos que se utilice la opci\u00f3n de memoria. Este problema afecta a OTP desde OTP 17.0 hasta OTP 28.0.1, OTP 27.3.4.1 y OTP 26.2.5.13, correspondientes a stdlib desde 2.0 hasta 7.0.1, 6.2.2.1 y 5.2.3.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48825.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48825.json index e5059b1bb03..8c92c1f38d5 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48825.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48825.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48825", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-06-13T09:15:19.937", - "lastModified": "2025-06-13T09:15:19.937", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48914.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48914.json index d442ae91087..e09b416953a 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48914.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48914.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48914", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-06-13T16:15:26.457", - "lastModified": "2025-06-13T19:15:21.317", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.15." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal COOKiES Consent Management permite Cross-Site Scripting (XSS). Este problema afecta a COOKiES Consent Management: desde la versi\u00f3n 0.0.0 hasta la 1.2.15." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48915.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48915.json index 10e4d242bb8..c07e5b4a691 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48915.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48915.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48915", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-06-13T16:15:26.580", - "lastModified": "2025-06-13T19:15:21.470", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.15." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal COOKiES Consent Management permite Cross-Site Scripting (XSS). Este problema afecta a COOKiES Consent Management: desde la versi\u00f3n 0.0.0 hasta la 1.2.15." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48916.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48916.json index ec854991d8a..a675e12a328 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48916.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48916.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48916", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-06-13T16:15:26.790", - "lastModified": "2025-06-13T18:15:21.870", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Drupal Bookable Calendar allows Forceful Browsing.This issue affects Bookable Calendar: from 0.0.0 before 2.2.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Drupal Bookable Calendar permite la navegaci\u00f3n forzada. Este problema afecta a Bookable Calendar: desde la versi\u00f3n 0.0.0 hasta la 2.2.13." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48917.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48917.json index eabc97e03ea..f91adf348ce 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48917.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48917.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48917", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-06-13T16:15:26.930", - "lastModified": "2025-06-13T17:15:21.713", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal EU Cookie Compliance (GDPR Compliance) allows Cross-Site Scripting (XSS).This issue affects EU Cookie Compliance (GDPR Compliance): from 0.0.0 before 1.26.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal EU Cookie Compliance (GDPR Compliance) permite Cross-Site Scripting (XSS). Este problema afecta a EU Cookie Compliance (GDPR Compliance): desde la versi\u00f3n 0.0.0 hasta la 1.26.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48918.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48918.json index ef28ac903e6..d8bbbfdd9fe 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48918.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48918.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48918", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-06-13T16:15:27.053", - "lastModified": "2025-06-13T18:15:22.020", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Simple Klaro allows Cross-Site Scripting (XSS).This issue affects Simple Klaro: from 0.0.0 before 1.10.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Simple Klaro permite Cross-Site Scripting (XSS). Este problema afecta a Simple Klaro: desde la versi\u00f3n 0.0.0 hasta la 1.10.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48919.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48919.json index 6799927b66d..db05df1e5e9 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48919.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48919.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48919", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-06-13T16:15:27.177", - "lastModified": "2025-06-13T17:15:22.757", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Simple Klaro allows Cross-Site Scripting (XSS).This issue affects Simple Klaro: from 0.0.0 before 1.10.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Simple Klaro permite Cross-Site Scripting (XSS). Este problema afecta a Simple Klaro: desde la versi\u00f3n 0.0.0 hasta la 1.10.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48920.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48920.json index 05a2127c6df..df44c1e7aa2 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48920.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48920.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48920", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-06-13T16:15:27.293", - "lastModified": "2025-06-13T19:15:21.640", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal etracker allows Cross-Site Scripting (XSS).This issue affects etracker: from 0.0.0 before 3.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal etracker permite Cross-Site Scripting (XSS). Este problema afecta a etracker: desde la versi\u00f3n 0.0.0 hasta la 3.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json index a1c5b5b6f73..87dec52927c 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49080", "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2025-06-12T17:15:29.193", - "lastModified": "2025-06-12T17:15:29.193", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49081.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49081.json index 49d9426b2f6..20382436719 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49081.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49081.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49081", "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2025-06-12T18:15:20.853", - "lastModified": "2025-06-12T18:15:20.853", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49467.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49467.json index fc316bf2922..7bcb8f61837 100644 --- a/CVE-2025/CVE-2025-494xx/CVE-2025-49467.json +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49467.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49467", "sourceIdentifier": "security@joomla.org", "published": "2025-06-12T16:15:23.363", - "lastModified": "2025-06-12T16:15:23.363", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49468.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49468.json index 7d6b40690a2..53cbef5409d 100644 --- a/CVE-2025/CVE-2025-494xx/CVE-2025-49468.json +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49468.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49468", "sourceIdentifier": "security@joomla.org", "published": "2025-06-13T10:15:21.073", - "lastModified": "2025-06-13T10:15:21.073", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49575.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49575.json index 9e5c7be4a82..6f9e4baf3c8 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49575.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49575.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49575", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T19:15:20.160", - "lastModified": "2025-06-12T19:15:20.160", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49576.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49576.json index 94496fdb263..c3438a2f425 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49576.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49576.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49576", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T19:15:20.313", - "lastModified": "2025-06-12T19:15:20.313", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49577.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49577.json index 600624d1942..5126d5528f7 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49577.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49577.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49577", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T19:15:20.463", - "lastModified": "2025-06-12T19:15:20.463", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49578.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49578.json index 87c0c9d4a1a..2fb0c6f952b 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49578.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49578.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49578", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T19:15:20.610", - "lastModified": "2025-06-12T19:15:20.610", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49579.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49579.json index ab2cac7baa0..15eb931d0c4 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49579.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49579.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49579", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T19:15:20.750", - "lastModified": "2025-06-12T19:15:20.750", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49580.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49580.json index 1f875692334..2ae790b6632 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49580.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49580.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49580", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T16:15:27.417", - "lastModified": "2025-06-13T16:15:27.417", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is a generic wiki platform. From 8.2 and 7.4.5 until 17.1.0-rc-1, 16.10.4, and 16.4.7, pages can gain script or programming rights when they contain a link and the target of the link is renamed or moved. This might lead to execution of scripts contained in xobjects that should have never been executed. This vulnerability is fixed in 17.1.0-rc-1, 16.10.4, and 16.4.7." + }, + { + "lang": "es", + "value": "XWiki es una plataforma wiki gen\u00e9rica. Desde las versiones 8.2 y 7.4.5 hasta las versiones 17.1.0-rc-1, 16.10.4 y 16.4.7, las p\u00e1ginas pueden obtener permisos de script o programaci\u00f3n cuando contienen un enlace y el destino del enlace se renombra o se mueve. Esto podr\u00eda provocar la ejecuci\u00f3n de scripts contenidos en xobjects que nunca deber\u00edan haberse ejecutado. Esta vulnerabilidad est\u00e1 corregida en las versiones 17.1.0-rc-1, 16.10.4 y 16.4.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49581.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49581.json index 6d108df9053..78792413115 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49581.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49581.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49581", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T16:15:27.570", - "lastModified": "2025-06-13T16:15:27.570", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is a generic wiki platform. Any user with edit right on a page (could be the user's profile) can execute code (Groovy, Python, Velocity) with programming right by defining a wiki macro. This allows full access to the whole XWiki installation. The main problem is that if a wiki macro parameter allows wiki syntax, its default value is executed with the rights of the author of the document where it is used. This can be exploited by overriding a macro like the children macro that is used in a page that has programming right like the page XWiki.ChildrenMacro and thus allows arbitrary script macros. This vulnerability has been patched in XWiki 16.4.7, 16.10.3 and 17.0.0 by executing wiki parameters with the rights of the wiki macro's author when the parameter's value is the default value." + }, + { + "lang": "es", + "value": "XWiki es una plataforma wiki gen\u00e9rica. Cualquier usuario con permisos de edici\u00f3n en una p\u00e1gina (podr\u00eda ser su perfil) puede ejecutar c\u00f3digo (Groovy, Python, Velocity) con permisos de programaci\u00f3n mediante la definici\u00f3n de una macro wiki. Esto permite acceso completo a toda la instalaci\u00f3n de XWiki. El principal problema radica en que si un par\u00e1metro de una macro wiki permite la sintaxis wiki, su valor predeterminado se ejecuta con los permisos del autor del documento donde se utiliza. Esto se puede explotar sobrescribiendo una macro como la macro secundaria que se utiliza en una p\u00e1gina con permisos de programaci\u00f3n, como la p\u00e1gina XWiki.ChildrenMacro, lo que permite macros de script arbitrarias. Esta vulnerabilidad se ha corregido en XWiki 16.4.7, 16.10.3 y 17.0.0 mediante la ejecuci\u00f3n de par\u00e1metros wiki con los permisos del autor de la macro wiki cuando el valor del par\u00e1metro es el predeterminado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49582.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49582.json index 3e3331f43e6..18d6de6586d 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49582.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49582.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49582", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T17:15:23.180", - "lastModified": "2025-06-13T18:15:22.167", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is a generic wiki platform. When editing content that contains \"dangerous\" macros like malicious script macros that were authored by a user with fewer rights, XWiki warns about the execution of these macros since XWiki 15.9RC1. These required rights analyzers that trigger these warnings are incomplete, allowing an attacker to hide malicious content. For most macros, the existing analyzers don't consider non-lowercase parameters. Further, most macro parameters that can contain XWiki syntax like titles of information boxes weren't analyzed at all. Similarly, the \"source\" parameters of the content and context macro weren't anylzed even though they could contain arbitrary XWiki syntax. In the worst case, this could allow a malicious to add malicious script macros including Groovy or Python macros to a page that are then executed after another user with programming righs edits the page, thus allowing remote code execution. The required rights analyzers have been made more robust and extended to cover those cases in XWiki 16.4.7, 16.10.3 and 17.0.0." + }, + { + "lang": "es", + "value": "XWiki es una plataforma wiki gen\u00e9rica. Al editar contenido que contiene macros \"peligrosas\", como macros de script maliciosas creadas por un usuario con menos permisos, XWiki advierte sobre su ejecuci\u00f3n desde la versi\u00f3n 15.9RC1 de XWiki. Estos analizadores de permisos obligatorios que activan estas advertencias est\u00e1n incompletos, lo que permite a un atacante ocultar contenido malicioso. Para la mayor\u00eda de las macros, los analizadores existentes no consideran los par\u00e1metros que no est\u00e1n en min\u00fasculas. Adem\u00e1s, la mayor\u00eda de los par\u00e1metros de macro que pueden contener sintaxis de XWiki, como los t\u00edtulos de los cuadros de informaci\u00f3n, no se analizaron en absoluto. De igual manera, los par\u00e1metros \"fuente\" de la macro de contenido y contexto no se analizaron, a pesar de que podr\u00edan contener sintaxis arbitraria de XWiki. En el peor de los casos, esto podr\u00eda permitir que un usuario malicioso agregue macros de script maliciosas, como macros de Groovy o Python, a una p\u00e1gina, que se ejecutan despu\u00e9s de que otro usuario con conocimientos de programaci\u00f3n edite la p\u00e1gina, lo que permite la ejecuci\u00f3n remota de c\u00f3digo. Los analizadores de derechos necesarios se han hecho m\u00e1s robustos y ampliados para cubrir esos casos en XWiki 16.4.7, 16.10.3 y 17.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49583.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49583.json index bde384fb283..f5499000927 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49583.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49583.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49583", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T17:15:23.390", - "lastModified": "2025-06-13T18:15:22.320", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be used for notifications. No malicious code can be executed, though, as while these templates allow Velocity code, the existing generic analyzer already warns admins before editing Velocity code. The main impact would thus be to send spam, e.g., with phishing links to other users or to hide notifications about other attacks. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties." + }, + { + "lang": "es", + "value": "XWiki es una plataforma wiki gen\u00e9rica. Cuando un usuario sin permisos de script crea un documento con un objeto `XWiki.Notifications.Code.NotificationEmailRendererClass` y posteriormente un administrador lo edita y guarda, las plantillas de correo electr\u00f3nico de este objeto se usar\u00e1n para las notificaciones. Sin embargo, no se puede ejecutar c\u00f3digo malicioso, ya que, si bien estas plantillas permiten c\u00f3digo Velocity, el analizador gen\u00e9rico existente ya advierte a los administradores antes de editarlo. Por lo tanto, el principal impacto ser\u00eda el env\u00edo de spam, por ejemplo, con enlaces de phishing, a otros usuarios, o la ocultaci\u00f3n de notificaciones sobre otros ataques. Tenga en cuenta que las advertencias antes de editar documentos con propiedades peligrosas solo se introdujeron en XWiki 15.9; antes de esa versi\u00f3n, este era un problema conocido y la recomendaci\u00f3n era simplemente tener cuidado. Esto se ha corregido en XWiki 16.10.2, 16.4.7 y 15.10.16 a\u00f1adiendo un an\u00e1lisis para las propiedades XClass correspondientes." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49584.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49584.json index c359419e2e7..cae005cef75 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49584.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49584.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49584", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T18:15:22.437", - "lastModified": "2025-06-13T18:15:22.437", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is a generic wiki platform. In XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1, the title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully private wikis as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page." + }, + { + "lang": "es", + "value": "XWiki es una plataforma wiki gen\u00e9rica. En las versiones 10.9 a 16.4.6, 16.5.0-rc-1 a 16.10.2 y 17.0.0-rc-1 de la plataforma XWiki, se puede acceder al t\u00edtulo de cada p\u00e1gina cuya referencia se conoce a trav\u00e9s de la API REST siempre que se pueda acceder a una XClass con una propiedad de p\u00e1gina; este es el valor predeterminado para una instalaci\u00f3n de XWiki. Esto permite a un atacante obtener los t\u00edtulos de las p\u00e1ginas cuya referencia se conoce, un t\u00edtulo por solicitud. Esto no afecta a las wikis completamente privadas, ya que el endpoint REST verifica los derechos de acceso en la definici\u00f3n de la XClass. El impacto en la confidencialidad depende de la estrategia para los nombres de p\u00e1gina. Por defecto, los nombres de p\u00e1gina coinciden con el t\u00edtulo, por lo que el impacto deber\u00eda ser bajo; sin embargo, si los nombres de p\u00e1gina se ofuscan intencionalmente porque los t\u00edtulos son sensibles, el impacto podr\u00eda ser alto. Esto se ha solucionado en XWiki 16.4.7, 16.10.3 y 17.0.0 agregando comprobaciones de control de acceso antes de obtener el t\u00edtulo de cualquier p\u00e1gina." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49585.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49585.json index c98954f5cda..dec7ad662e0 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49585.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49585.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49585", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T18:15:22.580", - "lastModified": "2025-06-13T18:15:22.580", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is a generic wiki platform. In versions before 15.10.16, 16.0.0-rc-1 through 16.4.6, and 16.5.0-rc-1 through 16.10.1, when an attacker without script or programming right creates an XClass definition in XWiki (requires edit right), and that same document is later edited by a user with script, admin, or programming right, malicious code could be executed with the rights of the editing user without prior warning. In particular, this concerns custom display code, the script of computed properties and queries in database list properties. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties." + }, + { + "lang": "es", + "value": "XWiki es una plataforma wiki gen\u00e9rica. En versiones anteriores a la 15.10.16, de la 16.0.0-rc-1 a la 16.4.6 y de la 16.5.0-rc-1 a la 16.10.1, cuando un atacante sin permisos de script o programaci\u00f3n crea una definici\u00f3n de XClass en XWiki (requiere permisos de edici\u00f3n), y ese mismo documento es editado posteriormente por un usuario con permisos de script, administrador o programaci\u00f3n, se podr\u00eda ejecutar c\u00f3digo malicioso con los permisos del usuario editor sin previo aviso. Esto afecta en particular al c\u00f3digo de visualizaci\u00f3n personalizado, el script de propiedades calculadas y las consultas en las propiedades de la lista de bases de datos. Tenga en cuenta que las advertencias antes de editar documentos con propiedades peligrosas solo se introdujeron en XWiki 15.9; antes de esa versi\u00f3n, este era un problema conocido y la recomendaci\u00f3n era simplemente tener cuidado. Esto se ha corregido en XWiki 16.10.2, 16.4.7 y 15.10.16 a\u00f1adiendo un an\u00e1lisis de las respectivas propiedades de XClass." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49586.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49586.json index 2b84bcff921..9aa68e25add 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49586.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49586.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49586", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T18:15:22.737", - "lastModified": "2025-06-13T18:15:22.737", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is an open-source wiki software platform. Any XWiki user with edit right on at least one App Within Minutes application (the default for all users XWiki) can obtain programming right/perform remote code execution by editing the application. This vulnerability has been fixed in XWiki 17.0.0, 16.4.7, and 16.10.3." + }, + { + "lang": "es", + "value": "XWiki es una plataforma de software wiki de c\u00f3digo abierto. Cualquier usuario de XWiki con permisos de edici\u00f3n en al menos una aplicaci\u00f3n de App Within Minutes (el permiso predeterminado para todos los usuarios de XWiki) puede obtener permisos de programaci\u00f3n y ejecutar c\u00f3digo remoto editando la aplicaci\u00f3n. Esta vulnerabilidad se ha corregido en XWiki 17.0.0, 16.4.7 y 16.10.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49587.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49587.json index 13fc9fc3912..4b192845a64 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49587.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49587.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49587", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T18:15:22.880", - "lastModified": "2025-06-13T18:15:22.880", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki is an open-source wiki software platform. When a user without script right creates a document with an XWiki.Notifications.Code.NotificationDisplayerClass object, and later an admin edits and saves that document, the possibly malicious content of that object is output as raw HTML, allowing XSS attacks. While the notification displayer executes Velocity, the existing generic analyzer already warns admins before editing Velocity code. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This vulnerability has been patched in XWiki 15.10.16, 16.4.7, and 16.10.2 by adding a required rights analyzer that warns the admin before editing about the possibly malicious code." + }, + { + "lang": "es", + "value": "XWiki es una plataforma de software wiki de c\u00f3digo abierto. Cuando un usuario sin permisos de script crea un documento con un objeto XWiki.Notifications.Code.NotificationDisplayerClass y posteriormente un administrador lo edita y lo guarda, el contenido posiblemente malicioso de dicho objeto se muestra como HTML sin formato, lo que permite ataques XSS. Mientras el visualizador de notificaciones ejecuta Velocity, el analizador gen\u00e9rico existente ya advierte a los administradores antes de editar el c\u00f3digo de Velocity. Tenga en cuenta que las advertencias antes de editar documentos con propiedades peligrosas solo se introdujeron en XWiki 15.9; antes de esa versi\u00f3n, este era un problema conocido y la recomendaci\u00f3n era simplemente tener cuidado. Esta vulnerabilidad se ha corregido en XWiki 15.10.16, 16.4.7 y 16.10.2 a\u00f1adiendo un analizador de permisos requerido que advierte al administrador sobre el posible c\u00f3digo malicioso antes de editar." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49589.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49589.json index 5840c5f6f51..c076f767596 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49589.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49589.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49589", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-12T21:15:21.480", - "lastModified": "2025-06-12T21:15:21.480", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49596.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49596.json index 8795b9a5e33..eaa3bc13115 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49596.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49596.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49596", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T20:15:23.133", - "lastModified": "2025-06-13T20:15:23.133", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities." + }, + { + "lang": "es", + "value": "MCP Inspector es una herramienta para desarrolladores que permite probar y depurar servidores MCP. Las versiones de MCP Inspector anteriores a la 0.14.1 son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo debido a la falta de autenticaci\u00f3n entre el cliente Inspector y el proxy, lo que permite que solicitudes no autenticadas ejecuten comandos MCP a trav\u00e9s de stdio. Los usuarios deben actualizar inmediatamente a la versi\u00f3n 0.14.1 o posterior para solucionar estas vulnerabilidades." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49597.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49597.json index 743faf87285..c2b1316c66d 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49597.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49597.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49597", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T20:15:23.283", - "lastModified": "2025-06-13T20:15:23.283", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "handcraftedinthealps goodby-csv is a highly memory efficient, flexible and extendable open-source CSV import/export library. Prior to 1.4.3, goodby-csv could be used as part of a chain of methods that is exploitable when an insecure deserialization vulnerability exists in an application. This so-called \"gadget chain\" presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability. The problem is patched with Version 1.4.3." + }, + { + "lang": "es", + "value": "handcraftedinthealps goodby-csv es una librer\u00eda de importaci\u00f3n/exportaci\u00f3n de CSV de c\u00f3digo abierto, flexible, ampliable y con un alto consumo de memoria. Antes de la versi\u00f3n 1.4.3, goodby-csv pod\u00eda utilizarse como parte de una cadena de m\u00e9todos explotable cuando exist\u00eda una vulnerabilidad de deserializaci\u00f3n insegura en una aplicaci\u00f3n. Esta denominada \"cadena de gadgets\" no representa una amenaza directa, sino un vector que puede utilizarse para la ejecuci\u00f3n remota de c\u00f3digo si la aplicaci\u00f3n deserializa datos no confiables debido a otra vulnerabilidad. El problema se solucion\u00f3 en la versi\u00f3n 1.4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49598.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49598.json index 9977bc455ef..8bf398e9a6d 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49598.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49598.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49598", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-13T21:15:20.713", - "lastModified": "2025-06-13T21:15:20.713", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "conda-forge-ci-setup is a package installed by conda-forge each time a build is run on CI. The conda-forge-ci-setup-feedstock setup script is vulnerable due to the unsafe use of the eval function when parsing version information from a custom-formatted meta.yaml file. An attacker controlling meta.yaml can inject malicious code into the version assignment, which is executed during file processing, leading to arbitrary code execution. Exploitation requires an attacker to modify the recipe file by manipulating the RECIPE_DIR variable and introducing a malicious meta.yaml file. While this is more feasible in CI/CD pipelines, it is uncommon in typical environments, reducing overall risk. This vulnerability is fixed in 4.15.0." + }, + { + "lang": "es", + "value": "conda-forge-ci-setup es un paquete que conda-forge instala cada vez que se ejecuta una compilaci\u00f3n en CI. El script de configuraci\u00f3n conda-forge-ci-setup-feedstock es vulnerable debido al uso inseguro de la funci\u00f3n eval al analizar la informaci\u00f3n de versi\u00f3n de un archivo meta.yaml con formato personalizado. Un atacante que controle meta.yaml puede inyectar c\u00f3digo malicioso en la asignaci\u00f3n de versi\u00f3n, que se ejecuta durante el procesamiento del archivo, lo que provoca la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarlo, el atacante debe modificar el archivo de receta manipulando la variable RECIPE_DIR e introduciendo un archivo meta.yaml malicioso. Si bien esto es m\u00e1s factible en pipelines de CI/CD, es poco com\u00fan en entornos t\u00edpicos, lo que reduce el riesgo general. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 4.15.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4987.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4987.json index d942bd4355a..f14a53a4c53 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4987.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4987.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4987", "sourceIdentifier": "3DS.Information-Security@3ds.com", "published": "2025-06-16T08:15:18.787", - "lastModified": "2025-06-16T08:15:18.787", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5123.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5123.json index 17ef8827bb6..08702d3482c 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5123.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5123.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5123", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:51.853", - "lastModified": "2025-06-13T03:15:51.853", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5233.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5233.json index 709aade681b..6f702f8edcd 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5233.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5233.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5233", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:52.003", - "lastModified": "2025-06-13T03:15:52.003", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5238.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5238.json index cc5c9b62ca6..e7e9404063d 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5238.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5238.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5238", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T10:15:19.987", - "lastModified": "2025-06-14T10:15:19.987", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento YITH WooCommerce Wishlist para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 4.5.0 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5282.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5282.json index d367dca82c9..e0670dc9c8f 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5282.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5282.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5282", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T04:15:28.983", - "lastModified": "2025-06-13T04:15:28.983", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5288.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5288.json index b2d79b90132..35c6a1d2970 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5288.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5288.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5288", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:52.150", - "lastModified": "2025-06-13T03:15:52.150", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5336.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5336.json index d0e693a7f67..60832ddb3c4 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5336.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5336.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5336", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:23.527", - "lastModified": "2025-06-14T09:15:23.527", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Click to Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018data-no_number\u2019 parameter in all versions up to, and including, 4.22 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Click to Chat para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro 'data-no_number' en todas las versiones hasta la 4.22 incluida, debido a una depuraci\u00f3n de entrada insuficiente y un escape de salida deficiente. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5337.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5337.json index aad4f0405a5..c4b460bf888 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5337.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5337.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5337", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T10:15:20.153", - "lastModified": "2025-06-14T10:15:20.153", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Slider, Gallery, and Carousel by MetaSlider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018aria-label\u2019 parameter in all versions up to, and including, 3.98.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Slider, Gallery y Carousel de MetaSlider para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro 'aria-label' en todas las versiones hasta la 3.98.0 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5484.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5484.json index 39d69d36e00..d58ecd6cf4d 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5484.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5484.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5484", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-12T20:15:22.113", - "lastModified": "2025-06-12T20:15:22.113", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5485.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5485.json index 1c612e9448d..27866ba1ba7 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5485.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5485.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5485", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-12T20:15:22.283", - "lastModified": "2025-06-12T20:15:22.283", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5487.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5487.json index 1deec24c19c..2cd1efa4d06 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5487.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5487.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5487", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T07:15:17.870", - "lastModified": "2025-06-14T07:15:17.870", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AutomatorWP \u2013 Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the field_conditions parameter in all versions up to, and including, 5.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Administrators can configure the plugin to allow access to this functionality to authors and higher." + }, + { + "lang": "es", + "value": "El complemento AutomatorWP \u2013 Automator plugin for no-code automations, webhooks & custom integrations en WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro field_conditions en todas las versiones hasta la 5.2.3 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes autenticados, con acceso de administrador o superior, a\u00f1adir consultas SQL adicionales a consultas ya existentes que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos. Los administradores pueden configurar el complemento para permitir el acceso a esta funcionalidad a autores y niveles superiores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5491.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5491.json index 7da0fc33e1b..5e5ebd4990c 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5491.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5491.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5491", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-06-13T03:15:52.300", - "lastModified": "2025-06-13T03:15:52.300", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5589.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5589.json index 62e1033c356..93ef268a3b9 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5589.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5589.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5589", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:23.710", - "lastModified": "2025-06-14T09:15:23.710", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018status-classic-offline-text\u2019 parameter in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento StreamWeasels Kick Integration para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro 'status-classic-offline-text' en todas las versiones hasta la 1.1.3 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5689.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5689.json new file mode 100644 index 00000000000..59a6c60dcb3 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5689.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-5689", + "sourceIdentifier": "security@ubuntu.com", + "published": "2025-06-16T12:15:19.610", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ubuntu.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://github.com/ubuntu/authd/security/advisories/GHSA-g8qw-mgjx-rwjr", + "source": "security@ubuntu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5815.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5815.json index 7dd91383adc..7c02f5679f0 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5815.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5815.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5815", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T04:15:33.020", - "lastModified": "2025-06-13T04:15:33.020", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5841.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5841.json index 361a0258455..bb40e714ec6 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5841.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5841.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5841", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:52.457", - "lastModified": "2025-06-13T03:15:52.457", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5923.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5923.json index e2399cdf66f..51c7735a34b 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5923.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5923.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5923", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T07:15:22.663", - "lastModified": "2025-06-13T07:15:22.663", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5926.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5926.json index ef21c510b6e..6a7e0b3a8e9 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5926.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5926.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5926", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:52.607", - "lastModified": "2025-06-13T03:15:52.607", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5928.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5928.json index 1cdf7b0924b..8e175684c99 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5928.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5928.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5928", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:52.767", - "lastModified": "2025-06-13T03:15:52.767", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5930.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5930.json index ef59154f9ac..6fc3a37b87a 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5930.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5930.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5930", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:52.910", - "lastModified": "2025-06-13T03:15:52.910", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5938.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5938.json index 26fbf08dc8e..2b9ecc7b594 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5938.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5938.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5938", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:53.053", - "lastModified": "2025-06-13T03:15:53.053", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5939.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5939.json index 2fbf4bab251..2244be7414d 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5939.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5939.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5939", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:53.200", - "lastModified": "2025-06-13T03:15:53.200", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5950.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5950.json index 98ebac4b056..b01908a33da 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5950.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5950.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5950", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T03:15:53.350", - "lastModified": "2025-06-13T03:15:53.350", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5964.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5964.json index 8055f2de890..84456825d9e 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5964.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5964.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5964", "sourceIdentifier": "security@m-files.com", "published": "2025-06-15T20:15:31.037", - "lastModified": "2025-06-15T20:15:31.037", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal issue in the API endpoint in M-Files Server before version 25.6.14925.0 allows an authenticated user to read files in the server." + }, + { + "lang": "es", + "value": "Un problema de path traversal en el endpoint de API en M-Files Server anterior a la versi\u00f3n 25.6.14925.0 permite que un usuario autenticado lea archivos en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5982.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5982.json index 4414349faf6..c292a9fd47e 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5982.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5982.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5982", "sourceIdentifier": "cve@gitlab.com", "published": "2025-06-12T17:15:29.440", - "lastModified": "2025-06-12T17:15:29.440", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5990.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5990.json index cdd8a4297e2..140b8aafe70 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5990.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5990.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5990", "sourceIdentifier": "cve@gitlab.com", "published": "2025-06-15T18:15:18.267", - "lastModified": "2025-06-15T18:15:18.267", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An input neutralization vulnerability in the Server Name form and API Key form components of Crafty Controller allows a remote, authenticated attacker to perform stored XSS via malicious form input." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n de entrada en los componentes de formulario de nombre de servidor y de formulario de clave API de Crafty Controller permite que un atacante remoto y autenticado realice XSS almacenado a trav\u00e9s de una entrada de formulario maliciosa." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6012.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6012.json index 8e18f0a990e..dce0f8e37f1 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6012.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6012.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6012", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-13T08:15:19.507", - "lastModified": "2025-06-13T08:15:19.507", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6029.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6029.json index abc251a1e10..4accb0de0a7 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6029.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6029.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6029", "sourceIdentifier": "cve@asrg.io", "published": "2025-06-13T15:15:21.430", - "lastModified": "2025-06-13T15:15:21.430", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of fixed learning codes, one code to lock the car and the other code to unlock it, the\u00a0Key Fob Transmitter in KIA-branded Aftermarket Generic Smart Keyless Entry System, primarily distributed in Ecuador, which allows a replay attack.\n\nManufacture is unknown at the time of release.\u00a0 CVE Record will be updated once this is clarified." + }, + { + "lang": "es", + "value": "Uso de c\u00f3digos de aprendizaje fijos, uno para bloquear el veh\u00edculo y otro para desbloquearlo, en el transmisor de llavero del sistema de entrada sin llave inteligente gen\u00e9rico de posventa de KIA, distribuido principalmente en Ecuador, lo que permite un ataque de repetici\u00f3n. Se desconoce el fabricante al momento de su publicaci\u00f3n. El registro CVE se actualizar\u00e1 una vez que se aclare esta cuesti\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6030.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6030.json index b36b6e1b296..67f9fdb48c9 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6030.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6030.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6030", "sourceIdentifier": "cve@asrg.io", "published": "2025-06-13T15:15:21.600", - "lastModified": "2025-06-13T15:15:21.600", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of fixed learning codes, one code to lock the car and the other code to unlock it, in the\u00a0Key Fob Transmitter in Cyclone Matrix TRF\u00a0Smart Keyless Entry System, which allows a replay attack.\n\nResearch was completed on the 2024 KIA Soluto.\u00a0 Attack confirmed on other KIA Models in Ecuador." + }, + { + "lang": "es", + "value": "Uso de c\u00f3digos de aprendizaje fijos, uno para bloquear el veh\u00edculo y otro para desbloquearlo, en el transmisor de llavero del sistema de entrada sin llave inteligente Cyclone Matrix TRF, lo que permite un ataque repetido. Se realiz\u00f3 una investigaci\u00f3n en el KIA Soluto 2024. Se confirm\u00f3 el ataque en otros modelos de KIA en Ecuador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6031.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6031.json index 6c1d8cec685..6f64be7fcb4 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6031.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6031.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6031", "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2025-06-12T20:15:22.450", - "lastModified": "2025-06-12T20:15:22.450", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6035.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6035.json index f7f1d7229ec..d36647ebe59 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6035.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6035.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6035", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-13T16:15:28.067", - "lastModified": "2025-06-13T16:15:28.067", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in GIMP. An integer overflow vulnerability exists in the GIMP \"Despeckle\" plug-in. The issue occurs due to unchecked multiplication of image dimensions, such as width, height, and bytes-per-pixel (img_bpp), which can result in allocating insufficient memory and subsequently performing out-of-bounds writes. This issue could lead to heap corruption, a potential denial of service (DoS), or arbitrary code execution in certain scenarios." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en GIMP. Existe una vulnerabilidad de desbordamiento de enteros en el complemento \"Despeckle\" de GIMP. El problema se produce debido a la multiplicaci\u00f3n sin control de las dimensiones de la imagen, como el ancho, el alto y los bytes por p\u00edxel (img_bpp), lo que puede provocar una asignaci\u00f3n de memoria insuficiente y, posteriormente, escrituras fuera de los l\u00edmites. Este problema podr\u00eda provocar corrupci\u00f3n del mont\u00f3n, una posible denegaci\u00f3n de servicio (DoS) o la ejecuci\u00f3n de c\u00f3digo arbitrario en ciertos escenarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6040.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6040.json index ad1b8690293..0b68d85b61d 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6040.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6040.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6040", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:23.873", - "lastModified": "2025-06-14T09:15:23.873", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Flashcards plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1. This is due to missing or incorrect nonce validation on the 'ef_settings_submenu' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Easy Flashcards para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 0.1 incluida. Esto se debe a la falta o a una validaci\u00f3n de nonce incorrecta en la p\u00e1gina 'ef_settings_submenu'. Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n e inyecten scripts web maliciosos mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6052.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6052.json index 7328403058e..a2f03a29a72 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6052.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6052.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6052", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-13T16:15:28.230", - "lastModified": "2025-06-13T16:15:28.230", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en la gesti\u00f3n de memoria de GString de GLib al a\u00f1adir datos a cadenas. Si una cadena ya es muy grande, combinarla con m\u00e1s datos puede causar un desbordamiento oculto en el c\u00e1lculo del tama\u00f1o. Esto hace que el sistema piense que tiene suficiente memoria cuando no la tiene. Como resultado, los datos pueden escribirse m\u00e1s all\u00e1 del l\u00edmite de memoria asignada, lo que provoca fallos o corrupci\u00f3n de memoria." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6055.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6055.json index b6e8777226e..8f6ddf832eb 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6055.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6055.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6055", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:24.050", - "lastModified": "2025-06-14T09:15:24.050", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zen Sticky Social plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.3. This is due to missing or incorrect nonce validation on the 'zen-social-sticky/zen-sticky-social.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Zen Sticky Social para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 0.3 incluida. Esto se debe a la falta o a una validaci\u00f3n de nonce incorrecta en la p\u00e1gina 'zen-social-sticky/zen-sticky-social.php'. Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n e inyecten scripts web maliciosos mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6059.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6059.json index 59149d021ff..81b5c14b4f5 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6059.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6059.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6059", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T03:15:22.283", - "lastModified": "2025-06-14T03:15:22.283", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the 'OnAdminApi_CacheOpBegin' function. This makes it possible for unauthenticated attackers to perform several administrative actions, including deleting the cache, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Seraphinite Accelerator para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.27.21 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n 'OnAdminApi_CacheOpBegin'. Esto permite a atacantes no autenticados realizar diversas acciones administrativas, como borrar la cach\u00e9, mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6061.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6061.json index 07c6568ead7..cceedfe315a 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6061.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6061.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6061", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:24.307", - "lastModified": "2025-06-14T09:15:24.307", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The kk Youtube Video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'kkytv' shortcode in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento kk YouTube Video para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del shortcode 'kkytv' en todas las versiones hasta la 0.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6062.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6062.json index a32e8ee3c7a..df04cb41160 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6062.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6062.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6062", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:24.520", - "lastModified": "2025-06-14T09:15:24.520", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Yougler Blogger Profile Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, v1.01. This is due to missing or incorrect nonce validation on the 'yougler-plugin.php' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Yougler Blogger Profile Page para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la v1.01 incluida. Esto se debe a una validaci\u00f3n de nonce inexistente o incorrecta en la p\u00e1gina 'yougler-plugin.php'. Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n del complemento mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6063.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6063.json index 841e8186cf7..44554f67db9 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6063.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6063.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6063", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:24.693", - "lastModified": "2025-06-14T09:15:24.693", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XiSearch bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6. This is due to missing or incorrect nonce validation on the 'xisearch-key-config' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento XiSearch bar para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.6 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina 'xisearch-key-config'. Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n e inyecten scripts web maliciosos mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6064.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6064.json index 4efa295ad1e..2fecfdee1d8 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6064.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6064.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6064", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:24.853", - "lastModified": "2025-06-14T09:15:24.853", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP URL Shortener plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the 'url_shortener_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP URL Shortener para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.2 incluida. Esto se debe a la falta o a una validaci\u00f3n de nonce incorrecta en la p\u00e1gina 'url_shortener_settings'. Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n e inyecten scripts web maliciosos mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6065.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6065.json index 7b2af1537f9..4ea9ec1ad57 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6065.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6065.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6065", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:25.020", - "lastModified": "2025-06-14T09:15:25.020", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento Image Resizer On The Fly para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de acceso en la tarea \"eliminar\" en todas las versiones hasta la 1.1 incluida. Esto permite que atacantes no autenticados eliminen archivos arbitrarios en el servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo al eliminar el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6070.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6070.json index 3f47a7400d3..426fdfc270f 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6070.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6070.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6070", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-14T09:15:25.180", - "lastModified": "2025-06-14T09:15:25.180", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento Restrict File Access para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 1.1.2 incluida, a trav\u00e9s de la funci\u00f3n output(). Esto permite que atacantes autenticados, con acceso de suscriptor o superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6083.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6083.json index 8f99f2bb646..06c9210bdff 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6083.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6083.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6083", "sourceIdentifier": "1c053176-eef3-4d6a-ae0b-24728c86587b", "published": "2025-06-13T21:15:20.887", - "lastModified": "2025-06-13T22:15:19.500", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition caused queries to bypass the owner_id filter. This issue may allow users to search data across the entire table instead of being restricted to their specific owner_id." + }, + { + "lang": "es", + "value": "En ExtremeCloud Universal ZTNA, un error de sintaxis en la condici\u00f3n \"searchKeyword\" provoc\u00f3 que las consultas omitieran el filtro owner_id. Este problema puede permitir que los usuarios busquen datos en toda la tabla en lugar de limitarse a su owner_id espec\u00edfico." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6089.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6089.json index 2410825c4fe..2f4ab1cc987 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6089.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6089.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6089", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-15T13:15:33.353", - "lastModified": "2025-06-15T13:15:33.353", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Astun Technology iShare Maps 5.4.0 and classified as problematic. This vulnerability affects unknown code of the file atCheckJS.aspx. The manipulation of the argument ref leads to open redirect. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Astun Technology iShare Maps 5.4.0, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo atCheckJS.aspx. La manipulaci\u00f3n del argumento \"ref\" provoca una redirecci\u00f3n abierta. El ataque puede ejecutarse en remoto. El exploit se ha divulgado p\u00fablicamente y podr\u00eda utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6090.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6090.json index 81ba9d69b6e..804c2ebc9fd 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6090.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6090.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6090", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-15T15:15:19.303", - "lastModified": "2025-06-15T15:15:19.303", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in H3C GR-5400AX V100R009L50 and classified as critical. This issue affects the function UpdateWanparamsMulti/UpdateIpv6params of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor confirms the existence of this issue. Because they assess the risk as low, they do not have immediate plans for remediation." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en H3C GR-5400AX V100R009L50, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n UpdateWanparamsMulti/UpdateIpv6params del archivo /routing/goform/aspForm. La manipulaci\u00f3n del argumento param provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El proveedor confirma la existencia de este problema. Dado que eval\u00faa el riesgo como bajo, no tiene planes inmediatos de remediaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6091.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6091.json index 491517460d7..b91b6c7e2cb 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6091.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6091.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6091", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-15T17:15:18.360", - "lastModified": "2025-06-15T17:15:18.360", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in H3C GR-3000AX V100R007L50. It has been classified as critical. Affected is the function UpdateWanParamsMulti/UpdateIpv6Params of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor confirms the existence of this issue. Because they assess the risk as low, they do not have immediate plans for remediation." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en H3C GR-3000AX V100R007L50. Se ha clasificado como cr\u00edtica. La funci\u00f3n UpdateWanParamsMulti/UpdateIpv6Params del archivo /routing/goform/aspForm est\u00e1 afectada. La manipulaci\u00f3n del argumento param provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El proveedor confirma la existencia de este problema. Dado que eval\u00faa el riesgo como bajo, no tiene planes inmediatos de remediaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6092.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6092.json index 26b4c82edea..c108de47365 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6092.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6092.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6092", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-15T18:15:19.037", - "lastModified": "2025-06-15T18:15:19.037", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en comfyui de comfyanonymous hasta la versi\u00f3n 0.3.39. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /upload/image del componente Incomplete Fix CVE-2024-10099. La manipulaci\u00f3n del argumento \"image\" provoca cross-site-scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6093.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6093.json index 9021424f23c..ed0a64c4bfb 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6093.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6093.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6093", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-15T22:15:19.483", - "lastModified": "2025-06-15T22:15:19.483", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in uYanki board-stm32f103rc-berial up to 84daed541609cb7b46854cc6672a275d1007e295. This vulnerability affects the function heartrate1_i2c_hal_write of the file 7.Example/hal/i2c/max30100/Manual/demo2/2/heartrate1_hal.c. The manipulation of the argument num leads to stack-based buffer overflow. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en la placa uYanki-stm32f103rc-berial hasta la versi\u00f3n 84daed541609cb7b46854cc6672a275d1007e295. Esta vulnerabilidad afecta a la funci\u00f3n heartrate1_i2c_hal_write del archivo 7.Example/hal/i2c/max30100/Manual/demo2/2/heartrate1_hal.c. La manipulaci\u00f3n del argumento num provoca un desbordamiento del b\u00fafer en la pila. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6094.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6094.json index 14115b8f677..0538e9df4c6 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6094.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6094.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6094", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-15T23:15:18.470", - "lastModified": "2025-06-15T23:15:18.470", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in FoxCMS up to 1.2.5. This issue affects the function batchCope of the file app/admin/controller/Download.php. The manipulation of the argument ids leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en FoxCMS hasta la versi\u00f3n 1.2.5. Este problema afecta a la funci\u00f3n batchCope del archivo app/admin/controller/Download.php. La manipulaci\u00f3n de los identificadores de los argumentos provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6095.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6095.json index 06bba70b8d3..13d7f78c9ec 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6095.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6095.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6095", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-15T23:15:18.680", - "lastModified": "2025-06-15T23:15:18.680", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in codesiddhant Jasmin Ransomware 1.0.1. Affected is an unknown function of the file /checklogin.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en codesiddhant Jasmin Ransomware 1.0.1. La funci\u00f3n afectada es desconocida en el archivo /checklogin.php. La manipulaci\u00f3n del argumento nombre de usuario/contrase\u00f1a provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6096.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6096.json index 96442afd144..09540464778 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6096.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6096.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6096", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T00:15:18.560", - "lastModified": "2025-06-16T00:15:18.560", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in codesiddhant Jasmin Ransomware up to 1.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en codesiddhant Jasmin Ransomware hasta la versi\u00f3n 1.0.1, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /dashboard.php. La manipulaci\u00f3n del argumento \"Search\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6097.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6097.json index 57d055267ed..2a9565b1037 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6097.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6097.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6097", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T00:15:18.773", - "lastModified": "2025-06-16T00:15:18.773", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in UTT \u8fdb\u53d6 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en UTT ?? 750W hasta la versi\u00f3n 5.0, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n formDefineManagement del archivo /goform/setSysAdm del componente Administrator Password Handler. La manipulaci\u00f3n del argumento passwd1 provoca un cambio de contrase\u00f1a no verificado. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6098.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6098.json index fab581d0326..1107ff63502 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6098.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6098.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6098", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T01:15:18.140", - "lastModified": "2025-06-16T01:15:18.140", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in UTT \u8fdb\u53d6 750W up to 5.0. It has been classified as critical. This affects the function strcpy of the file /goform/setSysAdm of the component API. The manipulation of the argument passwd1 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en UTT ?? 750W hasta la versi\u00f3n 5.0. Se ha clasificado como cr\u00edtica. Afecta la funci\u00f3n strcpy del archivo /goform/setSysAdm de la API del componente. La manipulaci\u00f3n del argumento passwd1 provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6099.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6099.json index 4225e1d8e89..5d18c3e2258 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6099.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6099.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6099", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T01:15:18.350", - "lastModified": "2025-06-16T01:15:18.350", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in szluyu99 gin-vue-blog up to 61dd11ccd296e8642a318ada3ef7b3f7776d2410. It has been declared as critical. This vulnerability affects unknown code of the file gin-blog-server/internal/manager.go of the component PATCH Request Handler. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en gin-vue-blog szluyu99 hasta 61dd11ccd296e8642a318ada3ef7b3f7776d2410. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo gin-blog-server/internal/manager.go del componente PATCH Request Handler. La manipulaci\u00f3n provoca una autorizaci\u00f3n indebida. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza una versi\u00f3n continua para garantizar una distribuci\u00f3n continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6100.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6100.json index ea5cc639708..ee9caef1bd0 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6100.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6100.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6100", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T02:15:17.870", - "lastModified": "2025-06-16T02:15:17.870", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in realguoshuai open-video-cms 1.0. It has been rated as critical. This issue affects some unknown processing of the file /v1/video/list. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en realguoshuai open-video-cms 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /v1/video/list. La manipulaci\u00f3n del argumento sort provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6101.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6101.json index 724969ba654..f2f8426fe14 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6101.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6101.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6101", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T03:15:41.920", - "lastModified": "2025-06-16T03:15:41.920", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in letta-ai letta up to 0.4.1. Affected is the function function_message of the file letta/letta/interface.py. The manipulation of the argument function_name/function_args leads to improper neutralization of directives in dynamically evaluated code. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en letta-ai letta (hasta la versi\u00f3n 0.4.1). La funci\u00f3n function_message del archivo letta/letta/interface.py est\u00e1 afectada. La manipulaci\u00f3n del argumento function_name/function_args provoca la neutralizaci\u00f3n incorrecta de directivas en c\u00f3digo evaluado din\u00e1micamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6102.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6102.json index f926c382d3f..ec461397297 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6102.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6102.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6102", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T03:15:42.100", - "lastModified": "2025-06-16T03:15:42.100", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Wifi-soft UniBox Controller up to 20250506. Affected by this vulnerability is an unknown functionality of the file /authentication/logout.php. The manipulation of the argument mac_address leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en Wifi-soft UniBox Controller hasta la versi\u00f3n 20250506. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /authentication/logout.php. La manipulaci\u00f3n del argumento mac_address provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6103.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6103.json index 437cb8f6316..fa91bfd6a32 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6103.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6103.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6103", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T03:15:42.283", - "lastModified": "2025-06-16T03:15:42.283", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Wifi-soft UniBox Controller up to 20250506. Affected by this issue is some unknown functionality of the file /billing/test_accesscodelogin.php. The manipulation of the argument Password leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en Wifi-soft UniBox Controller hasta la versi\u00f3n 20250506. Este problema afecta a una funcionalidad desconocida del archivo /billing/test_accesscodelogin.php. La manipulaci\u00f3n del argumento \"Password\" provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6104.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6104.json index 775f3a4261c..83aacc3c563 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6104.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6104.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6104", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T04:15:19.227", - "lastModified": "2025-06-16T04:15:19.227", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Wifi-soft UniBox Controller up to 20250506. This affects an unknown part of the file /billing/pms_check.php. The manipulation of the argument ipaddress leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Wifi-soft UniBox Controller hasta la versi\u00f3n 20250506. Esta afecta a una parte desconocida del archivo /billing/pms_check.php. La manipulaci\u00f3n del argumento \"ipaddress\" provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6105.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6105.json index 5665c7b83f1..d34b45b6996 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6105.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6105.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6105", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T05:15:26.567", - "lastModified": "2025-06-16T05:15:26.567", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in jflyfox jfinal_cms 5.0.1 and classified as problematic. This vulnerability affects unknown code of the file HOME.java. The manipulation of the argument Logout leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en jflyfox jfinal_cms 5.0.1, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo HOME.java. La manipulaci\u00f3n del argumento Logout provoca cross-site request forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6106.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6106.json index 9f76f4dc35c..a4da6c628ae 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6106.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6106.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6106", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T05:15:26.920", - "lastModified": "2025-06-16T05:15:26.920", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in WuKongOpenSource WukongCRM 9.0 and classified as problematic. This issue affects some unknown processing of the file AdminRoleController.java. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en WuKongOpenSource WukongCRM 9.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo AdminRoleController.java. La manipulaci\u00f3n provoca Cross-Site Request Forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6107.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6107.json index 4710b3eb6f4..fc5031ce246 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6107.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6107.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6107", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T05:15:27.160", - "lastModified": "2025-06-16T05:15:27.160", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in comfyanonymous comfyui 0.3.40. It has been classified as problematic. Affected is the function set_attr of the file /comfy/utils.py. The manipulation leads to dynamically-determined object attributes. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en comfyanonymous comfyui 0.3.40. Se ha clasificado como problem\u00e1tica. La funci\u00f3n set_attr del archivo /comfy/utils.py est\u00e1 afectada. La manipulaci\u00f3n genera atributos de objeto determinados din\u00e1micamente. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6108.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6108.json index 505d0800a6d..dfc6163c529 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6108.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6108.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6108", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T06:15:18.307", - "lastModified": "2025-06-16T06:15:18.307", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in hansonwang99 Spring-Boot-In-Action up to 807fd37643aa774b94fd004cc3adbd29ca17e9aa. It has been declared as critical. Affected by this vulnerability is the function watermarkTest of the file /springbt_watermark/src/main/java/cn/codesheep/springbt_watermark/service/ImageUploadService.java of the component File Upload. The manipulation of the argument filename leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en hansonwang99 Spring-Boot-In-Action hasta la versi\u00f3n 807fd37643aa774b94fd004cc3adbd29ca17e9aa. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n watermarkTest del archivo /springbt_watermark/src/main/java/cn/codesheep/springbt_watermark/service/ImageUploadService.java del componente File Upload. La manipulaci\u00f3n del argumento filename provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizaciones. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6109.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6109.json index f20e8f183c7..84991136405 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6109.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6109.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6109", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T06:15:20.213", - "lastModified": "2025-06-16T06:15:20.213", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in javahongxi whatsmars 2021.4.0. It has been rated as problematic. Affected by this issue is the function initialize of the file /whatsmars-archetypes/whatsmars-initializr/src/main/java/org/hongxi/whatsmars/initializr/controller/InitializrController.java. The manipulation of the argument artifactId leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en javahongxi whatsmars 2021.4.0. Se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n initialize del archivo /whatsmars-archetypes/whatsmars-initializr/src/main/java/org/hongxi/whatsmars/initializr/controller/InitializrController.java. La manipulaci\u00f3n del argumento artifactId provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6110.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6110.json index 8f07037fb81..2848b70504c 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6110.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6110.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6110", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T07:15:18.373", - "lastModified": "2025-06-16T07:15:18.373", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Tenda FH1201 1.2.0.14(408). This affects an unknown part of the file /goform/SafeMacFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Tenda FH1201 1.2.0.14(408). Esta afecta a una parte desconocida del archivo /goform/SafeMacFilter. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un desbordamiento del b\u00fafer en la pila. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6111.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6111.json index a939e06f93a..324fa2e52db 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6111.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6111.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6111", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T07:15:19.870", - "lastModified": "2025-06-16T07:15:19.870", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Tenda FH1205 2.0.0.7(775). This vulnerability affects the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Tenda FH1205 2.0.0.7(775). Esta vulnerabilidad afecta la funci\u00f3n fromVirtualSer del archivo /goform/VirtualSer. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6112.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6112.json index 49be02a3fc8..54fbe8722a4 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6112.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6112.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6112", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T08:15:20.010", - "lastModified": "2025-06-16T08:15:20.010", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6113.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6113.json index c9b8aacd49c..6d94fd227db 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6113.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6113.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6113", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T08:15:20.227", - "lastModified": "2025-06-16T08:15:20.227", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6114.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6114.json index 5a7ba679b75..c696f34274e 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6114.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6114.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6114", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T09:15:20.013", - "lastModified": "2025-06-16T09:15:20.013", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this vulnerability is the function form_portforwarding of the file /goform/form_portforwarding. The manipulation of the argument ingress_name_%d/sched_name_%d/name_%d leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en D-Link DIR-619L 2.06B01, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n form_portforwarding del archivo /goform/form_portforwarding. La manipulaci\u00f3n del argumento ingress_name_%d/sched_name_%d/name_%d provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6115.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6115.json index 960bea663fd..ba4bbd5872e 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6115.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6115.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6115", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T09:15:20.300", - "lastModified": "2025-06-16T09:15:20.300", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-619L 2.06B01, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n form_macfilter. La manipulaci\u00f3n del argumento mac_hostname_%d/sched_name_%d provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6116.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6116.json index 5a3466c4e77..67e18d026b1 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6116.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6116.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6116", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T10:15:20.987", - "lastModified": "2025-06-16T10:15:20.987", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Das Parking Management System \u505c\u8f66\u573a\u7ba1\u7406\u7cfb\u7edf 6.2.0. It has been classified as critical. This affects an unknown part of the file /IntraFieldVehicle/Search of the component API. The manipulation of the argument Value leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Das Parking Management System ??????? 6.2.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /IntraFieldVehicle/Search de la API del componente. La manipulaci\u00f3n del argumento \"Value\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6117.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6117.json index 72c8d5c38e6..c6af3985515 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6117.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6117.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6117", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T10:15:21.233", - "lastModified": "2025-06-16T10:15:21.233", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Das Parking Management System \u505c\u8f66\u573a\u7ba1\u7406\u7cfb\u7edf 6.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /Reservations/Search of the component API. The manipulation of the argument Value leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Das Parking Management System ??????? 6.2.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /Reservations/Search de la API del componente. La manipulaci\u00f3n del argumento \"Value\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6118.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6118.json index 3867e780f90..86856619d71 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6118.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6118.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6118", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T11:15:19.007", - "lastModified": "2025-06-16T11:15:19.007", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Das Parking Management System \u505c\u8f66\u573a\u7ba1\u7406\u7cfb\u7edf 6.2.0. It has been rated as critical. This issue affects some unknown processing of the file /vehicle/search of the component API. The manipulation of the argument vehicleTypeCode leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Das Parking Management System ??????? 6.2.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /vehicle/search de la API del componente. La manipulaci\u00f3n del argumento vehicleTypeCode provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6119.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6119.json index 65f8b590d03..b27415c507d 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6119.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6119.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6119", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T11:15:19.210", - "lastModified": "2025-06-16T11:15:19.210", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp up to 5.4.3. Affected is the function Assimp::BVHLoader::ReadNodeChannels in the library assimp/code/AssetLib/BVH/BVHLoader.cpp. The manipulation of the argument pNode leads to use after free. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Open Asset Import Library Assimp hasta la versi\u00f3n 5.4.3. La funci\u00f3n Assimp::BVHLoader::ReadNodeChannels de la librer\u00eda assimp/code/AssetLib/BVH/BVHLoader.cpp se ve afectada. La manipulaci\u00f3n del argumento pNode provoca use after free. Es obligatorio realizar ataques locales. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El proyecto decidi\u00f3 recopilar todos los errores de Fuzzer en una publicaci\u00f3n principal para abordarlos en el futuro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6120.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6120.json new file mode 100644 index 00000000000..977bfabf5d4 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6120.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6120", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T12:15:19.750", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Open Asset Import Library Assimp up to 5.4.3. Affected by this vulnerability is the function read_meshes in the library assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/assimp/assimp/issues/6220", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/assimp/assimp/issues/6220#issuecomment-2945018579", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/20605340/read_meshes_reproduce.tar.gz", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312589", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312589", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591235", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6121.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6121.json new file mode 100644 index 00000000000..dc632919647 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6121.json @@ -0,0 +1,156 @@ +{ + "id": "CVE-2025-6121", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T12:15:19.970", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-get_pure_content", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-get_pure_content#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312590", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312590", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592574", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6122.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6122.json new file mode 100644 index 00000000000..536d356a2ed --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6122.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6122", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T13:15:21.397", + "lastModified": "2025-06-16T13:15:21.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in code-projects Restaurant Order System 1.0. This affects an unknown part of the file /table.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ez-lbz/poc/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312591", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312591", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592617", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592624", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6123.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6123.json new file mode 100644 index 00000000000..f61ecc96f05 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6123.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6123", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T13:15:22.190", + "lastModified": "2025-06-16T13:15:22.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in code-projects Restaurant Order System 1.0 and classified as critical. This vulnerability affects unknown code of the file /payment.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ez-lbz/poc/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312592", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312592", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592621", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6169.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6169.json index 89788011043..52f5cccc933 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6169.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6169.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6169", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-06-16T07:15:20.077", - "lastModified": "2025-06-16T07:15:20.077", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WIMP website co-construction management platform from HAMASTAR Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents." + }, + { + "lang": "es", + "value": "La plataforma de gesti\u00f3n de co-construcci\u00f3n del sitio web WIMP de HAMASTAR Technology tiene una vulnerabilidad de inyecci\u00f3n SQL, que permite a atacantes remotos no autenticados inyectar comandos SQL arbitrarios para leer, modificar y eliminar contenidos de bases de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6172.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6172.json index 8a27aa12314..a07e49b33b9 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6172.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6172.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6172", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2025-06-16T09:15:20.493", - "lastModified": "2025-06-16T09:15:20.493", - "vulnStatus": "Received", + "lastModified": "2025-06-16T12:32:18.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permission vulnerability in the mobile application (com.afmobi.boomplayer) may lead to the risk of unauthorized operation." + }, + { + "lang": "es", + "value": "La vulnerabilidad de permisos en la aplicaci\u00f3n m\u00f3vil (com.afmobi.boomplayer) puede generar riesgo de operaci\u00f3n no autorizada." } ], "metrics": {}, diff --git a/README.md b/README.md index 46f3f95cd64..803e1900cc0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-16T12:00:19.287786+00:00 +2025-06-16T14:00:19.614154+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-16T11:15:19.210000+00:00 +2025-06-16T13:15:22.190000+00:00 ``` ### Last Data Feed Release @@ -33,29 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -298007 +298014 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `7` -- [CVE-2025-25264](CVE-2025/CVE-2025-252xx/CVE-2025-25264.json) (`2025-06-16T10:15:19.517`) -- [CVE-2025-25265](CVE-2025/CVE-2025-252xx/CVE-2025-25265.json) (`2025-06-16T10:15:20.807`) -- [CVE-2025-40916](CVE-2025/CVE-2025-409xx/CVE-2025-40916.json) (`2025-06-16T11:15:17.793`) -- [CVE-2025-4748](CVE-2025/CVE-2025-47xx/CVE-2025-4748.json) (`2025-06-16T11:15:18.730`) -- [CVE-2025-47868](CVE-2025/CVE-2025-478xx/CVE-2025-47868.json) (`2025-06-16T11:15:18.437`) -- [CVE-2025-47869](CVE-2025/CVE-2025-478xx/CVE-2025-47869.json) (`2025-06-16T11:15:18.590`) -- [CVE-2025-6116](CVE-2025/CVE-2025-61xx/CVE-2025-6116.json) (`2025-06-16T10:15:20.987`) -- [CVE-2025-6117](CVE-2025/CVE-2025-61xx/CVE-2025-6117.json) (`2025-06-16T10:15:21.233`) -- [CVE-2025-6118](CVE-2025/CVE-2025-61xx/CVE-2025-6118.json) (`2025-06-16T11:15:19.007`) -- [CVE-2025-6119](CVE-2025/CVE-2025-61xx/CVE-2025-6119.json) (`2025-06-16T11:15:19.210`) +- [CVE-2025-24388](CVE-2025/CVE-2025-243xx/CVE-2025-24388.json) (`2025-06-16T12:15:18.737`) +- [CVE-2025-46710](CVE-2025/CVE-2025-467xx/CVE-2025-46710.json) (`2025-06-16T12:15:19.453`) +- [CVE-2025-5689](CVE-2025/CVE-2025-56xx/CVE-2025-5689.json) (`2025-06-16T12:15:19.610`) +- [CVE-2025-6120](CVE-2025/CVE-2025-61xx/CVE-2025-6120.json) (`2025-06-16T12:15:19.750`) +- [CVE-2025-6121](CVE-2025/CVE-2025-61xx/CVE-2025-6121.json) (`2025-06-16T12:15:19.970`) +- [CVE-2025-6122](CVE-2025/CVE-2025-61xx/CVE-2025-6122.json) (`2025-06-16T13:15:21.397`) +- [CVE-2025-6123](CVE-2025/CVE-2025-61xx/CVE-2025-6123.json) (`2025-06-16T13:15:22.190`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `194` +- [CVE-2025-6097](CVE-2025/CVE-2025-60xx/CVE-2025-6097.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6098](CVE-2025/CVE-2025-60xx/CVE-2025-6098.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6099](CVE-2025/CVE-2025-60xx/CVE-2025-6099.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6100](CVE-2025/CVE-2025-61xx/CVE-2025-6100.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6101](CVE-2025/CVE-2025-61xx/CVE-2025-6101.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6102](CVE-2025/CVE-2025-61xx/CVE-2025-6102.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6103](CVE-2025/CVE-2025-61xx/CVE-2025-6103.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6104](CVE-2025/CVE-2025-61xx/CVE-2025-6104.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6105](CVE-2025/CVE-2025-61xx/CVE-2025-6105.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6106](CVE-2025/CVE-2025-61xx/CVE-2025-6106.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6107](CVE-2025/CVE-2025-61xx/CVE-2025-6107.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6108](CVE-2025/CVE-2025-61xx/CVE-2025-6108.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6109](CVE-2025/CVE-2025-61xx/CVE-2025-6109.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6110](CVE-2025/CVE-2025-61xx/CVE-2025-6110.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6111](CVE-2025/CVE-2025-61xx/CVE-2025-6111.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6112](CVE-2025/CVE-2025-61xx/CVE-2025-6112.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6113](CVE-2025/CVE-2025-61xx/CVE-2025-6113.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6114](CVE-2025/CVE-2025-61xx/CVE-2025-6114.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6115](CVE-2025/CVE-2025-61xx/CVE-2025-6115.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6116](CVE-2025/CVE-2025-61xx/CVE-2025-6116.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6117](CVE-2025/CVE-2025-61xx/CVE-2025-6117.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6118](CVE-2025/CVE-2025-61xx/CVE-2025-6118.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6119](CVE-2025/CVE-2025-61xx/CVE-2025-6119.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6169](CVE-2025/CVE-2025-61xx/CVE-2025-6169.json) (`2025-06-16T12:32:18.840`) +- [CVE-2025-6172](CVE-2025/CVE-2025-61xx/CVE-2025-6172.json) (`2025-06-16T12:32:18.840`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b79587ae70f..8d4fe49057d 100644 --- a/_state.csv +++ b/_state.csv @@ -236261,7 +236261,7 @@ CVE-2023-4525,0,0,5bf42f67193da0102cbdfa0f5eae1107ad391f3088f5c3d8fcbbf1b1f9dc9b CVE-2023-45251,0,0,9301cd01cf0e1a09a624bf8b6813dd7dcd8b5641f21dfda46acef47990364d11,2023-12-26T18:15:08.030000 CVE-2023-45252,0,0,c4429af5bbcc0f38722165d9e25377b431700efa19e0449574864122d73d0cde,2024-11-21T08:26:39.170000 CVE-2023-45253,0,0,127d5a066ae293cc4a063dc3340113eb9682ce46f6a2805af7f3024b04fb186b,2024-11-21T08:26:39.330000 -CVE-2023-45256,0,0,935656c75828cebaea270f7539e116d33fc85f5329df9c0a866140c001626e5b,2025-06-12T17:15:26.507000 +CVE-2023-45256,0,1,5e25b88a7d5e107eb0313a3b2ccfd6c23cd5a9b88cc37f287eafce2d099ca255,2025-06-16T12:32:18.840000 CVE-2023-4526,0,0,fb4879b7650aa0cd1e6afd9fe07638a982da206f1e0194e931f7254a2d4a5a41,2023-11-07T04:22:41.360000 CVE-2023-45267,0,0,937f44bb5bfb65ac3fbb25da5f07ac71be1d732f3e17dc2ad4b9924269f97dd2,2024-11-21T08:26:39.480000 CVE-2023-45268,0,0,05177482f5b68af05ad227dd88a3054b588ea3ee5f1056351918dacd5cb04bb7,2024-11-21T08:26:39.623000 @@ -254080,7 +254080,7 @@ CVE-2024-25569,0,0,b037d1dac321d0fad4f682820302460ba3789c0955cd0c11614e35160f41f CVE-2024-2557,0,0,1401ca997ffd5c020e7fbea47e5541f7ac467d517340858576f69f2e489eab1e,2025-05-07T16:30:33.517000 CVE-2024-25571,0,0,8a68e54b2e23ebcb2672041b2be0c0d79b94a807b69a2bcde573f17191362239,2025-02-12T22:15:31.667000 CVE-2024-25572,0,0,cbed3561a996d8fc0913552e9f85910773571a0e0f73b275ef35dc4399b8665b,2025-04-08T15:17:15.773000 -CVE-2024-25573,0,0,da0a97ca9953301e68007eb7f7395e51118eb44ee18edcd5036ff6bbb141ed0f,2025-06-15T16:15:18.683000 +CVE-2024-25573,0,1,3dc7890d0876aeda5fd7a0442bb26317035c49122a005c3f76672f2962b8f410,2025-06-16T12:32:18.840000 CVE-2024-25574,0,0,3a6d003e6549d6e7e9bf748f59f234891c4a95854309550ae4079efeefd3444d,2025-02-27T15:03:31.583000 CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e117,2024-11-21T09:01:00.773000 CVE-2024-25576,0,0,8c96953d02c3ecec70b0880ceff32ab69ff1846b5ba0dbd1e89bf62fd8ac88d6,2024-09-06T20:17:14.003000 @@ -264632,10 +264632,10 @@ CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf0 CVE-2024-3882,0,0,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921af,2025-01-27T16:24:52.420000 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000 -CVE-2024-38822,0,0,e878eaf5d1d5e8aed178515971ecc2adf08c2bf1dbf9f9713a760c3140758bdf,2025-06-13T07:15:19.300000 -CVE-2024-38823,0,0,fb82bf33848268556a877cd19f1a813d141fbec7693a2d4e6c81edd7cf64449f,2025-06-13T14:15:18.823000 -CVE-2024-38824,0,0,2196550d3f8c872bb9eaf813af49ca09eb8b2be507546acb4b4dfc43f58284a5,2025-06-13T08:15:18.800000 -CVE-2024-38825,0,0,53e71332e9b4cba350a68ba9e2de46504d460d834fc9582f4da2d50364c7e4a4,2025-06-13T14:15:18.983000 +CVE-2024-38822,0,1,903c4dae147a691ee334674e9124da126b855831164544cc7ed6f6b560852ed8,2025-06-16T12:32:18.840000 +CVE-2024-38823,0,1,a76026a93177fa86997301ca5734237d13ec0670613a1533b714a8c1760ac4f6,2025-06-16T12:32:18.840000 +CVE-2024-38824,0,1,ed4242b615deb89b2ed0b56b2c573977191d5ccf12666803fdd2ab577921783c,2025-06-16T12:32:18.840000 +CVE-2024-38825,0,1,0ddc3f75417cf9edf1508aae9de8f0a1e9a3a6f3243f259ed559787ee796b7e2,2025-06-16T12:32:18.840000 CVE-2024-38826,0,0,506930d335a5efb8c27d5014fa191907479a7be8d8701e39690034739d2c8ebb,2025-03-17T22:15:12.667000 CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000 CVE-2024-38828,0,0,30ca64d92e91bdd0f728034345a0be072d18df3b4628bfb9f9d8fb65850f39eb,2025-05-09T20:15:38.413000 @@ -269101,8 +269101,8 @@ CVE-2024-44893,0,0,52016ee271f9a468ab127b7483a02b0060ad410b06f3e4feae0c7bc73e48b CVE-2024-4490,0,0,054509a6c9ec9ae62206574875759d320b58cae59eaf518e949bc43d1c0d9aa1,2024-11-21T09:42:55.980000 CVE-2024-44902,0,0,e85f35417823134dd49df22ef9112c798d5d49353e9fbe9fff57bcd79d25fd46,2024-09-20T14:55:38.087000 CVE-2024-44903,0,0,69ab2ef87775399a9717708c58abc2e90012561cbf8411f1e89e3b3d496ad389,2025-03-27T16:45:46.410000 -CVE-2024-44905,0,0,d7ac36477f47bc7d01950aecb8cde86f1f8b8191b4b1bc69aaf754167e04532b,2025-06-12T16:15:22.007000 -CVE-2024-44906,0,0,d1891de9b776d084d866142cfb97652b9378f411739ba377d210ff4d298133e1,2025-06-12T16:15:22.140000 +CVE-2024-44905,0,1,9338884e573accf5d36fdb335b4529a774eb4825ae8def285dc6aed76f338339,2025-06-16T12:32:18.840000 +CVE-2024-44906,0,1,c8ef2f62a77ef0f9c406b838f7fdfd381cc0e314ff27d95ca59da953c112445c,2025-06-16T12:32:18.840000 CVE-2024-4491,0,0,44f6ea2b3bdb2c2b126d1862dbc937b1bfc717788d8a3e14a2b3625f881bdcf2,2025-01-27T18:35:34.717000 CVE-2024-44910,0,0,38fbad809f698f01a9df6d19a6055b3a9fb72a271102958d71ec64768cb72bc7,2025-03-19T15:15:50.533000 CVE-2024-44911,0,0,a47f0b0150a6be1a0101ad824f46e66874b22e4c7b06327f4fda077e35518543,2025-03-18T21:15:29.927000 @@ -276801,7 +276801,7 @@ CVE-2024-55563,0,0,71176077fcb408f7f4e76face70d25bcb2c9f2e0076dba875d04cb14b79dc CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349c8b,2024-12-09T16:15:22.907000 CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000 CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000 -CVE-2024-55567,0,0,fb0614e9f496bc533d89f06ecd0fb00049c700553fc35188c95d0fac461388f9,2025-06-12T17:15:28.707000 +CVE-2024-55567,0,1,b0257508c3107ba39720ffd611d08e51c8b20e633d11672622417daa62bad72e,2025-06-16T12:32:18.840000 CVE-2024-55569,0,0,56571fa31fb1eb62f8e97f906d5111a02ee752197db456a40a07cb3c2eb5fa9e,2025-05-27T19:15:24.897000 CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000 CVE-2024-55570,0,0,54aaa2288cd697cbf8a8070a769b88a355e9aac7091f42350f78741de15ddd1f,2025-03-05T19:15:37.710000 @@ -280148,7 +280148,7 @@ CVE-2024-7558,0,0,259bdf301858f4db668dd1acb451e2b7d5b30015660e19c8265bb194624378 CVE-2024-7559,0,0,9f7bcbd00653385c50a5467e933e4dc27e8b389aa64c8655fcd8e85410f3d2b9,2025-03-03T19:07:59.177000 CVE-2024-7560,0,0,42fcc5d7b3253b142f100968587a9194b34fc19177fdb10cf4447b9935e32495,2024-08-08T13:04:18.753000 CVE-2024-7561,0,0,39b56d5e0c935d1569f6c65718ccaefe2b713d37c7e2453b35a28aa8c470f51e,2024-08-08T13:04:18.753000 -CVE-2024-7562,0,0,cf89f83cf3fa74f0f8fc4a5b5ed3e9dee4c94917591c485bc5a14d6b674429c6,2025-06-12T16:15:22.320000 +CVE-2024-7562,0,1,575818607cc8cb96a1107bf1dbe09ef9f4511fb1ef991a07d25974b4fc8033cc,2025-06-16T12:32:18.840000 CVE-2024-7564,0,0,aaecac6657aebcba5c5a0a4353a649c0e9b449808e772fb1d7591dba40d01531,2024-08-07T19:59:36.240000 CVE-2024-7565,0,0,8aaeb62e7286c635605949a18d01cfac562bbcedb4487418efb041d81ee481c8,2024-12-19T19:15:24.127000 CVE-2024-7566,0,0,d57e38a8c9d36f2a4a7ad44778d5ba7036864bb34240d5b9a44fe47befe2ee28,2025-02-11T02:15:36.110000 @@ -283536,7 +283536,7 @@ CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408 CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000 CVE-2025-1408,0,0,7744109164007b678e01b84bc920895643f4329552f36dd13088e27d1c95f709,2025-03-27T00:38:34.650000 CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000 -CVE-2025-1411,0,0,64e5408b31c2dc26f5b62c5a36bb59c50bc32e86d443491540978b2d2d022807,2025-06-15T13:15:32.027000 +CVE-2025-1411,0,1,1f2597fa54132062c0581f80a50772a183f8f681c11709c4da1a84d9018bdddc,2025-06-16T12:32:18.840000 CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000 CVE-2025-1413,0,0,5c3f38d9cc7b7010909c2af97131be7654555b0227082bf07ca01df8093ffd5a,2025-03-26T16:15:20.833000 CVE-2025-1414,0,0,3a97550374709a951d5410aaca1ecbf1ee05e0ec13bcab848c3fdf8c74845735,2025-03-28T19:05:18.850000 @@ -284387,7 +284387,7 @@ CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4 CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000 CVE-2025-20908,0,0,576d0c932c62fad7894b616fe95f3b3030f52a9c25cc8141c044406a0e0a7fc0,2025-03-06T05:15:17.150000 CVE-2025-20909,0,0,661128f74b5e1570cc0c738206adeffe7913c3464aea431885d2b5b77ff6aec8,2025-03-06T05:15:17.307000 -CVE-2025-2091,0,0,1100ba577be997cc84f23a5d8de969b9672830c14158077dbaea0ab8a2fe46cb,2025-06-16T09:15:19.067000 +CVE-2025-2091,0,1,be656dd0a444756a5663aefcdaa8b3a47d187ee91b9b364518cd029c9d7a82bc,2025-06-16T12:32:18.840000 CVE-2025-20910,0,0,8eeef360bd8ee8e6ea808c95de07cab8422342433bb9ea5f3273d310585c156c,2025-03-06T05:15:17.480000 CVE-2025-20911,0,0,48bf673220f74bc55aa347d4893646bb5408aef810bd43f32e472aa676cc2420,2025-03-06T05:15:17.653000 CVE-2025-20912,0,0,f7767b1d03f69e82598a74f1eeca9546a2bd4c871a4556075c66e1b7bf13c7d1,2025-03-06T05:15:17.860000 @@ -284492,7 +284492,7 @@ CVE-2025-21081,0,0,2001a89bc61e9590c36304579e4e9d48d5980697f9b552f01b260ec73e2e5 CVE-2025-21082,0,0,46ac35d658d44baf54d1ac8a8f790de5d79d2ee8dc02f7947502a40cb1fc420e,2025-06-09T19:07:20.283000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21084,0,0,af34ba3562290d89d6e1fadbcb1efbf04888823c3570480deec642a909378dd0,2025-03-04T17:42:20.943000 -CVE-2025-21085,0,0,772ebdef43100f9d01acb11126f9ce7aa2f47608a00a014fc26a64b09e90154e,2025-06-15T15:15:18.330000 +CVE-2025-21085,0,1,9e2dc56af658e9922251d086754ce6bc54b9411d5ec40bf4f30d6331aa66f291,2025-06-16T12:32:18.840000 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 CVE-2025-21089,0,0,376a98b84b381726ba88c6087957cb55f869f110cd69de435e1dd837da0605d8,2025-03-06T18:07:19.917000 @@ -285599,14 +285599,14 @@ CVE-2025-22231,0,0,bd2ff59ef079880253edeca06616e1c3a205871c44a51a92d95e60e549741 CVE-2025-22232,0,0,bee762df9dfabd3d4c6c12e64136a19453238ca07b81d2e49eee527157bf661b,2025-04-11T15:39:52.920000 CVE-2025-22233,0,0,50310437fe70f8c52d32549c7a5d723959e232fe0d070a21f27a0de47dd17286,2025-05-19T13:35:20.460000 CVE-2025-22235,0,0,9096c227dda3418e3d7b103b041dc8b2cd855202b867daccc1ae1ca882f5e87f,2025-05-16T23:15:19.600000 -CVE-2025-22236,0,0,dbb7d3a02e1c6d6d2f684cbfdbbcb2430ac0f7e9d9f41812cc45c086eb186b9e,2025-06-13T14:15:19.323000 -CVE-2025-22237,0,0,db6f32966bfc17ee0f11f666363e02f870457734ae40bcd1b44e6cb1a9576688,2025-06-13T14:15:19.467000 -CVE-2025-22238,0,0,828c364242003eaf354a1faf07d2a48308c32d665a7d2f838c4c88b3a40f83fb,2025-06-13T14:15:19.610000 -CVE-2025-22239,0,0,b8e3232987f5bdeb114a6f1bb3eac05b37d07f2823e39c700952228ab1ff5e2b,2025-06-13T14:15:19.747000 +CVE-2025-22236,0,1,df23892a9c643643c4c598e454b23b2f4974c0cff5ee1ae3fb05aa3b2bc3bfdd,2025-06-16T12:32:18.840000 +CVE-2025-22237,0,1,e5033426e7cde2a8347ac6144167a02eff9d298fc657b1f9f7bac580be609886,2025-06-16T12:32:18.840000 +CVE-2025-22238,0,1,90cbf431a0f98b718fb296b8307c255869085171f4fac137ea27c28525357037,2025-06-16T12:32:18.840000 +CVE-2025-22239,0,1,9c7e9091a333b7caae56f8437af7be401c4bac64c861cf24ec8751183fb38e0a,2025-06-16T12:32:18.840000 CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000 -CVE-2025-22240,0,0,af29f0df6cdc720e01fa31c02d21fefaf97e9808c7c3c6d48054b8948bbc5d45,2025-06-13T14:15:19.893000 -CVE-2025-22241,0,0,0a70c5ba92f0e2dc6afa64e6c918f428f985a88a04a4aae953200fe98cb5bb22,2025-06-13T07:15:21.567000 -CVE-2025-22242,0,0,29b9520615b687f58b11343e31d6275e1ec2edf2b665175a91c5e599400f719c,2025-06-13T07:15:21.710000 +CVE-2025-22240,0,1,8ef5af61b53cd04ba69d32583c0b1655cc4f888f1b566e6ce92380bc51ee3947,2025-06-16T12:32:18.840000 +CVE-2025-22241,0,1,69b91ba972477d30f4d78ec25a43b609b4874fd581b9db9d8584d722d8a9299f,2025-06-16T12:32:18.840000 +CVE-2025-22242,0,1,506652a7045c1ba4c93cd4396d30c924806188699f91eb5dd2255de95511272e,2025-06-16T12:32:18.840000 CVE-2025-22243,0,0,5f41737989264b2994eac99e02c12b9f81310f29baab0cf31082285d453e8c22,2025-06-05T20:12:23.777000 CVE-2025-22244,0,0,936e256b7445af372dfb2e4aaecfd0a0bba17d1084c3b4137448313a9b74ae16,2025-06-05T20:12:23.777000 CVE-2025-22245,0,0,4cf32386b47e50dd7150971af187d1237c885530e9e4973c20a0d2525573c96a,2025-06-05T20:12:23.777000 @@ -286167,7 +286167,7 @@ CVE-2025-22847,0,0,0de483179c1066e1dcd28554acee3e5fb1b273a7c68d4f167ad861a991a59 CVE-2025-22848,0,0,9b515c9e26461ad766d4f4acf9e3a2e59ff846ba8d2c4573dfec0aff13837cad,2025-05-16T14:43:56.797000 CVE-2025-2285,0,0,98fc658609c4f69aaee78398e9e81043e36556f176ddcb77fdb67c9af81d073b,2025-04-08T18:13:53.347000 CVE-2025-22851,0,0,f2a6332c8e5e9b9a1e6161891c357461c7bb64ff86725b50b37556c69f8a4a26,2025-04-07T14:17:50.220000 -CVE-2025-22854,0,0,913ca7fc59825bdbeb39e9e2c64564488322a796af22fabc508312a2cffa260b,2025-06-15T15:15:19.150000 +CVE-2025-22854,0,1,62d6a21c9b7938da67124a6cc13f56838e69cc777a85142d249e6b2a16317871,2025-06-16T12:32:18.840000 CVE-2025-22855,0,0,0ea644d507eefb1364e7f8ce7a6f7b59da91a785412c2309fc15d80da09b4a79,2025-04-08T18:13:53.347000 CVE-2025-22859,0,0,650d68c9ac8ef101db4b23d698782c4b6cdbb3a3c81745480f8df2db23b95791,2025-05-13T19:35:18.080000 CVE-2025-2286,0,0,a29011b43d479279660c1eaaab71fd21b21b30735d3755825b9279066e08e188,2025-04-08T18:13:53.347000 @@ -287435,7 +287435,7 @@ CVE-2025-24306,0,0,73cf37771b6f85cbd5893cb054304bfb4bf15e5622c3cdffb9a2e4a50bd30 CVE-2025-24308,0,0,17cd3a573b182a1c9a1a8983398aaec915a512d656788bff9764198e8415dd22,2025-05-16T14:43:56.797000 CVE-2025-24309,0,0,b881e80e18a543dac7caf5dbe4ebf8345a69e13fed09525eee5962b72198dbe3,2025-03-04T17:16:06.513000 CVE-2025-24310,0,0,79eb65b878bebb3c188042d461bf95ffa89d0a6a24e45ec375e0efb5d01b2e9d,2025-04-07T14:18:15.560000 -CVE-2025-24311,0,0,71719ccb9e4d34e6a2c70e478e86e501a6737ea916237a26e81ce3381ef2de2c,2025-06-13T21:15:20.197000 +CVE-2025-24311,0,1,abce4359b18e1659c160bfeaac0c7032600ef9289ec7edddb0cac5b03a39ae25,2025-06-16T12:32:18.840000 CVE-2025-24312,0,0,95c47bb536b453078b50948ffe457339fcccb14868a3af4b230325aee112d79c,2025-02-05T18:15:34.060000 CVE-2025-24315,0,0,0e26ee76f79f703a200d15e48f75d77e02b1cb3d5dea1889a004bcedc57bbdb3,2025-04-16T13:25:37.340000 CVE-2025-24316,0,0,3d67fc5ca9257bdefdc420f872260ce49c49fc7bc45018e469adac707c1de56f,2025-02-28T17:15:16.790000 @@ -287494,6 +287494,7 @@ CVE-2025-24383,0,0,8a00be3f6ae35f4f4679d41ab0f505713ccc45cdd937542a531090e4371ea CVE-2025-24385,0,0,930e89287bc45199246df8a8a043cd3eee589dd78f62d42845187d0b0b9690f1,2025-03-28T18:11:40.180000 CVE-2025-24386,0,0,58408b073a8e5c10ec25f524139cf62fc0a38dbc113290666798c38651f8adf4,2025-03-28T18:11:40.180000 CVE-2025-24387,0,0,a1fdb446384ec34d7bd22f11041c6c4796cab0ef1e55e8ba9e452979dedd7e7f,2025-03-24T14:11:20.387000 +CVE-2025-24388,1,1,f804535805ef3cc79127034a56577894045c53f011171ea4204bd8e610d26be2,2025-06-16T12:32:18.840000 CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000 CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404390,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000 @@ -287949,10 +287950,10 @@ CVE-2025-24914,0,0,aeade175f7df2516cde2132fd3b74adeba00ea4ec1ff88266e8696b3cf129 CVE-2025-24915,0,0,24c26ca53ef1e2928a50350b0dbd455453bdc6581f1752ca8926cd09252dcb45,2025-03-21T15:15:42.020000 CVE-2025-24916,0,0,3d76dea9906a7c256a26ecff7616bb4def322bc4916f3aaaf5491aa98e78513a,2025-05-28T14:58:52.920000 CVE-2025-24917,0,0,19376be8e731c37bbde1182f2656a8d22ee1531fb5d3e8e6c38fc24ae123fc30,2025-05-28T14:58:52.920000 -CVE-2025-24919,0,0,29b872e2a653cd17d7d4f124bff2e96300b8884dd4a3876a098022fbc0eed185,2025-06-13T22:15:18.320000 +CVE-2025-24919,0,1,06601665a81e7d60905cf7bf26a2f646461b0fd5d3eec083d1fe7d6489d4ae23,2025-06-16T12:32:18.840000 CVE-2025-2492,0,0,50c487037d9367dd628709b7a18f8eb57d86cfa6efbfcbcf06bc80735a4d22ba,2025-04-21T14:23:45.950000 CVE-2025-24920,0,0,f7f8f763bf4982c0df509bbeae99871e92e5c9a0b38af941d8b9c06be0af01ab,2025-03-27T14:10:53.500000 -CVE-2025-24922,0,0,66d430cbcdfe656f3a5888fc6c62b09919f402d066223ad8fa8180d2aec5671f,2025-06-13T21:15:20.390000 +CVE-2025-24922,0,1,1085a7cd13f679794fbecd2f28d4ec8aa71843cfd82213479396b1b27b9a276d,2025-06-16T12:32:18.840000 CVE-2025-24924,0,0,3cb1f58ac0f82a4a651fd56ef4a80a8ba6f8902630bb63eebac1edae30e9552a,2025-03-05T00:15:38.423000 CVE-2025-24928,0,0,176e4c709da81a2a28364d8e64063109e6e998df91f7562f9106d1a203c5524e,2025-03-21T18:15:34.860000 CVE-2025-2493,0,0,676bfb3fae988b7f59f84e2d119ffc2e2dbb296d8377ca555044ab18d563390f,2025-03-18T12:15:15.950000 @@ -288036,7 +288037,7 @@ CVE-2025-25044,0,0,32cbe5bfdb7c126fdaca206ae5bfc36cf733fd46ea11b87de08f104341ac0 CVE-2025-25045,0,0,4332e3a8b71ea922a29f4a25a34e5a1ad4ca877c6226bfc3954996951ce40a0c,2025-04-29T13:52:47.470000 CVE-2025-25046,0,0,ef01fe62076c448c0a74cc0b470d93bb2ae59c519d0a10b5228ec1da6b3dedc6,2025-04-29T13:52:47.470000 CVE-2025-2505,0,0,1c5dbc559f463be147cb12740d372dacf2302c45c3ca19193c3edfdb65cecd96,2025-03-20T08:15:11.873000 -CVE-2025-25050,0,0,648c9ccecd3ddd8232f979380057b9cc820a3e6203c769dae8de88d7d3eb44c0,2025-06-13T21:15:20.560000 +CVE-2025-25050,0,1,80be0a42a493ad295c40d9c183cdd7f4e7bbbd9f1316c32f8687dbafeeaa49e9,2025-06-16T12:32:18.840000 CVE-2025-25052,0,0,73061f8264f50a72a29f40c434e1a02afa7aceb06d183cbc3e93848d177e76b7,2025-05-09T19:07:18.690000 CVE-2025-25053,0,0,c2f0bd0c35598e1c1622cc448acff9a92a8848188ef19aeadaf00b0129c32cae,2025-04-09T20:02:41.860000 CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000 @@ -288198,7 +288199,7 @@ CVE-2025-25208,0,0,30a0af8be19065b0f97628764c0fe3278303a753db2811c0ab95ed0c88a4e CVE-2025-25209,0,0,bfd251e59c5428ba099a444e225b2600824165f606d665bca4d637876a386515,2025-06-09T12:15:47.880000 CVE-2025-25211,0,0,cc654165143e1a6a565806b2fc146b90cc33ea614905ce025bd44c72692f30c8,2025-04-01T20:26:30.593000 CVE-2025-25213,0,0,4b306f44f1e5df4d081a6c0fb4426c0cd2686db9ca8e9c6904e1b2bea864dca1,2025-04-09T20:02:41.860000 -CVE-2025-25215,0,0,4abb9d9b00d588d484a07e84c2816b3a37891aed5e8c9f2d2c5a2d78e0438772,2025-06-13T22:15:19.337000 +CVE-2025-25215,0,1,9ff079b4ebb6a7a05bfe6e7c653bb4afb671ac05a7fe4514ec93f867b720f257,2025-06-16T12:32:18.840000 CVE-2025-25217,0,0,946983f09842b611ada073cdbc9b879a3d7108893b9945dad8c0019f150ae626,2025-06-09T19:07:00.530000 CVE-2025-25218,0,0,fba0872e99b54dc5764f05bf49635253da00a326eff6e2ff854aa21ca321508d,2025-05-09T19:06:17.877000 CVE-2025-25220,0,0,3e48240fbed17896ea7da609293ff3c7512ec69524229da5c9de3065be015d34,2025-03-18T09:15:13.750000 @@ -288225,8 +288226,8 @@ CVE-2025-25250,0,0,aac8ea3f566a4f0fab76786534ffbed271242803ebb8f8326ca4434e79caf CVE-2025-25251,0,0,7ba720b0969d846f1f4c94132b0eb572e4c9a81f6898891b935d17882c7c0a34,2025-06-04T15:37:46.183000 CVE-2025-25254,0,0,c4f21e6036ba144ab43461c15a785205542371d6b8f941619552468f7ca5bf0a,2025-04-08T18:13:53.347000 CVE-2025-2526,0,0,b4d2665b0df39fb8efb0ebc6a7ec708e940ede0cae79c4c99d0922650362cbb0,2025-04-08T18:13:53.347000 -CVE-2025-25264,1,1,86b9e5b79b20d278978c57ce08d4b8fbb5a135acee48275f457b611bef6c5940,2025-06-16T10:15:19.517000 -CVE-2025-25265,1,1,0cded1ddd3e05f0a8a145ebce41d520505e5edaca5763e405e4d4b9a487d8e21,2025-06-16T10:15:20.807000 +CVE-2025-25264,0,1,3564f4e612a80699f2c1da30786dd5dc99a7508a6682d388e1e92ca97a35bf6f,2025-06-16T12:32:18.840000 +CVE-2025-25265,0,1,4c0732d901e687e3434647411322b17d532c0cb0a8f496e44d7e7a3952fcca2a,2025-06-16T12:32:18.840000 CVE-2025-25266,0,0,14fc4214833d5ffeb8f363743939de320f9169af46798b63b6da510cc3dfff47,2025-03-11T10:15:17.850000 CVE-2025-25267,0,0,327b2100edff4cbf9fdcfe1321dc00713a82279b4ead6a7ccdc62b6f97970ac6,2025-03-11T10:15:18.030000 CVE-2025-2527,0,0,7eee1c306ec3796fb3e2b284b23cda1a7bd91e67491cf652c8d7df0439106c96,2025-05-16T14:43:26.160000 @@ -289530,7 +289531,7 @@ CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501 CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000 CVE-2025-27444,0,0,4a47feecb17e273ada092c286d134005100fd80febdd86293ecde589498b8bab,2025-06-09T15:04:33.780000 CVE-2025-27445,0,0,21ffaa0121ffbab2a93e77289864e83ad4718b0ea6117cc262cfc372dcb31267,2025-06-05T20:12:23.777000 -CVE-2025-2745,0,0,059188e70ed26963a3776b3fcf32ce46037b3ee9220051396e6350062e500fce,2025-06-12T20:15:21.040000 +CVE-2025-2745,0,1,f2e2b47141a7e3198a73a4280ef79923cff913dc2fab9a868b423d54a6a875df,2025-06-16T12:32:18.840000 CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000 CVE-2025-27467,0,0,e305051e1a7dcf4291e11b8cd6f3091788c2ddeaf29bee2cf92ba70db3a6a044,2025-04-09T20:03:01.577000 CVE-2025-27468,0,0,dcaeee6f5e39787f02f391b688449bc9e36259b88e853d225eb70b8e9394d505,2025-05-19T18:22:00.040000 @@ -289720,7 +289721,7 @@ CVE-2025-27684,0,0,9a5be52819dcda1151d198188f7ac465807f30a5861e027e8c95131ac3b61 CVE-2025-27685,0,0,12c180c4342b9faab438bd97428fef241047dfd889b219b684e6970045217824,2025-04-15T22:15:25.260000 CVE-2025-27686,0,0,c902be8a38869c709d683c1f6f95437d232f7946bc7c27df15bcad9b25ec1a54,2025-04-07T14:17:50.220000 CVE-2025-27688,0,0,37bfd097838352d3a2c81f7e24a7a0eef1d098aec6c34d136894861caf071b8f,2025-03-18T16:15:27.980000 -CVE-2025-27689,0,0,f57e0e01f70405947f9031f7ce418c2e77c8ddb205bf7afa1c2853644a079850,2025-06-12T21:15:20.113000 +CVE-2025-27689,0,1,84f6ea2e1c2592219b5fdfad9a7b55ff7c195315e206c5c0c0a9ff7fd1c13c97,2025-06-16T12:32:18.840000 CVE-2025-2769,0,0,c7d5ebcd1a8ad8b36834e190f3b8817ef45fcbdb05f3dc310886d8498c579605,2025-04-29T13:52:47.470000 CVE-2025-27690,0,0,b55f01e891831f4bb19e229eda29765c67f4ce54604f95f0254b8a0eaf292fe4,2025-04-11T15:40:10.277000 CVE-2025-27692,0,0,f070362bc0ac00ebc50fee353a797d3e513adb7ab533f74c668198fcd82abc8f,2025-04-02T14:58:07.527000 @@ -290007,13 +290008,13 @@ CVE-2025-28367,0,0,4a07d437818fe7720795b8f309552d71415612c2033b36795a35ab5455779 CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000 CVE-2025-28371,0,0,9134c0b29ad829ee44935d8e974e7c73f0d8c01267cd2682d218b45eeaf0a178,2025-06-12T16:26:26.253000 CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000 -CVE-2025-28380,0,0,36bedb167d7833934d7536384701227f764cb62b7a0dbd404b1ba222663bec45,2025-06-15T17:15:18.007000 -CVE-2025-28381,0,0,39b7cc899f9c111fc1c462db749276045ab89748c7ae3428b15001fa97ee1759,2025-06-13T16:15:25.227000 -CVE-2025-28382,0,0,4472d28087ea6d98e4980583cd33e37dfe9c5525edfbc1010418c6c4049e8a0f,2025-06-13T18:15:20.677000 -CVE-2025-28384,0,0,ba795bd2e5eabc22fedd790aa0a529c7ee0985ace1561a3ab6045d696221e28a,2025-06-13T18:15:21.510000 -CVE-2025-28386,0,0,ef8702069c2f027a92b50e4914636e7631785cdbf48dc34254c8a832b215251d,2025-06-13T14:15:20.713000 -CVE-2025-28388,0,0,0efe3f826c7b8b3aad9492d5d491ce127b3ddb1193b5d8746d93fb8e640fe979,2025-06-13T16:15:25.387000 -CVE-2025-28389,0,0,82823d94eb606d5aab985c92ed7cf6d86d72b178cc5a4493aee3ed383b0ff367,2025-06-13T16:15:25.550000 +CVE-2025-28380,0,1,966eb42474b50b37d485423654b1540df5c561365dceee46857f5c9637c87923,2025-06-16T12:32:18.840000 +CVE-2025-28381,0,1,255140073edfa45e028d2c6a1fada5974b7b10bc2b5c3e472e55b90979a3397c,2025-06-16T12:32:18.840000 +CVE-2025-28382,0,1,b64a1e40051bda0d66ab2ac83aab7ec689b56b0d7354047ddea2050513bcae4d,2025-06-16T12:32:18.840000 +CVE-2025-28384,0,1,839e47534630f42c1a9aff5fdcaab118cb022413d1b2aa5863e6aa57aa0727dd,2025-06-16T12:32:18.840000 +CVE-2025-28386,0,1,5ed46233e49480f4f3ade762e7e57eafe01116846292dd55fd5212762e294221,2025-06-16T12:32:18.840000 +CVE-2025-28388,0,1,85d2d888791653ef894b1e12779274a99b711fecb0d28ed6fda9f744aa0d83bb,2025-06-16T12:32:18.840000 +CVE-2025-28389,0,1,59f27b595ebeda5171943cb424a60e26be39fe06d5e0de8b8584c7e39c0f4676,2025-06-16T12:32:18.840000 CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000 CVE-2025-28395,0,0,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000 CVE-2025-28398,0,0,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000 @@ -290437,7 +290438,7 @@ CVE-2025-29722,0,0,ca2877891fb5b9bd3510371a0bd9d38fa50473b0a31dcb3ab5591fd6a0406 CVE-2025-2973,0,0,f988078874627143c2def1ab30019bab3c4d13be44205338de0c50c2330cd94b,2025-04-10T14:34:24.567000 CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000 CVE-2025-29743,0,0,81120842f22b2571ea7e3fe058ac6f5d5658e8dd31a46120b990d9a82771d185,2025-04-30T13:54:38.493000 -CVE-2025-29744,0,0,8f4a720005a8f65edaaf2b3950253bba443dc2b7a6d5aba6c891b1e06a935033,2025-06-12T16:15:22.727000 +CVE-2025-29744,0,1,3bf93075570118c143106ae156148bda055342e86945c722c4ed3e6a69af4351,2025-06-16T12:32:18.840000 CVE-2025-29746,0,0,b928f042c8f64c45c80662a4638972935a0ad568b5c440e11d275fd69dd05300,2025-05-08T16:15:25.443000 CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000 CVE-2025-29756,0,0,bc89805d7a8f806b73f77dab58a6ca51f262921ee51e2316dda7a2eb22911ccc,2025-06-12T16:06:20.180000 @@ -290539,7 +290540,7 @@ CVE-2025-2989,0,0,0766747cb0e01c92c737981bb238f9adb3ab95fb53aa49cc63ece17dfe3856 CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000 CVE-2025-29892,0,0,2f30eb8bda4660a13c94f6e590661bd66072c1732fc80056868bef8dddc8b81d,2025-06-09T12:15:47.880000 CVE-2025-2990,0,0,71ab3f8fbfc23333e9355c75b23bef4a236943bf94587f620db3828791ab7825,2025-04-07T14:14:41.947000 -CVE-2025-29902,0,0,823a6f1139a0eca3a25e130278389cfc171375bf4e90ca11d07a6e3377038c4f,2025-06-13T10:15:20.693000 +CVE-2025-29902,0,1,b3d89b0f6881f1cb65d6947442d2a8e60ffe6b407b435a1ceed7358dd30c6b0c,2025-06-16T12:32:18.840000 CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 CVE-2025-29905,0,0,0505157a2ee3155b70a3b9864c6c04be829eab0e89eeb1d3c56f2d37557cce78,2025-04-17T20:22:16.240000 @@ -290892,7 +290893,7 @@ CVE-2025-30392,0,0,e7782c228af65504c4083e4f8db90e701cc78335a620067d50e303d231511 CVE-2025-30393,0,0,804fd6a0256fde9907b05970b6c69419740b94df91cdd08cb0b627f4c4bc04d4,2025-05-19T18:33:21.170000 CVE-2025-30394,0,0,f1de03358ff12e4be92ec2b475144b0d841af50bcedc0c6f1d65d6f2cabe6b56,2025-05-19T18:30:32.980000 CVE-2025-30397,0,0,759d4da57f69c839bb6f0b2e43dea4dc6c26b90e8f211bf717cc74fa17f09490,2025-05-29T16:29:54.643000 -CVE-2025-30399,0,0,ad02826e920f5ecbbdefc6439ea0ffdcab4febde5bc9331d1085c162f773effe,2025-06-13T02:15:23.430000 +CVE-2025-30399,0,1,ca7e4699d8f4e3386ee95cb98790ef55ef1379d2328ae98dca67e8cfe8219916,2025-06-16T12:32:18.840000 CVE-2025-3040,0,0,a1e6fbe8160fa81005d502057842330cb2ae7690c502ccb75ab1e381046694f9,2025-04-01T20:26:11.547000 CVE-2025-30400,0,0,5cc18fc6839c88849b10bd538724771ffbd9b11a0b212546a4258600699f4bf1,2025-05-16T16:26:11.040000 CVE-2025-30401,0,0,6094c4851d69a90cee16f3fcc3e38848db3a7882816e567c1d58e4520154798e,2025-04-09T18:15:45.107000 @@ -292537,7 +292538,7 @@ CVE-2025-32308,0,0,2b7bec71af2d8aeb794f4d157dfc61ad4810b98ac960b587b7920f453cf78 CVE-2025-32309,0,0,72e524edceb2da5dc017c83bf8ab60e46c6fe45eb184ab0349a1ba415921a900,2025-05-23T15:54:42.643000 CVE-2025-3231,0,0,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b16e,2025-06-05T05:15:23.977000 CVE-2025-32310,0,0,c3b2568a49d7a011e3cbc9748557e58f0519995b3a6735845f843c0d6b6482d9,2025-05-19T13:35:50.497000 -CVE-2025-3234,0,0,21bb08636d89b5f9c340274882831779318dea0cf5e7a8edbc31ace94a2f698f,2025-06-14T06:15:18.117000 +CVE-2025-3234,0,1,70e8f52beb03455c50e84ca367316ec0117a47001407b94db1600acd985ca8fa,2025-06-16T12:32:18.840000 CVE-2025-3235,0,0,bf02e56a9b2acdd9197c016e355d3cdfc496d77110cbd9f5fcadcef4a0003d66,2025-05-16T15:43:09.640000 CVE-2025-32352,0,0,14a2251916c9246fc3d185746736b75fd36a375e4aafcddd19d832e612b92a9a,2025-04-07T17:15:37.147000 CVE-2025-32354,0,0,85128147f47ebee98ae2a1737b9ec1a8829a4b5a6a4c94ca962a085780718ca4,2025-06-11T21:20:21.863000 @@ -293160,7 +293161,7 @@ CVE-2025-33093,0,0,ec1d02a559a830298071de2ada0cf3077c9399b6473555574f182d332f661 CVE-2025-3310,0,0,8c16e75b092c62b9454b4e82634dd199a69b62be650163acbcd0e90e1720c9aa,2025-05-28T17:30:50.253000 CVE-2025-33103,0,0,a67c9195cdbad04f4496fc31d29a6e2936a1a9b1b8ef9f8a2aafc31c92782dbd,2025-06-04T20:12:06.793000 CVE-2025-33104,0,0,ce493789d7031f1aa7fdbd052662901a982b8a28c0736ec1b9c5ee4d95c43743,2025-05-16T14:43:56.797000 -CVE-2025-33108,0,0,cda87bf46d006bc52233af2f93ef5a5953a99e0ab2078074985cd82ea75eab84,2025-06-14T01:15:19.800000 +CVE-2025-33108,0,1,b7b17c481e7854d216c686e2c0555f5e8a47dc8a03346b2246cc2ef576fb64be,2025-06-16T12:32:18.840000 CVE-2025-3311,0,0,e74d5ecfc9cc851d8a2375e0e95746ca34d32a4ae1bff25c4184cdeb743a156f,2025-05-28T21:08:38.403000 CVE-2025-33112,0,0,fbe29f1f149f7078871a044a5ed14a43938b4d758348625746eeccccfd89d3ab,2025-06-12T16:06:39.330000 CVE-2025-3312,0,0,d314cd0e3d98597c32289b5f3f4209f174e16c52e8e6ba2862a75de1162b07d0,2025-05-07T16:45:29.103000 @@ -293306,7 +293307,7 @@ CVE-2025-3460,0,0,a6918e85be5e4f2f6bd8b4089f3f654f6c5d78ba27d378dcd7c473c63506e9 CVE-2025-3461,0,0,b711842f3138044403b9c62c870e92a946a81dbd27b6e170abe8935ae6232ced,2025-06-09T19:15:24.923000 CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000 CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000 -CVE-2025-3464,0,0,f761b82c82eea0b93334397438eaaecbc92df6f30dac7cf49538babc36a751ec,2025-06-16T09:15:19.233000 +CVE-2025-3464,0,1,1a4754e683cbdb8fa8f1ab8975f77dde15fc617caf45cdc63a86b55e57d54699,2025-06-16T12:32:18.840000 CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000 CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000 CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000 @@ -293439,7 +293440,7 @@ CVE-2025-35996,0,0,a68f8bf3039aca0fabffa5365ae47dde1016d171f7f66e0132baceb8c4b86 CVE-2025-3600,0,0,39687de6700cb24ab4e4b1a2e787339a193916dd4e6bd5edd6e893f0c5922e67,2025-05-16T14:43:56.797000 CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000 CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000 -CVE-2025-36041,0,0,4b8233fc26a8fc5bc616826fc46bf80a37f2f77e29ca0685795e27907e6fbd84,2025-06-15T13:15:33.177000 +CVE-2025-36041,0,1,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000 CVE-2025-3605,0,0,9176bdbc7dac7692b3792270d47f63d72180fcbe4f8435ffab86ce86c23fcbca,2025-05-12T17:32:32.760000 CVE-2025-3606,0,0,9e462a995d1e7019ecb96791362c7ba0b1305419ebea53ce8f14b67c14ed347e,2025-04-29T13:52:28.490000 CVE-2025-3607,0,0,00a61937e6c72150e849325aa06a18ed35736c13546aa89382694e35fbdc7236,2025-04-29T13:52:47.470000 @@ -293476,7 +293477,7 @@ CVE-2025-3645,0,0,0ee435faf454376df90030cb558285ce09c5bf2362548451cdce76169fa98e CVE-2025-3647,0,0,244e329b2e2f861215d12a37a4534a20c9e1dcfa38a8ae958e895d6106488138,2025-04-29T13:52:28.490000 CVE-2025-3649,0,0,df5be861cb9901de2ff346df6053edd181ced31f9d06ef10ebd9788e09b37197,2025-06-05T14:27:28.437000 CVE-2025-36504,0,0,30afeffa7b8ef5e478f29856811f9be90f1ece9e22dbe373c856a36c842492cb,2025-05-08T14:39:09.683000 -CVE-2025-36506,0,0,69989fd9626548f7f644cb3a1bbfc06407f5c90c3d7332a3739d3558347d0159,2025-06-13T09:15:19.223000 +CVE-2025-36506,0,1,8e1d82c4693df84b708505ea767f870e37a12974d36fbc872c838daf3feb81a6,2025-06-16T12:32:18.840000 CVE-2025-3651,0,0,30e087cb1671b81c1bf0c1d2a4d51e77f706a32948b7aa67dbe7688506dce698,2025-04-17T20:21:48.243000 CVE-2025-36513,0,0,40997ded6ccfa9f42a498c7fa3aba63677e185863eb779042a0e6b33a18b51a9,2025-06-06T14:07:28.330000 CVE-2025-36521,0,0,76dbe5c9e005eebc45d03f4e270884a68d88e62c1e707e433be80dfc20224dd6,2025-05-02T13:52:51.693000 @@ -293484,14 +293485,14 @@ CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed4 CVE-2025-36527,0,0,020ac4647f700215df1a929fd367ca00f7a928aa1186e2cc968570239b95437f,2025-05-23T15:54:42.643000 CVE-2025-36528,0,0,1217a5aaffe1eacb82b64f8c370859a0aaa1b52ac2717414bda4f37851fb3402,2025-06-09T12:15:47.880000 CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000 -CVE-2025-36539,0,0,4f3c5cdd9828eb5d09c4b8064750766908a592775f15f3e46a045fa81ec77fb8,2025-06-12T20:15:21.250000 +CVE-2025-36539,0,1,c0894e36c5a4bf5ae06107887e6e7bc4869da6fc581815f366cc900be9ce130c,2025-06-16T12:32:18.840000 CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000 CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000 CVE-2025-36558,0,0,f7ba1efb73da33ba35418104474d3de926b1549af2f93d6130fc139c04b0fc60,2025-05-02T13:52:51.693000 CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf79d8,2025-05-19T13:35:20.460000 CVE-2025-36564,0,0,f446e566baff1cdb9604912d945d5cdc052f4905557c8c5952132ba86a364f20,2025-06-04T14:54:33.783000 CVE-2025-36572,0,0,c97f006dfc4bcc3f67f9ecbcb1cefb56f7696607fd2d0cdd339f46804df42e2c,2025-06-09T18:58:23.397000 -CVE-2025-36573,0,0,e3dcdb5f5f0097bef41e74de906574ffd7df0eed47d842865d16e8671612ff58,2025-06-12T16:15:23.003000 +CVE-2025-36573,0,1,5189e477b17a9b50f49c3d6fd04e079fea251538a817bfac7b8dab8525c01afa,2025-06-16T12:32:18.840000 CVE-2025-36574,0,0,b79ca64d677f5cae91bdd194c851077559749efd952b088ff9ce21579fa2dca8,2025-06-12T16:06:29.520000 CVE-2025-36575,0,0,087f9e446c753de5761a6025b74618344dcea76c4006ac1dbeff06909cea827f,2025-06-12T16:06:29.520000 CVE-2025-36576,0,0,091c1641566ecc9c081054fab224979774e3cdf4f5b4b33146ca24c74b389247,2025-06-12T16:06:29.520000 @@ -293503,8 +293504,8 @@ CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b04 CVE-2025-3662,0,0,3e1dd0745f4aafb27713ee2b3d9daccf1be19770e4b95d3787e2f2ca8d2c3c07,2025-06-05T14:09:58.017000 CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000 CVE-2025-3663,0,0,8e1f6f32c25b3b8d1ec3b3a3f1e13e7a7d56fd1e7c8e37fb37a5c673e5d21e5b,2025-05-12T19:50:03.073000 -CVE-2025-36631,0,0,8e43299b1a01b44d6c1d55f857781480094134c0c9d979f60d21984f36707970,2025-06-13T15:15:19.627000 -CVE-2025-36633,0,0,d18a02d0f0f971ff43946df3f6f567c8e2d6332a29da376569706a2a73786c3c,2025-06-13T15:15:20.183000 +CVE-2025-36631,0,1,16d24f89b2715bbe72902ef848b4bb9e6899f52afe3e0ef0ad487e9309b1f810,2025-06-16T12:32:18.840000 +CVE-2025-36633,0,1,49caaf222a5dd508b56e91aea63bfb7fe4f3928b3f442f700338703fe6471b50,2025-06-16T12:32:18.840000 CVE-2025-3664,0,0,8622093c787fd6e9e1b160486bb91e2aaa36ebec298b1306944080b7ed6d8600,2025-04-22T16:53:30.190000 CVE-2025-3665,0,0,78418ed087f4c6d368331a8d9052902c502665982824123068b1a33cdb306774,2025-04-22T16:54:19.520000 CVE-2025-3666,0,0,dfe48caac00032cb0762e3ed3443fb6db6489e0b4c74cf8f9509f4e75c167ddb,2025-05-12T19:49:52.043000 @@ -294006,7 +294007,7 @@ CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee CVE-2025-3921,0,0,9797fba579692252283cd90745f54a1a6a5a7131fc66f684fa524a93339f9b2c,2025-05-07T14:13:20.483000 CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000 CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000 -CVE-2025-39240,0,0,e32222d46118bd57dc0b3cb703bfb06292ed66c3cc62500736425aa4c02ce35f,2025-06-13T08:15:19.377000 +CVE-2025-39240,0,1,be458de6ec89c952ea651d2b3d5e8d16b4a85d2b671af57a81ccbad3734ae7c9,2025-06-16T12:32:18.840000 CVE-2025-3925,0,0,a768d137ba057feede97294fe198f51837b892f84c1c07da5c135848de68ae8c,2025-05-08T14:39:09.683000 CVE-2025-3927,0,0,8e887169e2b89290db9113fa0a8d0ac70dc89b409e16089658a987265ba9ed66,2025-05-12T16:15:24.823000 CVE-2025-3928,0,0,b8f573bcf4c9f6295f3b239508ff59d7f2be020729128e557b8061ff337a956f,2025-05-28T20:51:43.700000 @@ -294450,10 +294451,10 @@ CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000 CVE-2025-4071,0,0,68547b4133937980d039f29a0abcfa60e8d56aeeed72b73dfe6880158fc5f6a5,2025-05-09T13:51:10.523000 CVE-2025-4072,0,0,d0cf8b7d2285b873c553b1cc40373ece79b00a96b5dd7782b5277899efb2c1fa,2025-05-09T13:51:19.130000 -CVE-2025-40726,0,0,1af41231384f6012aa660a6b373a378c828e9aa5b462b91f2ba4a3ed87c37abf,2025-06-16T09:15:19.427000 -CVE-2025-40727,0,0,667d0fac5d54ea5f12a9fe24fa479f6d4ec4f4b9185a88f1e1a0a20a286abf68,2025-06-16T09:15:19.587000 -CVE-2025-40728,0,0,29460beadecfc1574da29cb5197853ba6bce1dc9e59afa3f271b244b5bd94337,2025-06-16T09:15:19.733000 -CVE-2025-40729,0,0,528214f9324db9bf5c792911946cf1201b36e8ae55ed53e8fe291198902d9f87,2025-06-16T09:15:19.873000 +CVE-2025-40726,0,1,06973151ee6645a9d84113341fb6a06b6153e8d65c35cf71d204b0fa7561f372,2025-06-16T12:32:18.840000 +CVE-2025-40727,0,1,2df5ca63ef8e4109dd8647b45a130fc57acc0369c9ce97676942524e407d7e38,2025-06-16T12:32:18.840000 +CVE-2025-40728,0,1,bdb76fd49b6306a75f42baf3d308e3134ca65ae5d1359edce01c72fe50aa6cd7,2025-06-16T12:32:18.840000 +CVE-2025-40729,0,1,cdcc0488c7e62a2d0d4e1dec1450866396d878da5f5f173d17e13df908288a60,2025-06-16T12:32:18.840000 CVE-2025-4073,0,0,5b07f84aef869ff97a5846e761decacb25d1866933f52ae6973131cfce282ea0,2025-05-09T13:51:33.337000 CVE-2025-4074,0,0,67c949a36ba05d695588494a1af59c90dcd6f218e799b578e62cc10508e92154,2025-05-09T13:49:25.337000 CVE-2025-4075,0,0,980439803ac2a564a1211ca7907d1f8cd24fb9992986c85d77b9d15e9738b3a9,2025-05-02T13:53:40.163000 @@ -294483,7 +294484,7 @@ CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b CVE-2025-40912,0,0,9ba3f2cd315b774e22eefeae7f50556e7e21969b27b3e56a0182e075b776e0e8,2025-06-12T16:06:20.180000 CVE-2025-40914,0,0,d97f0218886a2196b25d92bce59ddded5460306f920589ecc2b10f196fdbc150,2025-06-12T16:06:20.180000 CVE-2025-40915,0,0,7617e1cfd1c49592d1bfc64c026613af6afc23761ab7c676ffac796004de7683,2025-06-12T16:06:20.180000 -CVE-2025-40916,1,1,ae374f655d86021346f632c3958642baeefbff9699c0d8874572fb9af7e9c062,2025-06-16T11:15:17.793000 +CVE-2025-40916,0,1,182039d3058d4a113198085b3945da38e66324ac2c90142d7a80905f458daf97,2025-06-16T12:32:18.840000 CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000 CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000 CVE-2025-4094,0,0,9389e1771cac6e6188e563be99dd04161be542f25f3d0fbc50799f1a765f05af,2025-06-09T20:13:20.070000 @@ -294521,8 +294522,8 @@ CVE-2025-4123,0,0,b273a1b485cb3feb197a6a9855fd98a99a47d7d21e024b2df7154800bc33c4 CVE-2025-41230,0,0,0c25a26a651e10ec85f6e769a1a9cc82bb8d12716df24840e46d82d1d274c1bc,2025-05-21T20:25:16.407000 CVE-2025-41231,0,0,e30b6f8b7576282583867252dd43d1bf6e7ecb42918ca5f72a9a1aca432764d0,2025-06-12T16:22:47.783000 CVE-2025-41232,0,0,517310e679218fd1f22e7e0fd08cf56e44290e9febf8e46b848de21769620f54,2025-05-21T20:24:58.133000 -CVE-2025-41233,0,0,d9bb85af1fcc644db83a9773172727085a30ddb67f38a48248ddda24519b4e32,2025-06-12T22:15:20.560000 -CVE-2025-41234,0,0,ae5d53718d410931cafd2f8fc1d5b805edee97e9c75d0f8643705f16d1a0d9a0,2025-06-12T22:15:21.090000 +CVE-2025-41233,0,1,f1f60c857f379f4a8f2aac364fe13f246447df5ef3989e0f3530d4ddca64604b,2025-06-16T12:32:18.840000 +CVE-2025-41234,0,1,bb572dbce1b43c89d5def5eaa839991a1c2f9f88699e8591ac93b3ce7a270259,2025-06-16T12:32:18.840000 CVE-2025-41235,0,0,d4d8945eb1b378e0ed66f8c1428c86eda4f61188221c7cba9d8ecf68b09b94fa,2025-05-30T16:31:03.107000 CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000 CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000 @@ -294626,7 +294627,7 @@ CVE-2025-4183,0,0,5e71026142945439a9594d0439f27ca7101a23d30fb9cd157d68469b5c04af CVE-2025-4184,0,0,231752f9dd81f3c878686a35cd086680fc85706af1d3abe68105ebbbb14f6dc9,2025-05-16T15:04:17.993000 CVE-2025-4185,0,0,8aa6367e503165449fe24feb0fb59a420bcc6751f196b6bccc99b251140bb4f4,2025-05-02T13:52:51.693000 CVE-2025-4186,0,0,dab70a09e90dae7c54c24591d73076ac14325c30ca1a211bf9896872e7af04dd,2025-05-02T13:52:51.693000 -CVE-2025-4187,0,0,ce037a46c10aba3526ee6daf50f83f56cb9244a49cc0b22533e0b440995f23dd,2025-06-14T09:15:22.050000 +CVE-2025-4187,0,1,4039fe7193873d81939f3c8a1274dbeae60830727d665d894d1af47db84a5e7c,2025-06-16T12:32:18.840000 CVE-2025-4188,0,0,dae4661d96faab4b86b2442932d3ed4a7d5e86b7964e0bf5b5ad937c7ef62825,2025-05-05T20:54:19.760000 CVE-2025-4189,0,0,a0e2a19d22d932ca0e26b1ac038e49b5f17b80b816561f13c2c6e3219b687b6c,2025-05-19T13:35:20.460000 CVE-2025-4190,0,0,53943bc80284ba750997ed519958820d606a7c8de596edfb3fb17f09fd02f946,2025-06-12T16:29:51.860000 @@ -294639,7 +294640,7 @@ CVE-2025-4196,0,0,b26d9e2fad715e7681143157d22f4891b95826ce8e53977c9ecced30c124cc CVE-2025-4197,0,0,ed8ec740b973b92253a741cf6d5d0ac209bbd44763ac57f0fdc0af84aaf28e3c,2025-05-28T16:02:23.317000 CVE-2025-4198,0,0,e5602874b7c5cc6f9012651f4a60dc8d2e789373501ddfec072de22c80a74167,2025-05-05T20:54:19.760000 CVE-2025-4199,0,0,553c17b65a2b6efd623dda6e1567d529495701f64dcb6b078b725c7f2893112f,2025-05-05T20:54:19.760000 -CVE-2025-4200,0,0,d1eb458066ff194c551bd28cb423b888c6b3da3a20b5073a64d5d3c2e910a54e,2025-06-14T09:15:22.990000 +CVE-2025-4200,0,1,5df57a024b1b274b879c7aec391d3157337b17929494c4f283430051505bce0a,2025-06-16T12:32:18.840000 CVE-2025-4204,0,0,2e611705c020858b2144a419577c11b9e07bf754b3f98b6b3360986c5bc7b1b4,2025-06-04T22:39:20.750000 CVE-2025-4205,0,0,e5c422efa7296a5f9776daa32028189294bed6a05affab60f37bd65665314bf9,2025-06-04T14:54:33.783000 CVE-2025-4206,0,0,bb3cb9f07bfc9d08a2c0843d010f353ba8ba2d3caafa1bbc30e33b9667f14930,2025-05-12T17:32:32.760000 @@ -294651,7 +294652,7 @@ CVE-2025-4211,0,0,404e0b904354aed3b5baa7e207d5cfca573f55dcef658a41b4b3c736c556ad CVE-2025-4213,0,0,ebe18be5ee5e37fbd0ec843f8652f96ea5e7e69c1b8a34e3e1bad241a91a7771,2025-05-28T20:56:16.840000 CVE-2025-4214,0,0,1d60003a6cdf25de6477c856dc27cfd829a89b1b822b87cc832b4debc042c00e,2025-05-28T21:09:07.673000 CVE-2025-4215,0,0,13f69b38d2b1e302bff37f8893b3cf84efb228fa376f3a79933e482ce0a6fcf9,2025-06-12T01:15:26.443000 -CVE-2025-4216,0,0,14d5b84f03ced42de418c7125238b4220bfdf07d15ec7876ca59d9e333846a1f,2025-06-14T09:15:23.160000 +CVE-2025-4216,0,1,7eb365d911e363692a256ed2ff09b39562549cbfdc8b1161fd87e44864143e38,2025-06-16T12:32:18.840000 CVE-2025-4217,0,0,62c15aedce5780b22253f9cbd9800a9e9b8ad351bc24efee5e47483ed5db566c,2025-05-21T20:24:58.133000 CVE-2025-4218,0,0,24dafb9f25b27632257205877032b71f77bf5a78f6ac8f03574a5a3949342dbe,2025-05-05T20:54:19.760000 CVE-2025-4219,0,0,1dbb3268c116fdb31206945d2c84e6a62b85afd7dbbb78abb2fd21bb825a5ad4,2025-05-21T20:24:58.133000 @@ -294661,13 +294662,13 @@ CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208b CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000 CVE-2025-4224,0,0,1207737d79a1e90fb6c077a6a1097540732fecbc5b6d096024f04eb01ab32d8d,2025-06-04T14:54:33.783000 CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000 -CVE-2025-4227,0,0,20dc8bc32a3cb0aad1b2c42ccec539750417d5ea0d686628c7788ac334bd05cb,2025-06-13T06:15:22.253000 -CVE-2025-4228,0,0,d411128523f1d483fe4eef428fab984b93eb02e877062054648d192842fd0960,2025-06-13T00:15:23.233000 -CVE-2025-4229,0,0,580b61236e8ae5d32a8a79e9f788dcfd6f65982dd02c17770fd54a540311e548,2025-06-13T06:15:22.490000 -CVE-2025-4230,0,0,100e394e88345b2567631e0da4aa46dd823c68875ef99f4162d8a6f690951f91,2025-06-13T00:15:23.380000 -CVE-2025-4231,0,0,7b6a4d18d02ee7910821570a7e53c84cc7fac73e6c20772dec150da5760296c7,2025-06-13T00:15:23.533000 -CVE-2025-4232,0,0,ead805574c874a3516293b59ca72e9d551a9f90bee7c79eb729e9024f61e65a7,2025-06-13T00:15:23.697000 -CVE-2025-4233,0,0,e977120273ef4923b2040bb4356766feb65452d59b0f3b9eaa05444dfc9338f0,2025-06-12T23:15:21.983000 +CVE-2025-4227,0,1,ea1742b41c984d4256b891f5a0a89c911048ac6da225cc090ad7f443f7b97afc,2025-06-16T12:32:18.840000 +CVE-2025-4228,0,1,90c02a591037aa40f9ece4eb659ecae52c5a691b8f4e48310cb273be7c3aa6f3,2025-06-16T12:32:18.840000 +CVE-2025-4229,0,1,3bd92ad8c64429307b7c6c36e06712a2c67022ff6d91c7998dc375c0c4c1388a,2025-06-16T12:32:18.840000 +CVE-2025-4230,0,1,330f57a6b301dc0a43ed84235888c62032b00c01ef28ec1510f32bcba6cabfec,2025-06-16T12:32:18.840000 +CVE-2025-4231,0,1,ae70aeb69774d4aea1837e88f50377238e2d6835a41e3ff8fdf68cca64de2171,2025-06-16T12:32:18.840000 +CVE-2025-4232,0,1,ad6f93a9f12c055931e32a7b79931e31c41dc64f7d3d044b29567155ded9ca18,2025-06-16T12:32:18.840000 +CVE-2025-4233,0,1,261f5ee076c2b7aa87ec5405182d9289e244da6be5aae3a4af764564fe747d4e,2025-06-16T12:32:18.840000 CVE-2025-4236,0,0,4a998b3d009e2e5b8d6c745dec0a05483fadfb16e9111b778387c6694f340a68,2025-05-16T15:04:03.170000 CVE-2025-4237,0,0,6e9102316b2d9622f5dbc1640c375fa9a5bfea77a1257bb79b559d426c098991,2025-05-16T15:03:54.820000 CVE-2025-4238,0,0,4c32d3f4362fe39e2d2da40a1702743e497b428c81eff7b7cd5a815f44e86b4b,2025-05-16T17:31:59.303000 @@ -294919,10 +294920,10 @@ CVE-2025-43859,0,0,c268757fafab0c13d3486ce5b27294fdd0d474d0726ed511b05c2e2ac9644 CVE-2025-43860,0,0,06c098a654602ebfadc316ca107c777a317a5d0428eece47feec6b2993a98b12,2025-05-28T14:58:52.920000 CVE-2025-43861,0,0,cc812f35df5ffcb8f443a4d7ada84bcfa5f243dfadf66db64d9528b5b03317e3,2025-04-29T13:52:28.490000 CVE-2025-43862,0,0,2069c29142377e87b6ac6717f988918c57aef9b91da36da9422600c6b1db6517,2025-04-29T13:52:28.490000 -CVE-2025-43863,0,0,b82047921ac600f19a9b6fe09ffd78ad5e07e30df5a614710a4c404f6de2ebd3,2025-06-12T18:15:20.533000 +CVE-2025-43863,0,1,fe1caf6547446b0008f47d71f63ca1e31de09525d1e3bdfe8deab59a74a5c024,2025-06-16T12:32:18.840000 CVE-2025-43864,0,0,4a74404ae1412d4adedf36bca3c18b62d4e73dc491c1dfc2b32ce26efe001d3b,2025-04-29T13:52:28.490000 CVE-2025-43865,0,0,c649a0f837f30d7ca72312925d2a9794983503f9ad275427cd38dd25847f7ed8,2025-04-29T13:52:28.490000 -CVE-2025-43866,0,0,fccf568740d6dc221e6f0a89bdf6527b0f4f9da4f35bdf83c6361fe5c65eeddd,2025-06-12T18:15:20.713000 +CVE-2025-43866,0,1,6792588ed0c68c54098e9b079ba8cad7ac57b1c21c789a29149941232d665928,2025-06-16T12:32:18.840000 CVE-2025-4387,0,0,da873d7541e8041438d0f9f1577bf8e7d71bdefdbc1e031dc470a87dd3a9066a,2025-06-12T16:06:39.330000 CVE-2025-43878,0,0,35cf7c07b8b80c3378b7e206d0f6773b587f978a8b7a7526ac0a236c37d60b0d,2025-05-08T14:39:09.683000 CVE-2025-4388,0,0,97a1b6eacb96a5a89fd1b724cb794d70ee55608bc796c2eb710dc788294d8025,2025-05-07T14:13:20.483000 @@ -294974,7 +294975,7 @@ CVE-2025-43970,0,0,f67991a480b9ef20dfd1f92436adeae550d841e0b40b6fc19bb37e7b3cf3e CVE-2025-43971,0,0,d072da6ecab482543aa3b76724b33ab42a4a64e3dfe02ff081e0fcf7138810bc,2025-05-08T15:57:42.560000 CVE-2025-43972,0,0,40f2ac4be8230a14a8030096569d3c1634ea44d67dbcccca5aa7595a9619e263,2025-05-08T15:54:12.550000 CVE-2025-43973,0,0,32c4f09c073362408fce0884940e206544b9edae347f2de4c62abc52971c9931,2025-05-08T15:57:33.523000 -CVE-2025-44019,0,0,763eaecbb2d20549b38343d8989f85fdcbc3d6e77b57baf2fc5bbe07efb76ac7,2025-06-12T20:15:21.420000 +CVE-2025-44019,0,1,131da495fc7815c50b33f84bd837803f3be8511c0af382e195da0aec6a02cbb1,2025-06-16T12:32:18.840000 CVE-2025-44021,0,0,529ce682bafef192b43df86c6cfad04b82ac72fa42409707c760de232ab0d56a,2025-05-12T17:32:52.810000 CVE-2025-44022,0,0,4b59e3d7e5623550ea78b3a6195c70b7bb91b2a1cca50edaa9a8460e8a830389,2025-05-12T22:15:25.883000 CVE-2025-44023,0,0,dd8462de68aec0eefae4f74877d4a0096c0b0b7c788a64dabe51a09973639f59,2025-05-12T19:15:49.453000 @@ -294991,7 +294992,7 @@ CVE-2025-44073,0,0,682d7dbf7db857e708c67e0917ba715c71ef5bc25a4925c433f4eaf10db8c CVE-2025-44074,0,0,a07abf1517695aa7f067711dbd8501cec1c1dac19368b70ce83f8cc0a4c96967,2025-05-13T20:05:29.563000 CVE-2025-44083,0,0,9046793f34bd6f929b6235055941a80a823b0cd56db66235de77c34aa9f0f37d,2025-06-03T13:52:39.333000 CVE-2025-44084,0,0,9e514baa1a1b4ecd455bdc468a519f4662e489440f358688b169a12eb8124052,2025-05-30T16:19:21.193000 -CVE-2025-44091,0,0,d8cf7f956cd5564dd70feef953c0451bcabcf253729ed155e4e3cb48c2fc6640,2025-06-13T16:15:25.863000 +CVE-2025-44091,0,1,237168ddc7dfdeaa106d407c0241e4f297fecae289a2ab16ef8a14cdf6729891,2025-06-16T12:32:18.840000 CVE-2025-44108,0,0,7f74cb8563a8e2b89a17733e62268b2a8dcb711594c4c578db48bdedf50f42d6,2025-06-12T16:26:10.203000 CVE-2025-44110,0,0,40655c12d535de96e9af0530c97aab6193addb0ec4d9bc7565ff96634b123dda,2025-06-12T13:56:06.197000 CVE-2025-44115,0,0,f4048a768a9c3bfb169ae566f384c1b85dd60f51eddb9136d8a89bd9c2a57faa,2025-06-13T17:21:25.870000 @@ -295001,11 +295002,11 @@ CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034c CVE-2025-44148,0,0,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000 CVE-2025-4415,0,0,14ae76cc14cb7c5f3c4c963406f20e07ac9834ebdb3d6a3c4d84f73bfd11e915,2025-05-21T20:24:58.133000 CVE-2025-4416,0,0,a5c38ae8bb1fb36b46a6d4b035c3955bb8e9a586409097b52f155ce641ec588f,2025-05-21T20:24:58.133000 -CVE-2025-4417,0,0,c5c9640457902bf2e98e35e7bbf220c25788f73e22b1bdc6b158ef1b40cad3fe,2025-06-12T20:15:21.760000 +CVE-2025-4417,0,1,bc62e46078e8192920dbaf1b9b76f02565222568b177611f95eaef56f98ccc29,2025-06-16T12:32:18.840000 CVE-2025-44172,0,0,c78f9d9932a5093f6fd2dd92edb0ece1c73f28734d84b3772f8246b249ade2e9,2025-06-03T15:55:33.757000 CVE-2025-44175,0,0,5b6789f40968dc5ea2171c87d80e31a88f2e561b1b44c9c7141157b74ccbf57c,2025-06-13T13:39:01.420000 CVE-2025-44176,0,0,06ea95c07747d5a57bc4a45bf66b04996fa2438a7e4362161ea04e3f0c60e03f,2025-05-23T19:00:51.080000 -CVE-2025-4418,0,0,c4abd6c24d87bc3f1c9afe8f1695287fe14e6ecfd6e36fe3ebbf7ca312a6edb4,2025-06-12T20:15:21.943000 +CVE-2025-4418,0,1,7ad11ce7e12dde189a38ecb7533ed3910f1259e5656f64e80cbd2c1f90de96d0,2025-06-16T12:32:18.840000 CVE-2025-44180,0,0,cbbf280e22b3f1eceb8396c23851cf21862b54048f76231b82a81c5cae091205,2025-05-28T14:30:23.873000 CVE-2025-44181,0,0,7180db5bc811900f16b599b873110902a2263f80542ba16bca982bc25ddffabb,2025-05-28T14:30:17.723000 CVE-2025-44182,0,0,9f8c8ec46a6ee014bc97ba788d8720ca189ab80738978c6ff8d3905af6860079,2025-05-28T14:30:11.210000 @@ -295286,7 +295287,7 @@ CVE-2025-45819,0,0,953b124c0c056469f51ea2a8b8f4e09e6e367937c93f3e446a0df225a726d CVE-2025-45820,0,0,5a02d95c4e6e53665839219a1f57cead02b96e98d2f8e46b54e65914188e5ea3,2025-05-12T19:15:50.940000 CVE-2025-4583,0,0,d033db5d8e1445724b5ad15f6035fe34ad2e9550c6dccd9e6ec8dd9370a2da58,2025-05-29T14:29:50.247000 CVE-2025-45835,0,0,aa39dd65f685fbe279d7b03e35d1c2268d64deb3fa0d9f011aa8b0e874feb904,2025-05-12T22:15:26.343000 -CVE-2025-4584,0,0,9d91c72cffbf2e2e67121cf5010e99fe85f9647f5b2334baa5b3e517792c3c9e,2025-06-13T03:15:51.420000 +CVE-2025-4584,0,1,055dc7035216f25c03718b03fe2cc3f7d846d1fcd747497a885986604b8713dc,2025-06-16T12:32:18.840000 CVE-2025-45841,0,0,a1ad10acce18019e8f9e2d58501f2514612506a6c92af5fc61456a359336ccd9,2025-05-16T15:39:52.967000 CVE-2025-45842,0,0,e0887fa7ced0e29e63bdfffa8e454d99c4076790ed2b6862ad082a0b9a6b7794,2025-05-16T15:39:45.950000 CVE-2025-45843,0,0,3282e5019c19a05d118b0236de88ec2249512753a06f93350d9c8067baf42f54,2025-05-16T15:39:40.383000 @@ -295294,13 +295295,13 @@ CVE-2025-45844,0,0,170e4458f6e69c5733a6ca0576787120453cf06374da04006dfb1f43b2021 CVE-2025-45845,0,0,93cb9b992f3083f016f98f51918ecbc05e2ba26a62766c25f0e76aaacb981d93,2025-05-16T15:39:26.913000 CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b231,2025-06-02T17:27:55.547000 CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000 -CVE-2025-4585,0,0,86e0c0c769d93e7478cc82a9c8637bbe660d600eb9665e7783b0856e0c09280f,2025-06-13T03:15:51.583000 +CVE-2025-4585,0,1,de0ef46eb68a7bfcdbe12487f0dad42760c4b1425908d33a0156dee60d09c3e8,2025-06-16T12:32:18.840000 CVE-2025-45854,0,0,8da6ea0519a831e65c7cd6df3945ca62dff794f0b2efeba768b2f0909531788a,2025-06-09T15:14:23.153000 CVE-2025-45855,0,0,93e6e50c29da0330b6825dbc4712cfa68cc989f69981bc9eb7685e5938173fae,2025-06-04T14:54:33.783000 CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000 CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000 CVE-2025-45859,0,0,eaeb56381568c1bdb53444381cc306b701dbf7e3d88fc42d524ff4eaa0498bc6,2025-05-14T15:15:59.213000 -CVE-2025-4586,0,0,2c023c599062f3aa7f7ca5d7c0bbe6e4e75c119a53826a8a155dc27031998d45,2025-06-13T03:15:51.710000 +CVE-2025-4586,0,1,e8b31fc152908f16b8b6654234fdf078c1494ce854b4f8e7bd2902844238541d,2025-06-16T12:32:18.840000 CVE-2025-45861,0,0,ca43b3b51f91c42f84defb7b9023a1c2a4a90b1c4ddeaeb822450a71e30fe65e,2025-05-15T18:37:49.147000 CVE-2025-45862,0,0,2ba0d25b1db89dc5d04c0d4bbff6c6d36946ee2d648dd05d2e7744bd4b723774,2025-05-24T00:53:31.157000 CVE-2025-45863,0,0,c788551ea4dd04d6ffbc4bd80ef3ae73dfe6ef10fb23b8a34b591b8b31d230d9,2025-05-23T18:55:24.013000 @@ -295313,7 +295314,7 @@ CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550 CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000 CVE-2025-4590,0,0,1338bc68ec3d6917d4ad238b5739bcbca3832b2475d3a347918656638fb549e4,2025-06-02T17:32:17.397000 CVE-2025-4591,0,0,09b633064167908f2267d3dc13a3052b782cbd19249bba4734b3313b4950008b,2025-05-16T14:43:26.160000 -CVE-2025-4592,0,0,5c44f633f2012fc99846b6d9b62b801788e1f40df004901317364e90d81d1144,2025-06-14T09:15:23.333000 +CVE-2025-4592,0,1,5d60bfef7beec0930ab89b7223857faa5fedaa5c280d844c7ee57c05bd2708bf,2025-06-16T12:32:18.840000 CVE-2025-4594,0,0,c0d148a004f59cf53abe31af001741cb43bc8a881d1fbd6674a881b7467848f2,2025-05-23T15:54:42.643000 CVE-2025-45947,0,0,359c9dbf14e503988017d67aa788a499a7ac3bca9ffc4dc379e7011548317f85,2025-04-30T18:59:47.113000 CVE-2025-45949,0,0,2cec517c1301a76b89b8ccefb135dc95210f8464628904a6679478252432eda9,2025-04-30T18:03:41.357000 @@ -295322,27 +295323,27 @@ CVE-2025-45953,0,0,4ae22ace1fa79622bebb714ee3a1b2bc44139600b15fc188f0269a639daf2 CVE-2025-45956,0,0,5c4c4370cebea5362e52ff80785ad75271a9ace1cfcc698a1fc7b6e2a3193f1f,2025-05-14T21:01:22.690000 CVE-2025-4597,0,0,dcada8bd747b5d8fe51a3029b8ca767324f59d50104363211751e3771511674b,2025-05-30T16:31:03.107000 CVE-2025-4598,0,0,0afb48f5d4beb8ba717edab0a2c1dbaaa02bcad15f4563ef46c0692744ec8051,2025-06-05T07:15:23.047000 -CVE-2025-45984,0,0,6b171784ee058d3e6808993969caed8226d4084a473bdfcb9f43fe773ed829f1,2025-06-13T15:15:20.423000 -CVE-2025-45985,0,0,8191aa43d73b19341a3f474123257e698140b7587a971313b35ab7996615e104,2025-06-13T15:15:20.580000 -CVE-2025-45986,0,0,bc063efdc5ad4cf314751c0d7053687531377bc8a0a36aa7aa9cf55ff009e950,2025-06-13T15:15:20.747000 -CVE-2025-45987,0,0,187f26ea2f3d7d1fa7ff833a4e9cda040ffd02f12136eabf150be87fb851c4df,2025-06-13T15:15:20.947000 -CVE-2025-45988,0,0,4401707d0ef8179814241362ac92378693bd31c525f3d07512b13045864312ec,2025-06-13T15:15:21.097000 +CVE-2025-45984,0,1,76bc74ab22d617d802eeeaa6a5df4eb39ba924ea8a0c01ace0fad4ea93a0970d,2025-06-16T12:32:18.840000 +CVE-2025-45985,0,1,2db6e9d7c10ac55c3d9c85c2433df151cd8a99c0d20919fae1307026b5d02a80,2025-06-16T12:32:18.840000 +CVE-2025-45986,0,1,adaed4195270b5948c36fa0842d784da65a688f99280ef337ff1ba1f3ff74cb8,2025-06-16T12:32:18.840000 +CVE-2025-45987,0,1,e38cc8de3aa23b536a1db676732170c8b90bfe68219bfda66b32524bcef25d9e,2025-06-16T12:32:18.840000 +CVE-2025-45988,0,1,370747eb6488d6ebbd7b237d61d394b177ce610074c07fcb51d7ded438599599,2025-06-16T12:32:18.840000 CVE-2025-45997,0,0,6427fb401720f5a1ec9f9ddb9a7287b863d0733096e213df5c6d6f0eb039c3d2,2025-06-09T18:53:36.927000 CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000 CVE-2025-4601,0,0,420ee2c846cf84b8070c3dfb7dddc6fbabb1090be5e1b7c4bf957aa0ce301eee,2025-06-12T16:06:39.330000 CVE-2025-46011,0,0,c1776a78cb3800147b82714f56c78717ef81a5a9688b212486314b16953839ea,2025-06-09T21:15:46.517000 CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000 CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000 -CVE-2025-46035,0,0,ab8734f480828874679768451f52ee02a4ef2b1afdc3749422310bde2fa0fc27,2025-06-12T16:15:23.167000 +CVE-2025-46035,0,1,cd8c79ccbfbdca8f1a9286c0b643323341138b97ca43e270a82958e49bbeadf8,2025-06-16T12:32:18.840000 CVE-2025-46041,0,0,c6bcad8ca808cadc98009ed4cb5205d0538a9f9c0167900e290e14b436daaaa1,2025-06-12T16:06:47.857000 CVE-2025-4605,0,0,dd03f785e2fc8613696d02a4b9a63d6872b22992f27cd122b6503ea0ee189f65,2025-06-12T16:06:20.180000 CVE-2025-46052,0,0,3024fe589e39f7170008b5c168c5578a4d86fe26344910133fdba56a4c51eb38,2025-06-12T13:19:06.093000 CVE-2025-46053,0,0,cc1dee8d73635536f4f2cef7e3661b210bf2aa73e288776021aac13839576374,2025-06-12T13:12:25.303000 -CVE-2025-46060,0,0,4320533b89a2cc7bf2c8001b52d89389eaf59630bfc6e46bd9466bcd404d4934,2025-06-13T16:15:26.030000 +CVE-2025-46060,0,1,48ef69b1d8d37d2a84f36a3a0d1fdb628d572873adc3a12ec44658a347e3d8d4,2025-06-16T12:32:18.840000 CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000 CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000 CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000 -CVE-2025-46096,0,0,81b4884face5e9f6263565f69b82a6c4c962e188f23086cd58a40a64c50976a9,2025-06-13T16:15:26.193000 +CVE-2025-46096,0,1,f8a56185e328468f82d9a858e3d92bbc3a0958e55db06a59a46899fc2f5229fb,2025-06-16T12:32:18.840000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000 @@ -295659,7 +295660,7 @@ CVE-2025-46656,0,0,88d2e959cac4cda5103c704a18b5a278dfdfbb63d41e023dbd311e14a8416 CVE-2025-46657,0,0,4b6d658b20503b01465fb89f1f4e404ee10732b42838e3f3a51606289348610b,2025-05-12T19:07:34.390000 CVE-2025-4666,0,0,06efc2a6f7aa23154d79ec0033eee1a4dc8e5e4c0dc18c9dfb8f84a56b8f61a1,2025-06-12T16:06:20.180000 CVE-2025-46661,0,0,7cead739e8fdbba0910b220a6a991cddda4fef2ad210bf90609b23607a61811c,2025-05-12T19:30:05.340000 -CVE-2025-4667,0,0,5518358a17bd9b2ab6bdd252fc3af44a2e80f7273fb6098ee5a34853f17e7603,2025-06-14T10:15:18.853000 +CVE-2025-4667,0,1,cbf00b0b38b33334077e7b11f2821cd586ee3cba462be49a1dc5de44e10adb22,2025-06-16T12:32:18.840000 CVE-2025-46672,0,0,709afab665ee0752391e30a79a351f5c75745da06d0812adb7adf96e8ee837e0,2025-05-29T15:48:16.540000 CVE-2025-46673,0,0,d9f236b7d4dcd48ec96327716bded636b95944fd7cc42e606d5697ba15c5f0c8,2025-05-29T14:02:33.393000 CVE-2025-46674,0,0,8465e84979e06c9a2535077f19bb1f5777bc76163e52345034a1eab99086e4e9,2025-05-29T14:02:03.690000 @@ -295673,6 +295674,7 @@ CVE-2025-46690,0,0,973a37c2db031d79f10319288b5777f494d38cd710bbcf14cf819512ce030 CVE-2025-4670,0,0,b10edf3b6f71bdf8699eb65a94c6cf4caaaea0ef9ffd3b5514b32f41c78e11d6,2025-05-29T14:29:50.247000 CVE-2025-46701,0,0,deda192404567412c4b0078d632358a2acbdb043d7c4dcfd46aed0b54a6719a4,2025-05-30T16:31:03.107000 CVE-2025-4671,0,0,6a90a1a21db3f0dd064a3ae6cf47d91b222f79983dd36d1d7a9509d95c189f20,2025-06-04T14:54:33.783000 +CVE-2025-46710,1,1,2fb5f0f18c1d58b0e7908de589aa9d1ee0501519106f7ec1b2d05eb1b4abf2c0,2025-06-16T12:32:18.840000 CVE-2025-46712,0,0,0c073dcafa656dd770ca6df4993eba5d01868e4680b3acd34dd6f33ce4c7aa2a,2025-05-12T17:32:52.810000 CVE-2025-46713,0,0,52b5f47481eed81cdfa77d7fdf7e1eb397e2770a52108ac1a8158bbb54118740,2025-05-23T15:55:02.040000 CVE-2025-46714,0,0,0a41c2a9ca714c22e2b0866438762cfc18c811db79b3df98db455c7fc3a6108b,2025-05-23T15:55:02.040000 @@ -295729,7 +295731,7 @@ CVE-2025-4678,0,0,fbec2b4fac1b4284d4d6bf7d8d38e21016c41ff107ed2c39fcea77d9e718a0 CVE-2025-46780,0,0,5993d506455854cf118c6763aa0e87cfcb5c499499a4d09b9c1fb1cc0884d3f3,2025-04-30T03:15:19.307000 CVE-2025-46781,0,0,e7fe47a74e2ae94a42cb82d6842951a5dd9286ffd4d5d353415d63928d0e29b9,2025-04-30T03:15:19.367000 CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d46e,2025-04-30T03:15:19.430000 -CVE-2025-46783,0,0,5948c4d83c1364b483bcc63c52e700cd9e7d64006f2c7b3f547e0417767545f1,2025-06-13T09:15:19.620000 +CVE-2025-46783,0,1,8900d304e711a603ae98ae005db090006adc0e747b10f0d6548779ad58587cee,2025-06-16T12:32:18.840000 CVE-2025-46785,0,0,37929d48b75dcb8104d52e2202c99878d7f4f635a8670bbd0e6f5af54cd711d3,2025-05-16T14:43:56.797000 CVE-2025-46786,0,0,65c9b4d28548a814ac9da85c56a6b20b3ea8dfdc3f7521c8b14e0368cd0ae6bc,2025-05-16T14:43:56.797000 CVE-2025-4679,0,0,bd384669d27df6a466ec06c3f367687ccacf0536beef14e450b7ad3bf52b421e,2025-05-30T16:59:38.433000 @@ -296158,7 +296160,7 @@ CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375 CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000 CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000 CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000 -CVE-2025-4748,1,1,437e61f751ac72ed3a329c51c921b19ab2da9f1a11da21895600087ddc961e66,2025-06-16T11:15:18.730000 +CVE-2025-4748,0,1,f9a85610c5d35446ec2a7ac3758617edb53a3cc945f9b440163e59816ded061b,2025-06-16T12:32:18.840000 CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000 CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000 CVE-2025-47482,0,0,961d8ef4753c50b36e4d7feaf8debc74b4e022889d69dcdb4a7b418fc8bebc1e,2025-05-08T14:39:18.800000 @@ -296464,8 +296466,8 @@ CVE-2025-47861,0,0,3d4afc0f6007bc959010138ccc124a6b3a3b56f79923467daa5b523b555c8 CVE-2025-47862,0,0,10e588a747b987e4be2e09155f4160fe17df1ee74eee593b30634360724aa219,2025-05-13T04:16:27.597000 CVE-2025-47863,0,0,36620174019b6cc7c4127108cfc627947af1c045488d10587a581071ed50838e,2025-05-13T04:16:27.657000 CVE-2025-47864,0,0,a7630e6b56face876bab50ada284160d7000173d4dd10948b2856168893da548,2025-05-13T04:16:27.717000 -CVE-2025-47868,1,1,756d50287d9eeaf040431692d9779547a447f2e68bc304423220684d1319f1fd,2025-06-16T11:15:18.437000 -CVE-2025-47869,1,1,ad7c8179c668e54fe16d85809121a81a54a5891d87481fe302cf507e34dfbcdb,2025-06-16T11:15:18.590000 +CVE-2025-47868,0,1,6c729894ed78c263c401ada0d1e9fac8f360ad3f935f3cd721a728f34dccb2e0,2025-06-16T12:32:18.840000 +CVE-2025-47869,0,1,dd38534aee172b025fa8ed1f324375ebf5d46a455f29cdf3675f34dc924c5200,2025-06-16T12:32:18.840000 CVE-2025-4787,0,0,70171c374cc28e10623f3aef3f6906d1bab0599aa174f66a1665228af79ea2e4,2025-05-23T14:02:33.847000 CVE-2025-4788,0,0,6549de8473f891daf65760389e77371268c3135604d761cfc045c33ff9e38a07,2025-05-23T13:40:39.103000 CVE-2025-47884,0,0,4a77a59ba7de92eec80221a3e38c584f28852ee782b873242f9a5e28747dea9d,2025-06-12T13:48:38.967000 @@ -296518,7 +296520,7 @@ CVE-2025-47953,0,0,4efadcb8de5ee103c4397343fd477ac2f1cc76312f377843529dc0565acd9 CVE-2025-47955,0,0,eb2ec88dd5cc932731cf640b586ede1e8a1ad4d65d53649a0708f1fa7a7dcbc2,2025-06-12T16:06:29.520000 CVE-2025-47956,0,0,584e4455483bb8596aa243b181eb5b73e9588e261be2e1835cf41b90c145fa66,2025-06-12T16:06:29.520000 CVE-2025-47957,0,0,75789a9bbd8a920a1e5da65d05d1ff25d4c73544f6b2f447de71557990907414,2025-06-12T16:06:29.520000 -CVE-2025-47959,0,0,e579dddaec69d66709ae360af6310bf484840543a4c02a42eb98ad70bfc5a01f,2025-06-13T02:15:29.180000 +CVE-2025-47959,0,1,0fbc344af7988c6894e76b48842d48c9ca915a33b285f343b6a8f1686805800c,2025-06-16T12:32:18.840000 CVE-2025-47962,0,0,ec5f12ac8b56b30ebf23bb9811fd08e5a27fefe35ea896c43c130b0c1e200c0e,2025-06-12T16:06:29.520000 CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8d40,2025-06-06T14:07:28.330000 CVE-2025-47968,0,0,9873a05770c354442bf3bf27c8a92251f359bb37d069f641052bb9259afd6d63,2025-06-12T16:06:29.520000 @@ -296857,7 +296859,7 @@ CVE-2025-48798,0,0,4804c012d77b1aa343aaa1ee6a48cee243c1763b892c9b1359aa4be5944fe CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000 CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000 CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000 -CVE-2025-48825,0,0,9bc10fafb724b0d441c31b62dbd3e057693d16f4246be711935d8a768060201b,2025-06-13T09:15:19.937000 +CVE-2025-48825,0,1,449f974167a8b96d483685583b54c55bf8ad97d04b0702624b6d7ca85c1f9103,2025-06-16T12:32:18.840000 CVE-2025-48827,0,0,bb023efebad659c6b1afc7472a68a4c3fff6995d9544989f2962a9514dad36ed,2025-05-28T15:01:30.720000 CVE-2025-48828,0,0,4552ae9ffef9c0c046834c88e3af4be5924ff2fdbe877524ea921342daa54fb9,2025-05-28T15:01:30.720000 CVE-2025-4883,0,0,5862fdd520821c1eedf697774db7196e34040fbccfc13f239bec6cec686b2e42,2025-05-21T19:38:13.727000 @@ -296906,14 +296908,14 @@ CVE-2025-4891,0,0,ce5eadb58621294f252fd31aa2b4c3c08be14da6ad289e0467dbab1173f367 CVE-2025-48910,0,0,b0802914093d2b8a5e0d094bc7d58f666a6ae381ef73fed402d6537c5ab4a23d,2025-06-06T14:07:28.330000 CVE-2025-48911,0,0,d3230d9fd5ec3a98359dbbf269123ba96a632f8f634d15bc217e0ffc40994451,2025-06-06T14:07:28.330000 CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec7244c,2025-06-04T18:29:44.323000 -CVE-2025-48914,0,0,611d1f4dfec1eadf26733c5101af088c32adafeac6e961270f5a48b78345750f,2025-06-13T19:15:21.317000 -CVE-2025-48915,0,0,86484156a4bb7c90cc4b20494b1e4144357dce05aaa83458e4048b68d28254a7,2025-06-13T19:15:21.470000 -CVE-2025-48916,0,0,638b2ad69269f8dd939c3a31b40d7ea6237dd604071291ae1ed97e4ef7b775b8,2025-06-13T18:15:21.870000 -CVE-2025-48917,0,0,2b3ea003e3fbb5ea17e7efb6714a05219e09023a587775e2361e2cf00bba1391,2025-06-13T17:15:21.713000 -CVE-2025-48918,0,0,5f050961479c6e99fdcdc1c8a2d564c2683b9bf1f625f5f17f11fb8ed12e609f,2025-06-13T18:15:22.020000 -CVE-2025-48919,0,0,9f844d9b572b0a73a73e3a24a2d73e4b4f1070512b4cd3f693eaf76a5374b071,2025-06-13T17:15:22.757000 +CVE-2025-48914,0,1,6768823be193681694a05f749c4e14bb351cdf0abbb5d5c4619643e6eaf8bd2f,2025-06-16T12:32:18.840000 +CVE-2025-48915,0,1,72c44e7d9dc43c1ed3fda2164fbac0b77dbff69a332ed11febaaea2ee8dd6983,2025-06-16T12:32:18.840000 +CVE-2025-48916,0,1,6d8d251fa994ba139eef4eb0afe33ef9711d553f692c5ecb715ce00a30df616e,2025-06-16T12:32:18.840000 +CVE-2025-48917,0,1,850f7c6dc192ff0f15f355ae4155c5c4d0b911289c82c41f67b89d8d8d3b82e8,2025-06-16T12:32:18.840000 +CVE-2025-48918,0,1,96bed736df52792450e3608cc07a547f9c416534292e707cd90567bb1e33020f,2025-06-16T12:32:18.840000 +CVE-2025-48919,0,1,b13f4700030161c8cea02111785c6dde091bc79546f3b93073b1eb28b1babf2b,2025-06-16T12:32:18.840000 CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000 -CVE-2025-48920,0,0,359b080622ba03ad19d4eaa0883609eae9e10d65ba04af6d0f3276a864eb4713,2025-06-13T19:15:21.640000 +CVE-2025-48920,0,1,c443e19ac648bfe69c31e79bc1998d46349e50d790bd54c32a87884332343dbc,2025-06-16T12:32:18.840000 CVE-2025-48925,0,0,21a2cb4f4a9620e34d454c14028a00f2b70dc9544a21aca3383488609c689c05,2025-05-29T14:29:50.247000 CVE-2025-48926,0,0,7c30f38d95fc987bd6e8852b968a55a7e51032b7c79b54853568428b8d32ecb1,2025-05-29T14:29:50.247000 CVE-2025-48927,0,0,709ff3b5cba6df23c4ebbabd98b2844e61f0bb8547f17efd794502cb0ceeec47,2025-05-29T14:29:50.247000 @@ -296988,8 +296990,8 @@ CVE-2025-49075,0,0,54be58c89d858cfc2a2a38282ca430d2d44e5da7afee9b9ba3a3af9890aab CVE-2025-49076,0,0,11ca67faa747268bd3e42ef94a795b585577483e7914ce9d6c222e8b9284807a,2025-06-06T14:06:58.193000 CVE-2025-49077,0,0,ea2e636f032c4f39bdc78ff636e21026e853dcff77025a2be8dc5f87ad787347,2025-06-06T14:06:58.193000 CVE-2025-4908,0,0,de60be5e9644ec87fb1afc243f75b0e5b1a22cdd347bf91d496fa5782bf1af05,2025-05-21T17:25:58.063000 -CVE-2025-49080,0,0,58f95a3194d869ce6530c1f43130ead265d1dbffaea94c5818f80e8dbd27572b,2025-06-12T17:15:29.193000 -CVE-2025-49081,0,0,2a1f3f120b2d73c6734a65eaa76616b78065692282e0abccbfde2db89f77f55b,2025-06-12T18:15:20.853000 +CVE-2025-49080,0,1,87396086561b445c8cdaa3dd49c8c7ff5224bf731824f246f1ba3bbf5bc3ebba,2025-06-16T12:32:18.840000 +CVE-2025-49081,0,1,eb13a5ae9e5fff8d330178739675bc5a6ae8edc1853b67611cb6e4c2a1854513,2025-06-16T12:32:18.840000 CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d9b,2025-05-28T13:08:14.173000 CVE-2025-49091,0,0,fd6ab50f9114c6045a3326ed8a0f3d8823df8047a6b8dd0e73db4688a593b9e2,2025-06-12T16:06:20.180000 CVE-2025-4910,0,0,d0c7584b70570a0f60f72259e5222dec42c6f070aafbec7da031c0738cd595d2,2025-05-21T17:40:58.137000 @@ -297167,8 +297169,8 @@ CVE-2025-49453,0,0,3157ba29483ae9ad8da12a1daabc7d18b2cfb9c2cba53b98371ffd33eab12 CVE-2025-49454,0,0,091aeaab97f5fa1c2eb9e3109965e6baec7c6ea4954746cd56a5731b4f1911fd,2025-06-12T16:06:39.330000 CVE-2025-49455,0,0,aacf2547bf7940724be705df1042942dff4350ea62c9bec849294a19022c507d,2025-06-12T16:06:39.330000 CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000 -CVE-2025-49467,0,0,315fb2415b7742c63cb9ed40b5572066904ca7fe589244717698e031a848defd,2025-06-12T16:15:23.363000 -CVE-2025-49468,0,0,4d397aa12ea5dc0679fbfb4a8cae032ffdab87710ecf420dfdf578a01b56709f,2025-06-13T10:15:21.073000 +CVE-2025-49467,0,1,110ebae3ea82a19af4e25ef45b2ac9df8589c2692e3973927cf1b47933c6584e,2025-06-16T12:32:18.840000 +CVE-2025-49468,0,1,0c5705ec6b92f3b27c448d7bfd07d08f75a2e07abc56bbaacb783501986cd119,2025-06-16T12:32:18.840000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 CVE-2025-4948,0,0,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 CVE-2025-4949,0,0,e32a5af3d2c9a475d779933f61691d18d401479a397ade091e3e4be748dec076,2025-05-23T07:15:21.160000 @@ -297178,23 +297180,23 @@ CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab58 CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0dc64,2025-06-12T16:06:39.330000 CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000 CVE-2025-4954,0,0,1ec01516c4567931b4ffc24e86d8b1eee9006bb52ce75acce1cd554027fb1f48,2025-06-12T16:06:39.330000 -CVE-2025-49575,0,0,a9ac8135758667bf90179dfb69a5b294920c54144017f2a5bac0e6bd80c6ed1d,2025-06-12T19:15:20.160000 -CVE-2025-49576,0,0,4342cb10e0317960e7dd092cdc2efc4969abfada9d341adad9eda9973baa6fb4,2025-06-12T19:15:20.313000 -CVE-2025-49577,0,0,cc59c48470e1a32e664ac83c0866b280d2c96ad2cbc7479ff7feab6d2f00e50b,2025-06-12T19:15:20.463000 -CVE-2025-49578,0,0,915f8843baffc0c2d70814e474376afb4ce6352a70e59007cb5fb482262deede,2025-06-12T19:15:20.610000 -CVE-2025-49579,0,0,fe36df0d68ee6214ff213e0e4f4597bb14d8af4a7a0f8a69061e309ad3fe7a81,2025-06-12T19:15:20.750000 -CVE-2025-49580,0,0,447e61071a03e5ffc7cd650d9ab130ef5607bb2773b532b44ceeb795ebb4dc4f,2025-06-13T16:15:27.417000 -CVE-2025-49581,0,0,ef451a72858a865aa49086653e770f6c7c0527c9925847d4c7ffeac26da353c6,2025-06-13T16:15:27.570000 -CVE-2025-49582,0,0,ec47a995e262a6ea61fa4f0d419b46620e85fc073cf858285a0a8b90cdb2dc15,2025-06-13T18:15:22.167000 -CVE-2025-49583,0,0,d94bfab34adc474075692c57f263adaca8e6bf8e80d41b4507ff9f9b64218c26,2025-06-13T18:15:22.320000 -CVE-2025-49584,0,0,be10fd9b3f0ee7f88f760ee812b110da0626a7cacde4f2bcf97ce5db6a46d9f5,2025-06-13T18:15:22.437000 -CVE-2025-49585,0,0,a233743e34be0c9fc686945a2bbb35e62d1e9616f79cc224cd366cf57f09cbba,2025-06-13T18:15:22.580000 -CVE-2025-49586,0,0,44e3302a3c6654242afba6ff1c4da1d2dc0946ecd078c27d565a8f770a374a87,2025-06-13T18:15:22.737000 -CVE-2025-49587,0,0,5e92f52c17476f20bbbb92f2a96992f9402904a096948f40a3c309b1fd864593,2025-06-13T18:15:22.880000 -CVE-2025-49589,0,0,3f7486077d36fd940bf3dbafc40d332c5ce241b2f107da3297a4c52273f4265b,2025-06-12T21:15:21.480000 -CVE-2025-49596,0,0,a8b1695cd8d7f19e8088876e03a8d0008aa1c7562fcee3a0bd14045f8047d9ab,2025-06-13T20:15:23.133000 -CVE-2025-49597,0,0,5859a4be6aef23292d7b995404997281d18819b9647dea0eda9a287959a4bbac,2025-06-13T20:15:23.283000 -CVE-2025-49598,0,0,827a5b32e61583ce0397083e72ffa0b38132784ddd5142a3373384633485c07a,2025-06-13T21:15:20.713000 +CVE-2025-49575,0,1,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000 +CVE-2025-49576,0,1,d91dc4671dcd271f2349061a8890351137f780e1115b96e716a0a31c8aba01ac,2025-06-16T12:32:18.840000 +CVE-2025-49577,0,1,28aa0b942534a5a538c80dbb8b7460e9323fd7179a5e937d1ba2f1eb56bd16ad,2025-06-16T12:32:18.840000 +CVE-2025-49578,0,1,6651f925e00dffb5496a1d7f607cec2396c24b129d6dd65a8f87a78724c938bf,2025-06-16T12:32:18.840000 +CVE-2025-49579,0,1,2408c7b17c7e797a767957ab38b66b138e7ded7ebb1f417b83ccd5f4a5ef1955,2025-06-16T12:32:18.840000 +CVE-2025-49580,0,1,4c9b71744d3498a32ff0a627874730d252e7d7a13b89ecc7f44e387ec55d80fa,2025-06-16T12:32:18.840000 +CVE-2025-49581,0,1,c00501e6466e7f8a443812d381f6b3f8817fdac02585722e43ce43c42ecaa8bf,2025-06-16T12:32:18.840000 +CVE-2025-49582,0,1,3c7caec0155f29ff4e72e07146d4f4e83397c7567b782cd8bbdd86c791eeabb7,2025-06-16T12:32:18.840000 +CVE-2025-49583,0,1,d2b34f86da37c06b4c2b39f3374b091ebfd691ffe667ed279c2ea823165474ea,2025-06-16T12:32:18.840000 +CVE-2025-49584,0,1,e202d17f9c59007f1c0727b372499baef8fddcfdb871c223051126f8d635ca60,2025-06-16T12:32:18.840000 +CVE-2025-49585,0,1,5bf4c40d67475101b94bdc46e2d5692603da18c9e7df40708e6ea162e9f61715,2025-06-16T12:32:18.840000 +CVE-2025-49586,0,1,2c3a3ffb465e48b26eb6217846164f4f9a6ce07e373f9efa6cf1228016e4468b,2025-06-16T12:32:18.840000 +CVE-2025-49587,0,1,de5086ac381fd168ddf890ff4b6777f5711fd665730c37d4ee199139f966ae7d,2025-06-16T12:32:18.840000 +CVE-2025-49589,0,1,4de9f02dd34b97b034101bec18a9814c3229a0f8edc0cf289468099913dab0e8,2025-06-16T12:32:18.840000 +CVE-2025-49596,0,1,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7e41,2025-06-16T12:32:18.840000 +CVE-2025-49597,0,1,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000 +CVE-2025-49598,0,1,388fe7ea425620c97395f0a980692153036c5ee134fd73303c8f32af7dfdea32,2025-06-16T12:32:18.840000 CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000 CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000 @@ -297236,7 +297238,7 @@ CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31 CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000 CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000 CVE-2025-4986,0,0,0d635bfcd5ea7157ed48c7c5f6511d7b519fc07571e2245e906f4237ec28c07f,2025-05-30T16:31:03.107000 -CVE-2025-4987,0,0,5b8d996ac86b68ca9a947df5c0b2ea6fdecb4a2fdee697d3645bfd8856c947f8,2025-06-16T08:15:18.787000 +CVE-2025-4987,0,1,c7c39e2e9c9954a29f9a19f48f2a034a7ab3e4a411a4b09beb0620c0b311c40d,2025-06-16T12:32:18.840000 CVE-2025-4988,0,0,a7c799add205e04161903a2f90e2fafc16c75a5a4daac88e051c1af2ef20204f,2025-05-30T16:31:03.107000 CVE-2025-4989,0,0,74686f3d4372e905fa27c624734660eade1cfc1a7c1d6b7d7fe07ac62f07c46a,2025-05-30T16:31:03.107000 CVE-2025-4990,0,0,11128ad236ff0bbb6407ba12ca704aae39e79d15ca91d8e93c05e36bda39beb6,2025-05-30T16:31:03.107000 @@ -297329,7 +297331,7 @@ CVE-2025-5116,0,0,b6938e7bcf712294173537b38f61d79bb1a781951b36c05c0a08cc11ed4b20 CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000 CVE-2025-5119,0,0,15623b4a1405db2ab9f990c5e6ae33546aa75c69874829b4176204ed82093444,2025-06-10T19:34:07.790000 CVE-2025-5122,0,0,f0e21910b241d49227076aad0272129f233644ba6bdfb930e332b9b2297be743,2025-05-29T14:29:50.247000 -CVE-2025-5123,0,0,87de19fc00d434d690b3574de60bcd88c7595e22e2fdbc1d4883bb3b001f495c,2025-06-13T03:15:51.853000 +CVE-2025-5123,0,1,e9ec587bef4f95aceb478d3bd9c11133b8cfa561f98ad2b11377714a04b2ce19,2025-06-16T12:32:18.840000 CVE-2025-5124,0,0,faf8cbc0f69371ed3c6719c9c69c4315ba1bcb8fbea9df9ad359b463d11b395d,2025-05-28T18:15:27.973000 CVE-2025-5126,0,0,7cc90e531a5e7005ae60ae901737240f24d54ae7a2fa3f533227e361775d65cd,2025-05-28T18:15:28.143000 CVE-2025-5127,0,0,9a0b70c5280abb76d62d9704c87baf3e577540552dfa896fe1c985faaa959202,2025-05-28T18:15:28.277000 @@ -297427,10 +297429,10 @@ CVE-2025-5229,0,0,1288da6b330c7645f72b24c3f896b277f2be20982fe0d52f419898332e513b CVE-2025-5230,0,0,9fadea541076e74f479fb5b5289a700110bb92230bc9a76add28f6c782b2ab5a,2025-06-10T15:11:44.053000 CVE-2025-5231,0,0,933bca2cb9baedec07e689266f247371c054ab08b67bfc89de515eda8b6db129,2025-06-10T15:11:56.957000 CVE-2025-5232,0,0,1b45026e75247a7322427bb058f27ed5717a2e44e9ed2a15532ca07a8f6c71a6,2025-06-10T15:12:09.197000 -CVE-2025-5233,0,0,25c27a9d7f596144c0065967ddcf3407c23494cb69f4ccaeb23d781d77fe1d4d,2025-06-13T03:15:52.003000 +CVE-2025-5233,0,1,6ecf1c2c649b0793b0fa703353d52d82c83e36cf0edf8150a0b10fa91cf5098a,2025-06-16T12:32:18.840000 CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000 CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000 -CVE-2025-5238,0,0,644d4508b15f0bef28c27e50b70a28b07542f081aec66098b96ce5dd53a30898,2025-06-14T10:15:19.987000 +CVE-2025-5238,0,1,2ea3b090ffb1e48b08d0ca2fe3294d59ed4285a1a902a2dd2038828fbe982e10,2025-06-16T12:32:18.840000 CVE-2025-5239,0,0,6516f1b341ac369c2f899c8884ddf4fbc36f529a71c6c5c2406c9cd11f9a2a1d,2025-06-06T14:06:58.193000 CVE-2025-5242,0,0,3430448059313f76ae0f8dcef9fc481fd3cfce1823da3d8abe54d77d5e6c274d,2025-06-07T23:15:22.130000 CVE-2025-5244,0,0,f16a7ad73436a8b188ea427e076cb6d66c3866f0d06770cfebf2ea7a2f86cb34,2025-05-28T15:01:30.720000 @@ -297463,12 +297465,12 @@ CVE-2025-5278,0,0,1a1d872b476a4e1ede71f599ba5ea7954cfb91958da7bd7ccf42fc9ce864ef CVE-2025-5279,0,0,81720af3c8cc837e31e88e83d11ebb304616a1e1b5e7e1af8c0ac6f8280ff252,2025-05-28T15:01:30.720000 CVE-2025-5280,0,0,3c6af0d30a51ecb706066ad212af1114fdaaf7f2415af1fe946985167145905d,2025-05-29T15:50:31.610000 CVE-2025-5281,0,0,4065baa6ec2536bda486e7298d71ac521380ba5a3be043da1b14156c61e3ebd6,2025-05-29T15:50:25.993000 -CVE-2025-5282,0,0,c8eb1c1315a87d9853405a95d66666e6cc5b28d9ac4c421ef5b6fd85ca82824e,2025-06-13T04:15:28.983000 +CVE-2025-5282,0,1,9477fe741c28f7d8eb82ac198e365a707539279366a622694c761108b4b278c9,2025-06-16T12:32:18.840000 CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000 CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000 CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000 CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000 -CVE-2025-5288,0,0,64aaa0b5323acd1b8e371486b3dd261274d9478e762bf4a96287896bf126f4db,2025-06-13T03:15:52.150000 +CVE-2025-5288,0,1,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b48,2025-06-02T17:32:17.397000 CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000 @@ -297491,8 +297493,8 @@ CVE-2025-5331,0,0,139c0cf46ff478a4f27313553ef136799361557eaadaf36d4364deba816099 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5334,0,0,3b25ffa10fa68a37bf0e18657dc7cc96e971a33e8fade936cdd130170872987d,2025-06-10T19:15:35.243000 CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000 -CVE-2025-5336,0,0,66f58ed710d27f4b2bf2e01a754073917852be9e5d922753d5aff62957bbdb9f,2025-06-14T09:15:23.527000 -CVE-2025-5337,0,0,fb81a59ed7eb176274ef27e0e4d9ad517c7e5e9aaa135dbc61f94f53fe093bdf,2025-06-14T10:15:20.153000 +CVE-2025-5336,0,1,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000 +CVE-2025-5337,0,1,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000 @@ -297579,11 +297581,11 @@ CVE-2025-5474,0,0,ff56ae6d33a817b3b5972773cb7c3e3407b0f73c6768464aca7201e3d55867 CVE-2025-5480,0,0,b6157243f7fdbaf5769c8c248be5113b7a9538f2054411dc814924ab031c7b6a,2025-06-09T12:15:47.880000 CVE-2025-5481,0,0,0df5112d76a8e502ef89d6f4c9ab47a4ed6ed40f8c8ec4607ebdb9cb6b4ab86a,2025-06-09T12:15:47.880000 CVE-2025-5482,0,0,010176165dc064c9d0f5c42c228b3c1b03d533e2fec3bc43624fb7ad3f4bc0b3,2025-06-04T14:54:33.783000 -CVE-2025-5484,0,0,7c27b725e7a61e1d6e8f77693ffc4addbf5cf10960bda3550517de01420268a2,2025-06-12T20:15:22.113000 -CVE-2025-5485,0,0,1822a9467360d73204ecdf49cccd624ced65400c446ebda16733a4abd8ba3ed4,2025-06-12T20:15:22.283000 +CVE-2025-5484,0,1,ff712dd03f32af2310b571323993d06900491354a9de82d92a7ba8f6cd585833,2025-06-16T12:32:18.840000 +CVE-2025-5485,0,1,2e860e2d57c553742a7a4058b06e9ead83d36be7b50569039a067969f103feac,2025-06-16T12:32:18.840000 CVE-2025-5486,0,0,403a5f3fdf24114225af88123fd5df41b3fe4d4616779e15f6218229399593fb,2025-06-06T14:07:28.330000 -CVE-2025-5487,0,0,3ede029b4b4bcc40d102b6937970a70f08956f4250f62c1aea9fb70b5aad50d2,2025-06-14T07:15:17.870000 -CVE-2025-5491,0,0,16b9500067287e8a2bdf231626751a75a14f2a35094bdb6dd212fb343b874895,2025-06-13T03:15:52.300000 +CVE-2025-5487,0,1,a2325d70b19f1faa0bb78067f87ae57fb5952acc710d0b21151f32c03c4f828a,2025-06-16T12:32:18.840000 +CVE-2025-5491,0,1,bde4a3997792f29e78b23bdff62128712428eb2913e7a1e844f896d042cfe900,2025-06-16T12:32:18.840000 CVE-2025-5492,0,0,5239a7cb50dec6b348e683d7a6c48897854a921e0d403f100d8eaef90a706bbd,2025-06-04T14:54:33.783000 CVE-2025-5493,0,0,1efa27605551d4754ba55b2a6097a15a4076a1f74a911a4fa864a052324b89ba,2025-06-04T14:54:33.783000 CVE-2025-5495,0,0,119827a376db9a3a9ce1110409fd703f076cb8ae90c38353380ea0b67ec862d6,2025-06-04T14:54:33.783000 @@ -297659,7 +297661,7 @@ CVE-2025-5582,0,0,d2f1baa22f55fc38a8f865d0e99938121f7ce9bfb4e6584060e61c164943f9 CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991ad,2025-06-04T17:44:26.393000 CVE-2025-5584,0,0,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000 CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000 -CVE-2025-5589,0,0,3b8c0f350b849c9492ae78e46abb4302d508a80f7be3f44c57d2d1faa061bdf2,2025-06-14T09:15:23.710000 +CVE-2025-5589,0,1,6c79a04993e971b42452f3a0ae16618b76eb63bb362b0f3291c861226ed4734d,2025-06-16T12:32:18.840000 CVE-2025-5592,0,0,36c388f33c323490a93ebd79d5f124d5f4fdc10d946cc1144d6e587fb6694158,2025-06-09T15:02:45.030000 CVE-2025-5593,0,0,6df395e5fe3476beb67761792da6574eda83b6d9a337db7d77d384194417b8ee,2025-06-13T01:00:11.693000 CVE-2025-5594,0,0,83e7fdcfac2ba201d4fe551d7608819296af218dfeb5718bd91a2cdb5f7cbdd0,2025-06-13T00:58:21.617000 @@ -297750,6 +297752,7 @@ CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def65731 CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000 CVE-2025-5687,0,0,e33a8d5b6be662e1a0e241a33814bebad69a67bd26678880d068e7933b6c7f3d,2025-06-12T16:06:20.180000 CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000 +CVE-2025-5689,1,1,6be61e620ec3a8061fa0bfd0dd4a337a5e52ae0ea1d9e6d3b253fe6449410f44,2025-06-16T12:32:18.840000 CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000 CVE-2025-5693,0,0,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000 CVE-2025-5694,0,0,903ae591483b4ac578a133192ea3d236171a92fe2d64e5248fd0b8468b1bbb6b,2025-06-10T15:01:17.830000 @@ -297837,13 +297840,13 @@ CVE-2025-5798,0,0,8b03aec99638c4fd5212301f04bb1a503506bf58d26bd5e5a5acb0c1110a52 CVE-2025-5799,0,0,50ad513413ffdd2c3157967aae0c57c4edcf2bbf0ff1ea794ba25c05cfcc425b,2025-06-09T19:07:59.197000 CVE-2025-5806,0,0,eced74af9a3bd847a96fe591b592713a189dcd85d66bd43936ab31bd4aa88aea,2025-06-09T12:15:47.880000 CVE-2025-5814,0,0,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000 -CVE-2025-5815,0,0,227d7521ab477bec29c7868dd969a25f95b07e0dce89dddc7159105757899122,2025-06-13T04:15:33.020000 +CVE-2025-5815,0,1,3c63e526b28352a674f2d0faaef2707920143cb75a4277d3e7f975593f6cf816,2025-06-16T12:32:18.840000 CVE-2025-5836,0,0,d80bb6457241c6112de58f50d5f8d524854cb0ce4d9b0e26a6df5eac567f78ac,2025-06-09T19:07:49.417000 CVE-2025-5837,0,0,85c1936a3a1142d6d72d779afcb63f2a00a18b124b5cff42b89badcdc2313d9c,2025-06-09T19:07:41.590000 CVE-2025-5838,0,0,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b08,2025-06-10T14:56:21.530000 CVE-2025-5839,0,0,af2c1c6da3fb5a22931f1ffebd67420dd5150792d38533d6eb8686e18f591276,2025-06-09T19:07:34.470000 CVE-2025-5840,0,0,a1906b279632ca933a71469d14d9b22734a373c8dc4ebaee1a55c4351d13760a,2025-06-10T15:45:31.043000 -CVE-2025-5841,0,0,e8b0866385421641a65cb37e868061944d160bbc1f8b4a9234c0fd82c70200e5,2025-06-13T03:15:52.457000 +CVE-2025-5841,0,1,f400ea2f8b46ebb92066563e7d4eaccd25056b8981da67e57e016f89e1a31dc6,2025-06-16T12:32:18.840000 CVE-2025-5847,0,0,72a670a977f930c072e82981d9be0647255328c3124df63dafd15061a72168a9,2025-06-09T19:04:55.580000 CVE-2025-5848,0,0,97a77699d44911bbc0f7dbb24d5b37ad7d0974431c5e2858413f0642987e5a7c,2025-06-09T19:04:50.113000 CVE-2025-5849,0,0,0056fe9cb36cc640911c965de99076fd3871906072eb39fce82181a9d0f80791,2025-06-09T19:04:44.777000 @@ -297913,22 +297916,22 @@ CVE-2025-5915,0,0,f4817e3f541276db8764595bab47239f1072f31f9c3d32c2caaee3b4950d68 CVE-2025-5916,0,0,77a227907bb56f71f2bfd1bf497899ff1c8f6eb6d2e97956e9c7ee1b79bfbd3d,2025-06-12T16:06:47.857000 CVE-2025-5917,0,0,0b15f8cb6694a25438c80b55bb7a5b265e6faccf484d04cd7c6d5563268713ff,2025-06-12T16:06:47.857000 CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d2b,2025-06-12T16:06:47.857000 -CVE-2025-5923,0,0,27429d15ab887a9f210026a6c9f32f38c44d66346c8e26713338f55cf9799cd6,2025-06-13T07:15:22.663000 +CVE-2025-5923,0,1,bd32fa6b95a8f310c6b07918d04b1a4cdef7f962ecfa8c2518b68d11b4b0741e,2025-06-16T12:32:18.840000 CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000 -CVE-2025-5926,0,0,27c8a30f49d98a189ff8f3efaefc08e82c566362e335c92dde79ca4c9ec3e6c7,2025-06-13T03:15:52.607000 -CVE-2025-5928,0,0,f4da33ae5b0dec87d9c896e049c1c13293a763fa626ebb63a697639433c15b8c,2025-06-13T03:15:52.767000 -CVE-2025-5930,0,0,3ffb3e7bef3808f0131692972a7becdfbf70db53c7ade495c668be158b2c6433,2025-06-13T03:15:52.910000 +CVE-2025-5926,0,1,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000 +CVE-2025-5928,0,1,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000 +CVE-2025-5930,0,1,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000 CVE-2025-5934,0,0,5a584e0d1bbfc15c499b678855c67e63bc7743a9d91ed869cbc591e77e991d9e,2025-06-12T16:06:39.330000 CVE-2025-5935,0,0,c15a5d20553ffc7a7c30ae68f0e5f38be384091a8a588ccb546a6d6a87a9c526,2025-06-12T16:06:39.330000 -CVE-2025-5938,0,0,2b95163d7251aa3213f234194ed213878324f049ddae9431feb2547688c97209,2025-06-13T03:15:53.053000 -CVE-2025-5939,0,0,bcc09e6464e0c56e6ec9fb12191b3e878d1e4396dd2a8cba3c727d9e602251c9,2025-06-13T03:15:53.200000 +CVE-2025-5938,0,1,de6ba49470711279279f27a904465957f8293ec15c3176c20b2597289d4c7b40,2025-06-16T12:32:18.840000 +CVE-2025-5939,0,1,fae4e42cb7ec096d2eda48ac42042deaadc4d81bda29462ec7008261e2cabbf5,2025-06-16T12:32:18.840000 CVE-2025-5943,0,0,35b1a03e31f4997e71998954ee281c02ada0936b00fc64cfacb7aa84cfa29429,2025-06-12T16:06:29.520000 CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 -CVE-2025-5950,0,0,93ad1163136e8895ad3f5aa5692d2dad9460c261edec19c4961089078035592c,2025-06-13T03:15:53.350000 +CVE-2025-5950,0,1,760fa6d42f3c866c98b5e3438e6c6f00bd5fd5520537943b3e544b07838ccbee,2025-06-16T12:32:18.840000 CVE-2025-5952,0,0,80f5810e94a735443b1add4b87f50d30096f6ed0c46ddf37bebc56b27e945b75,2025-06-12T16:06:39.330000 CVE-2025-5958,0,0,f189a14363fc4d75c8d60dd1aebc0840ad33088eead9b86da76a6c6b49cb8c7c,2025-06-12T16:06:20.180000 CVE-2025-5959,0,0,be0aeb32ea54fd6e98466bb46bd49ebea303e5490307c8cf597d926f785408ab,2025-06-12T16:06:20.180000 -CVE-2025-5964,0,0,5e9fa268f55b2b4fbeec5b451c86faa73086b84d7e65c1082d54c5e6a41fdc94,2025-06-15T20:15:31.037000 +CVE-2025-5964,0,1,fdc2a55a5a19378f1914fbf75b6cbe370c921fe75e327e1cb5f217f1b15bf1ea,2025-06-16T12:32:18.840000 CVE-2025-5969,0,0,c1cc21e3e671c92cd4500d184398151db62163dec64f67d18a86b28ac5130697,2025-06-12T16:06:29.520000 CVE-2025-5970,0,0,f0af781466168ba00ad4d1f00a851825386cb204e76cc709e911a3d2faabbc12,2025-06-12T16:06:29.520000 CVE-2025-5971,0,0,f31780a27da79cfd4bdd73e0275c3322aabb65327151b3ade03d0ff9052df285,2025-06-12T16:06:29.520000 @@ -297941,11 +297944,11 @@ CVE-2025-5977,0,0,90ab5994d1ece998435918096578c8565af7196e749d3db8dba0abd42c554c CVE-2025-5978,0,0,0dead1a357778d240f3ef63e07a94108270bf41eaba57dcb5df97505742c3c80,2025-06-12T16:06:29.520000 CVE-2025-5979,0,0,db0961ea02dcb43c111bb5613620d91e6c3d92b97d1442abe5042e81f31959c6,2025-06-12T16:06:29.520000 CVE-2025-5980,0,0,e90ee8249e9ef5f269df5d2fd7c0a7016e81049d5b65a5ebb3ba9268938415a3,2025-06-12T16:06:29.520000 -CVE-2025-5982,0,0,0c7dea74cc8efc70e60ba20222cf4cd8ed64924645dcf72550beef2f337a9124,2025-06-12T17:15:29.440000 +CVE-2025-5982,0,1,d9487128b71b64381d82a652f7a1122df97e22510aec0c066c9d874bcd0cf999,2025-06-16T12:32:18.840000 CVE-2025-5984,0,0,7cfaf20c4da70667d156850823eee53a39a37c9deae6d419cb0c5d32dacf8676,2025-06-12T16:06:20.180000 CVE-2025-5985,0,0,ebcdda4dcd61ee165daceb4c1cf64a9b8507d5f9de3a48b2f52bb73592cb298b,2025-06-12T16:06:20.180000 CVE-2025-5986,0,0,dd95f639f37e975a11d2593698d4d1fa27a00a42ab756d34661be25296fae63b,2025-06-12T16:06:20.180000 -CVE-2025-5990,0,0,961673ab9954b97229be3fc18a50e664a0bc9fa9400cb93454dd37859378dd5b,2025-06-15T18:15:18.267000 +CVE-2025-5990,0,1,3b1aca804ea6c0f6e9294e1b2529898db8d219cf683bd44dfcf13644214951d4,2025-06-16T12:32:18.840000 CVE-2025-5991,0,0,2d56ef31c39d49ebda5cce54941d2d07bc366906f8f2e10ec12b1264a4709a15,2025-06-12T16:06:20.180000 CVE-2025-5996,0,0,6d836d2b7cc11df634eb3440d15936d2a06ec9995d3d02eb7a9226ed3b7059e0,2025-06-12T16:06:20.180000 CVE-2025-6001,0,0,6947a76225acd2e0352dafdcc9d8c8832898e935ce2588bd16c7b63b5eaaea42,2025-06-12T16:06:20.180000 @@ -297956,53 +297959,57 @@ CVE-2025-6006,0,0,f3890d678b52a65bb188746bd2b72b04830e80f4fcc6e370b4f5f482a5c894 CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa838,2025-06-12T16:06:20.180000 CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000 CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000 -CVE-2025-6012,0,0,4c6dac5ddf18ed5f69a7b7f111244c42d0c83289efe5c78cb9f7ab4ab8d45cbd,2025-06-13T08:15:19.507000 +CVE-2025-6012,0,1,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 -CVE-2025-6029,0,0,0a7d097872a3743dce758382e23d64ef6427ff251b4a0e0984b49fe00ded11c1,2025-06-13T15:15:21.430000 -CVE-2025-6030,0,0,971340cab3989d6f103f455b80ce687f5365decc2b747d306ee807e98b81854a,2025-06-13T15:15:21.600000 -CVE-2025-6031,0,0,52a46a61978bb10d22ca53a9dde28a7c796449946f01e8203277d587a42a7b12,2025-06-12T20:15:22.450000 -CVE-2025-6035,0,0,07dd0ef801ecdc5affcaf0e86947bc44410ec1004ed310d74f8d9a296fc9d5aa,2025-06-13T16:15:28.067000 -CVE-2025-6040,0,0,3e01209e0303d051f1d1ac7bf3016bbda2a497b4c19af1290cf47f36f272881a,2025-06-14T09:15:23.873000 -CVE-2025-6052,0,0,d6d0e5e14eb20ceb0c3bc2cb2793ad0094d53a851be1a17d6cfc808d70a5cddb,2025-06-13T16:15:28.230000 -CVE-2025-6055,0,0,f3fa6b9e87d2dacc2038c8e0306009891e39673a790a3aa4577884492d4b176d,2025-06-14T09:15:24.050000 -CVE-2025-6059,0,0,aa4cbe9d67456274a37be50dae943f3a8c684e351505447e0dcbada900f18e7c,2025-06-14T03:15:22.283000 -CVE-2025-6061,0,0,d7aa6a582ef8e8ae5a52cd7597e1f64b25983064d39378305235e3628c71f079,2025-06-14T09:15:24.307000 -CVE-2025-6062,0,0,64774487c618df7aca145bbd7ec40a38e830c1a69a4992fb4491551c85ac1fc7,2025-06-14T09:15:24.520000 -CVE-2025-6063,0,0,2890954e9b2098ac36d836d65cede9d0cf687a8267ef00899cfa3d31327b6f55,2025-06-14T09:15:24.693000 -CVE-2025-6064,0,0,f1b42f8abbe1dc42385b1b319a813fce6feba5bf2333128ae8bf40e0d2cea421,2025-06-14T09:15:24.853000 -CVE-2025-6065,0,0,5e976b8fac171cc7b59ad041eb4f60fb6d8881197db355ec035f6d3d2b656140,2025-06-14T09:15:25.020000 -CVE-2025-6070,0,0,ae440df732d231f7ffcd78cb09e2ed1b1c8a60913b6e4fb5a0be81a26a0ad612,2025-06-14T09:15:25.180000 -CVE-2025-6083,0,0,5e291165aed4c74479ba71d7ab91f6f809097d9cd4c0b19093249b128e4fa523,2025-06-13T22:15:19.500000 -CVE-2025-6089,0,0,1082dde39a9a857add821028ed23d128072d550fdb8ad36ad1f948e836ba053f,2025-06-15T13:15:33.353000 -CVE-2025-6090,0,0,e27818139ece2411b32b2e625852fcc342cc8f5d5f99f49ddd3d8c5d380302a8,2025-06-15T15:15:19.303000 -CVE-2025-6091,0,0,581c1cfa5c591595b15c75e858563a24f75318a6fba57a73b264350d4caca8d2,2025-06-15T17:15:18.360000 -CVE-2025-6092,0,0,610090ee4899c7756bc69bf8b3a79dc8f05e4845772e95595392d1ed6df1eb10,2025-06-15T18:15:19.037000 -CVE-2025-6093,0,0,8691aa8ebd35554c1ce6553aaa15c5062f7e9058b22bca856b70f3380f7ec720,2025-06-15T22:15:19.483000 -CVE-2025-6094,0,0,6895b570a575f57a4a97302804023c34ab3de9b39c561bd8be2089edcbafd63c,2025-06-15T23:15:18.470000 -CVE-2025-6095,0,0,775263b0b7e6b001647676a64517ea0dac574801353855dd9823802aa051e9d5,2025-06-15T23:15:18.680000 -CVE-2025-6096,0,0,42d2c7eba5844242eb8728fccf194d4bcd6e98b95770097c7cb6e46f238fa93a,2025-06-16T00:15:18.560000 -CVE-2025-6097,0,0,067c87b7657b405f0ff8bfaf95b08f6e9d5fe3341e570a14247e14cd5563f74d,2025-06-16T00:15:18.773000 -CVE-2025-6098,0,0,a530b5e2eff17d9a6bcbd1d23679a3eb495e8d45654c58fb78b8f6dc6f3543f8,2025-06-16T01:15:18.140000 -CVE-2025-6099,0,0,e3b77fb4e8905e5a1876725a91f1613c349cb1e434e78e0c83324e11fbea8457,2025-06-16T01:15:18.350000 -CVE-2025-6100,0,0,35273f53917af049af7f64adc9ee7e839a44b48acd88ecfc63ec2fc8eeb99eae,2025-06-16T02:15:17.870000 -CVE-2025-6101,0,0,9eaa9ab84742e56dde9a9e204aeae4c61fb44e8a5f3c86a638705558adf0d1e4,2025-06-16T03:15:41.920000 -CVE-2025-6102,0,0,4051ec429dd7088aa840f1129fdc102f2688dd5c21c5e824822b389d9952a332,2025-06-16T03:15:42.100000 -CVE-2025-6103,0,0,8c096d0c8315c83a1ea31a474507cceb33eefeadabc588e52a20776948d93b2b,2025-06-16T03:15:42.283000 -CVE-2025-6104,0,0,0cb7244bf5516eff0aeb918019c1c01c252e2c8f9668748e11e4f5949a28ce1b,2025-06-16T04:15:19.227000 -CVE-2025-6105,0,0,95455d7ad96d623493f9a04af561f7163ab23de7bcc3da8e2d0c194f7ccdffe7,2025-06-16T05:15:26.567000 -CVE-2025-6106,0,0,f589e4d7b42d39ac74b1bc16b1d178d36ca8a28013e2d2cd9d2d4c7dbe82b409,2025-06-16T05:15:26.920000 -CVE-2025-6107,0,0,8b1b32c2f9a6580d0fc229f7e78ec0090e13aa7e7b3db84c16c06e8dd928ca71,2025-06-16T05:15:27.160000 -CVE-2025-6108,0,0,052486f7c1a2ef350fec9a9a6b4942ddfdbdfaeab96c5024acc201259a6d80d7,2025-06-16T06:15:18.307000 -CVE-2025-6109,0,0,456d88ea582e7752c5f08127d0fea44abd14ec99dc45815323479e72f75d3e52,2025-06-16T06:15:20.213000 -CVE-2025-6110,0,0,2868c073105f9241d86db7e941b5f58d3804a06756b846893d91e77093b6acde,2025-06-16T07:15:18.373000 -CVE-2025-6111,0,0,828492d35f46af5f4bd617fbf9695a7354eeabafa01bcbe1aecb08dbc8200b6d,2025-06-16T07:15:19.870000 -CVE-2025-6112,0,0,03192921fcb3ce4b573c976cde60b3298c837468da8da701519d4ad029a6e0e6,2025-06-16T08:15:20.010000 -CVE-2025-6113,0,0,c228ada00f832720a15995e7d0fadbc924d7d4afc603f57e382f08aa1623a1a9,2025-06-16T08:15:20.227000 -CVE-2025-6114,0,0,227f4fe7537286c6d9a129b77082eb62e5e9bd47bc0aabd1a43e8f1f3aaa38da,2025-06-16T09:15:20.013000 -CVE-2025-6115,0,0,32bbc5cdf3c9f9122ab43d4c3b5bb801120d95e215918d847e6d845ba16a808c,2025-06-16T09:15:20.300000 -CVE-2025-6116,1,1,e0de3d7ac6a4f604e21d9f1d0a7c0b0c9fd8675024729a1ca952d29322d57a68,2025-06-16T10:15:20.987000 -CVE-2025-6117,1,1,e51de84939057413d12368889ff0680303c35a94f8fed05820d1e15fbc3936ad,2025-06-16T10:15:21.233000 -CVE-2025-6118,1,1,59281c1be05d678998d7562bc999c0e1597e559b30bd0f13cfcac083463a8a90,2025-06-16T11:15:19.007000 -CVE-2025-6119,1,1,2d25941a6f4eb40034bc2298155ef6b3d61736635b70da4432f1fb60ad69450b,2025-06-16T11:15:19.210000 -CVE-2025-6169,0,0,ac06daff660839c238a07ac6aebf260af42d84f3956ac01d7a286965b2162754,2025-06-16T07:15:20.077000 -CVE-2025-6172,0,0,342c6cc2700d8cffe114ebae7fb0f638875c5b55bb4327392295802843114037,2025-06-16T09:15:20.493000 +CVE-2025-6029,0,1,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 +CVE-2025-6030,0,1,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000 +CVE-2025-6031,0,1,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000 +CVE-2025-6035,0,1,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000 +CVE-2025-6040,0,1,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000 +CVE-2025-6052,0,1,f7b8f6bed96346c732cfe3c58915aaa99b04704580ca581c3769d9ac03c1036c,2025-06-16T12:32:18.840000 +CVE-2025-6055,0,1,a1414c05d6a8565eece9cbd85c74aae5128e8846318652e194e65bb36ec8b3a2,2025-06-16T12:32:18.840000 +CVE-2025-6059,0,1,84d0ce35ead1515ece8397572c27c6a293b39d090719f8fde70ea6fa5e96acd4,2025-06-16T12:32:18.840000 +CVE-2025-6061,0,1,1e4ad2c51e11b85a0411cc0ba0a247fef015fe294ab3ff30c502f60f1836c736,2025-06-16T12:32:18.840000 +CVE-2025-6062,0,1,5bf9e4ece70cbb53a8f33b39f23213ffcbb9e338a70925ebae7177b4c0441131,2025-06-16T12:32:18.840000 +CVE-2025-6063,0,1,4b692343ef267dff5c6a1fea04bb04a19ebd1cc0cba19e4fc7878765a9d82379,2025-06-16T12:32:18.840000 +CVE-2025-6064,0,1,979f98e59c93c3db1b1e3d8ca32b91237e3a41952bd15c0b929b60ca805f9fcb,2025-06-16T12:32:18.840000 +CVE-2025-6065,0,1,b54a72f9a0b99c16c66aef6c3f604cf5fb2ce5dc53cfc18dad9d67742adfbf62,2025-06-16T12:32:18.840000 +CVE-2025-6070,0,1,c5bf4414dfa4d281aa3a990feec25cc21fddd34f58ddd67c6eaf8ae460160cc5,2025-06-16T12:32:18.840000 +CVE-2025-6083,0,1,b33f55da80da8b54015e6694bf27d7fb64e15676e9297ecd61b06510d2a00a90,2025-06-16T12:32:18.840000 +CVE-2025-6089,0,1,aa83c2709521312e3401dbda2e76aa38d9a30d639029a9e31a096547472bfbf3,2025-06-16T12:32:18.840000 +CVE-2025-6090,0,1,b3117a09e99636e6b75c3bc4d007c4d35a7e4b86fe6bea5755369be96bc4e108,2025-06-16T12:32:18.840000 +CVE-2025-6091,0,1,b693c4aeed7de7a2f7ffee42614970455220a80ecf4f47823d5ec95dd300ef7d,2025-06-16T12:32:18.840000 +CVE-2025-6092,0,1,d6f963287ec98fb97ddd9cff6f0304b6c4fa2b852ba7c5926f2a6424107b3fb8,2025-06-16T12:32:18.840000 +CVE-2025-6093,0,1,b972c5f213e3eeccbe9bea4bdccc2b61efc6468a48ab4cbc38adaf69b33d6ccd,2025-06-16T12:32:18.840000 +CVE-2025-6094,0,1,7e4954aca1c87bc5b27c88eed9899df912291af2d5ad6206e7c667e8f714fff0,2025-06-16T12:32:18.840000 +CVE-2025-6095,0,1,0ed36b226a4ff73270c97f8ca530c2f63e926d432e3adc402916b8a99967e2da,2025-06-16T12:32:18.840000 +CVE-2025-6096,0,1,d4bb35bc00702b00d643045f8da23a1ea034d457e25425ffa5b17c90656b36f9,2025-06-16T12:32:18.840000 +CVE-2025-6097,0,1,87f0f160957d15a240e3cb8483fec75a5ff4a4a799438c38fb690f09937af15f,2025-06-16T12:32:18.840000 +CVE-2025-6098,0,1,5f7c4945b8f396e5d64b5f57b9b47492d0632b3abf0d2ae75b173cd73bfd8a9d,2025-06-16T12:32:18.840000 +CVE-2025-6099,0,1,10fcdc20a46668ee4d53d55ae9a1b8ed880f9531e737cac5053dff846483a455,2025-06-16T12:32:18.840000 +CVE-2025-6100,0,1,5405a19638696c78881918cc3dae691d9cfe2f2242d824f0444e05ebd02e95a5,2025-06-16T12:32:18.840000 +CVE-2025-6101,0,1,12ddf8cc79414ec2bf41fa00be7eca750c6138fd7c74ca9963020b3cb2df9984,2025-06-16T12:32:18.840000 +CVE-2025-6102,0,1,226571f04d9d9af7c13b51336d43e24fde03b3d2e5774114aa8090b13ea7c842,2025-06-16T12:32:18.840000 +CVE-2025-6103,0,1,696e9c964da4a6e69e85aac2d42d330e30757f62af6bf540ba2c64bd7b24d94e,2025-06-16T12:32:18.840000 +CVE-2025-6104,0,1,4956a0e2f40ce3622bc8790617b04042352d384fe4f5245d1c794777153bd9a8,2025-06-16T12:32:18.840000 +CVE-2025-6105,0,1,d0b427b8e24eff9c1fd2770ade249e2d64f1c6773b84a7efea055d3510d7400b,2025-06-16T12:32:18.840000 +CVE-2025-6106,0,1,9ce74342112a339d02ba904cb792c013f1dc3051cd62505a233626e99f717e80,2025-06-16T12:32:18.840000 +CVE-2025-6107,0,1,515ce59b3a14c6e5359fc28163a1254718bf9c3840594c4c70f4e9091fdfda30,2025-06-16T12:32:18.840000 +CVE-2025-6108,0,1,453b26447525a1c77bdd022d41df6e5d7f63a434acb776c6d4a82b4bb7e90eb5,2025-06-16T12:32:18.840000 +CVE-2025-6109,0,1,0d7db4ecae81615766e8ee4f45643deb77b735eed1bf35a97e5466c4bcea88d6,2025-06-16T12:32:18.840000 +CVE-2025-6110,0,1,5aab18d33f2823f762bbeb248fe82bd0382eec4eb56f72f38c0831eb20462c49,2025-06-16T12:32:18.840000 +CVE-2025-6111,0,1,f42adb4070439f6fa812a7a953662938ca3e5e7198aee9ab96a15f297b98c108,2025-06-16T12:32:18.840000 +CVE-2025-6112,0,1,2cb34093f249796bc450ab1e4946b83981e5efc95eeae306e8113818718afef2,2025-06-16T12:32:18.840000 +CVE-2025-6113,0,1,6487968211f9b997fd24f9dfb066c44299fb2897a5646383d857fc8743b4d792,2025-06-16T12:32:18.840000 +CVE-2025-6114,0,1,5b07aa0b99a427e4e1e262a90ef403f13e711539013d241f32b8bebdd8693f5e,2025-06-16T12:32:18.840000 +CVE-2025-6115,0,1,ea67e0817c0e0b85334de1109606320d2306bf23976f6b314daba21e6bf6b4b8,2025-06-16T12:32:18.840000 +CVE-2025-6116,0,1,e38f44f538f70e2af3064901b3bf267614dc1358336d997bcd9313ca7e177f1f,2025-06-16T12:32:18.840000 +CVE-2025-6117,0,1,82f960b7edaa6bb0b3d8bd242f056964ce73e91660e2a674d2707dda3bc7904c,2025-06-16T12:32:18.840000 +CVE-2025-6118,0,1,0685f8bc63456947f39cb813f32e63b00ad26aefe40acb93f91c2a60b564b23e,2025-06-16T12:32:18.840000 +CVE-2025-6119,0,1,376861d3067949f164ebf6c909f666e73ef6f0acd1515e220bef865368b9897f,2025-06-16T12:32:18.840000 +CVE-2025-6120,1,1,88e7ee2ab494268a33e488c231158f3233b0ccc562748ccd03543f010c110b1b,2025-06-16T12:32:18.840000 +CVE-2025-6121,1,1,7d910f23cd5b04349a8b1fd3d8d14c3fa8934869b5b0d3e6ec6703458777940d,2025-06-16T12:32:18.840000 +CVE-2025-6122,1,1,f8fe44844648e29315bb631fdb3655370076256e612338c26c9205a9130f0ff5,2025-06-16T13:15:21.397000 +CVE-2025-6123,1,1,20fd5e09062c56b2913396dfec5ce89454d965b075b5edad6d0f2fc6b4e62a2f,2025-06-16T13:15:22.190000 +CVE-2025-6169,0,1,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000 +CVE-2025-6172,0,1,380e98263d6df3a12b09fa99f8fa559cbb839250058a62e7f33fb3e8a2460ba4,2025-06-16T12:32:18.840000