diff --git a/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json b/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json index 20a024ce567..d70f85d8a56 100644 --- a/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json +++ b/CVE-2019/CVE-2019-139xx/CVE-2019-13939.json @@ -2,13 +2,13 @@ "id": "CVE-2019-13939", "sourceIdentifier": "productcert@siemens.com", "published": "2020-01-16T16:15:16.277", - "lastModified": "2025-03-11T10:15:11.460", + "lastModified": "2025-06-10T16:15:33.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value." + "value": "A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Desigo PXC00-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC00-U (All versions >= V2.3x and < V6.00.327), Desigo PXC001-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC100-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC12-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC128-U (All versions >= V2.3x and < V6.00.327), Desigo PXC200-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC50-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC64-U (All versions >= V2.3x and < V6.00.327), Desigo PXM20-E (All versions >= V2.3 < V6.0.327), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions < V0.3.0.330), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value." }, { "lang": "es", @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20599.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20599.json new file mode 100644 index 00000000000..2f9f0c13cf3 --- /dev/null +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20599.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20599", + "sourceIdentifier": "psirt@amd.com", + "published": "2025-06-10T17:17:51.013", + "lastModified": "2025-06-10T17:17:51.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper register access control in ASP may allow a privileged attacker to perform unauthorized access to ASP\u2019s Crypto Co-Processor (CCP) registers from x86, resulting in potential loss of control of cryptographic key pointer/index, leading to loss of integrity or confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 7.9, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1262" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7039.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29184.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29184.json new file mode 100644 index 00000000000..96aaeacbbbf --- /dev/null +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29184.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29184", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:17:51.383", + "lastModified": "2025-06-10T17:17:51.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An incomplete cleanup vulnerability [CWE-459] in FortiOS 7.2 all versions and before & FortiProxy version 7.2.0 through 7.2.2 and before 7.0.8 allows a VDOM privileged attacker to add SSH key files on the system silently via crafted CLI requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 3.2, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-008", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30305.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30305.json index f44f982de48..48e8f578bc7 100644 --- a/CVE-2023/CVE-2023-303xx/CVE-2023-30305.json +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30305.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30305", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.080", - "lastModified": "2024-11-21T07:59:59.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T17:09:48.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,63 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e5600_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7925D070-66A7-48D8-ACFD-4325BEE272C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36235.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36235.json index d7705b599b9..5e0cba03f46 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36235.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36235.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36235", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-17T03:15:07.947", - "lastModified": "2024-11-21T08:09:26.153", + "lastModified": "2025-06-10T17:17:51.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json index c7971e9dfb0..c67d2f9ad12 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json @@ -2,13 +2,13 @@ "id": "CVE-2023-37476", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-17T22:15:09.450", - "lastModified": "2024-11-21T08:11:47.503", + "lastModified": "2025-06-10T16:15:34.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": " OpenRefine is a free, open source tool for data processing. A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution in the context of the OpenRefine process if a user can be convinced to import it. The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible. Users unable to upgrade should only import OpenRefine projects from trusted sources." + "value": "OpenRefine is a free, open source tool for data processing. A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution in the context of the OpenRefine process if a user can be convinced to import it. The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible. Users unable to upgrade should only import OpenRefine projects from trusted sources." } ], "metrics": { @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -93,6 +93,10 @@ "Patch" ] }, + { + "url": "https://github.com/OpenRefine/OpenRefine/releases/tag/3.7.4", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-m88m-crr9-jvqq", "source": "security-advisories@github.com", @@ -100,6 +104,10 @@ "Vendor Advisory" ] }, + { + "url": "https://www.sonarsource.com/blog/openrefine-zip-slip", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/OpenRefine/OpenRefine/commit/e9c1e65d58b47aec8cd676bd5c07d97b002f205e", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47020.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47020.json index 23f3104232d..7567a110d04 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47020.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47020.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47020", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T16:15:46.377", - "lastModified": "2024-11-21T08:29:37.683", + "lastModified": "2025-06-10T16:15:34.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48786.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48786.json new file mode 100644 index 00000000000..f85826cdfd0 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48786.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48786", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:18:40.720", + "lastModified": "2025-06-10T17:18:40.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A server-side request forgery vulnerability [CWE-918] in Fortinet FortiClientEMS version 7.4.0 through 7.4.2 and before 7.2.6 may allow an authenticated attacker to perform internal requests via crafted HTTP or HTTPS requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-342", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52327.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52327.json index e38c3a1b281..7399cc21e12 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52327.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52327.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52327", "sourceIdentifier": "security@trendmicro.com", "published": "2024-01-23T21:15:09.467", - "lastModified": "2024-11-21T08:39:34.450", + "lastModified": "2025-06-10T16:15:34.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json index 5c37a630479..e2f64471f95 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26503", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T22:15:22.550", - "lastModified": "2024-11-21T09:02:31.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T16:05:55.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openeclass:openeclass:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.15", + "matchCriteriaId": "45900311-03AD-4215-809B-0565B400E43A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.less-secure.com/2024/03/open-eclass-cve-2024-26503-unrestricted.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.less-secure.com/2024/03/open-eclass-cve-2024-26503-unrestricted.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json index 4dbb45647ee..bfe5c31faf1 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26529", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T08:15:43.410", - "lastModified": "2024-11-21T09:02:32.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:31:53.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.5.3", + "matchCriteriaId": "4278199A-1B0D-4D5A-A3B3-0A90B1807021" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mz-automation/libiec61850/issues/492", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/mz-automation/libiec61850/issues/495", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/mz-automation/libiec61850/issues/492", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/mz-automation/libiec61850/issues/495", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json index cbf8a941a72..7811ba28097 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26540", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T01:15:58.833", - "lastModified": "2024-11-21T09:02:32.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:04:16.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cimg:cimg:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.3", + "matchCriteriaId": "BEF7F27C-B00C-41BE-9793-6F3EDA175ED7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/GreycLab/CImg/issues/403", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://github.com/GreycLab/CImg/issues/403", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json index 862a29174c2..2898f0d2c02 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27453", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T18:15:09.250", - "lastModified": "2024-11-21T09:04:38.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T17:58:18.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:extremenetworks:extremexos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "37518AD5-2C1D-4987-A763-C7FC979DE85E" + } + ] + } + ] + } + ], "references": [ { "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000118266", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.exsiliumsecurity.com/CVE-2024-27453.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000118266", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.exsiliumsecurity.com/CVE-2024-27453.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json index 0a7f9973909..9bba07736b0 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28390", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.640", - "lastModified": "2024-11-21T09:06:15.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:45:39.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:advancedplugins:image_toolbox\\:_webp_compress\\,_regenerate_\\&_more_prestashop_module:*:*:*:*:*:prestashop:*:*", + "versionEndExcluding": "2.2.01", + "matchCriteriaId": "5B7B02CA-66F0-49F9-B130-570D1F929804" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/03/12/ultimateimagetool.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/12/ultimateimagetool.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json index 41e82fe835c..30c4fa90dd8 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28391", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.697", - "lastModified": "2024-11-21T09:06:15.450", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:25:58.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fmemodules:b2b_quick_order_form:*:*:*:*:*:prestashop:*:*", + "versionEndExcluding": "1.3.0", + "matchCriteriaId": "8845FB21-8CFF-4662-885D-5756F9368B88" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/03/12/quickproducttable.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://security.friendsofpresta.org/modules/2024/03/12/quickproducttable.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json index 8c6a9d4b158..8561dd088d6 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28882", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T22:15:02.410", - "lastModified": "2024-11-21T09:07:06.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:26:09.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.11", + "matchCriteriaId": "0D6C4FD9-4627-4A45-89FC-2DB53985C516" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Mailing List" + ] }, { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json index 92815719eeb..0ef1b4f801c 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31580", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.783", - "lastModified": "2025-03-29T00:15:21.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T17:38:16.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:pytorch:*:*:*:*:*:python:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "CA1ACB1F-9056-4D41-A8C8-33921420D4C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/038c78f2f007345e6f497698ace2aa3d", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/pytorch/pytorch/commit/b5c3a17c2c207ebefcb85043f0cf94be9b2fef81", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://gist.github.com/1047524396/038c78f2f007345e6f497698ace2aa3d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/pytorch/pytorch/commit/b5c3a17c2c207ebefcb85043f0cf94be9b2fef81", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32119.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32119.json new file mode 100644 index 00000000000..76fd45b13a5 --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32119.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32119", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:19:14.323", + "lastModified": "2025-06-10T17:19:14.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper authentication vulnerability [CWE-287] in Fortinet FortiClientEMS version 7.4.0 and before 7.2.4 allows an unauthenticated attacker with the knowledge of the targeted user's FCTUID and VDOM to perform operations such as uploading or tagging on behalf of the targeted user via specially crafted TCP requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-375", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34347.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34347.json index 207d3d35086..2eed708679c 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34347.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34347.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34347", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-08T15:15:11.310", - "lastModified": "2024-11-21T09:18:28.767", + "lastModified": "2025-06-10T16:15:34.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,6 +60,10 @@ "url": "https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr", "source": "security-advisories@github.com" }, + { + "url": "https://www.sonarsource.com/blog/scripting-outside-the-box-api-client-security-risks-part-2", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/hoppscotch/hoppscotch/commit/22c6eabd133195d22874250a5ae40cb26b851b01", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json index a45cdb32298..cbb119e6657 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34462", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T19:15:46.510", - "lastModified": "2024-11-21T09:18:44.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T17:48:47.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alinto:sogo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.11.0", + "matchCriteriaId": "E309C481-3EA0-4400-9452-A37A193CC54A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Alinto/sogo/commit/2e37e59ed140d4aee0ff2fba579ca5f83f2c5920", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Alinto/sogo/commit/2e37e59ed140d4aee0ff2fba579ca5f83f2c5920", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34508.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34508.json index fcd1739f829..194857779d4 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34508.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34508.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34508", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T20:15:07.310", - "lastModified": "2025-03-26T20:15:20.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T17:44:33.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.6.9", + "matchCriteriaId": "469288BA-64CF-4825-A5A9-843595A8E58E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Mailing List" + ] }, { "url": "https://support.dcmtk.org/redmine/issues/1114", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Mailing List" + ] }, { "url": "https://support.dcmtk.org/redmine/issues/1114", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json index b6d5200e819..ba194d4222a 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34852", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.303", - "lastModified": "2024-11-21T09:19:29.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T17:21:00.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:f-logic:datacube3_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1F73E586-1AD1-4280-B63B-CFB91BD33BF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:f-logic:datacube3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0F1221C-A9CB-4625-AABD-2E4890FA6E93" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json index 1da7251ead0..c6f2c438bd4 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34854", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.373", - "lastModified": "2024-11-21T09:19:29.877", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T17:19:30.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:f-logic:datacube3_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1F73E586-1AD1-4280-B63B-CFB91BD33BF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:f-logic:datacube3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0F1221C-A9CB-4625-AABD-2E4890FA6E93" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json index 9da26a28a6b..1c9a1f8ad43 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35373", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T21:15:59.720", - "lastModified": "2024-11-21T09:20:13.487", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T17:25:52.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mocodo:mocodo_online:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.2.6", + "matchCriteriaId": "875ACC37-0FF7-442C-BC35-6C2561969747" + } + ] + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/mocodo-vulnerabilities/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://chocapikk.com/posts/2024/mocodo-vulnerabilities/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json index f1d4e52cbbe..6554240b575 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35374", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T21:15:59.793", - "lastModified": "2024-11-21T09:20:13.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T17:24:11.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mocodo:mocodo_online:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.2.6", + "matchCriteriaId": "875ACC37-0FF7-442C-BC35-6C2561969747" + } + ] + } + ] + } + ], "references": [ { "url": "https://chocapikk.com/posts/2024/mocodo-vulnerabilities/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://chocapikk.com/posts/2024/mocodo-vulnerabilities/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json index f7cab8f04eb..192883473ec 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35618", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T15:15:24.670", - "lastModified": "2024-11-21T09:20:31.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T17:30:59.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingcap:tidb:7.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E29ADD0B-CC40-4DA9-B9B8-3C12A76346FC" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/GaranR/0b75c6f2c0215db39c910022daf6522c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/pingcap/tidb/issues/52768", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Product" + ] }, { "url": "https://gist.github.com/GaranR/0b75c6f2c0215db39c910022daf6522c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/pingcap/tidb/issues/52768", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json index 27a937c200a..d3c622fd170 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4090", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-01T06:15:02.587", - "lastModified": "2024-08-01T14:35:12.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:12:04.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.2", + "matchCriteriaId": "7BE4A844-55AD-4E70-B83C-47BCA63E68F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/aedcb986-0f2b-4852-baf1-6cb61e83e109/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41797.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41797.json new file mode 100644 index 00000000000..7c2c48e31c7 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41797.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41797", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-06-10T16:15:34.990", + "lastModified": "2025-06-10T16:15:34.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.1), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.1), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.1), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.1), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.1), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.1), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.1), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.1), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.1), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.1), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.1), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.1), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.1), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.1), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.1), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.1), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.1), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.1), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.1), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.1), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.1), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.1), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.1), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.1), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.1), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.1), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.1), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.1), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.1), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.1), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.1), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.1), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.1), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.1), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.1), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.1), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.1), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.1), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.1), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.1), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.1). Affected devices contain an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with \"guest\" role to invoke an internal \"do system\" command which exceeds their privileges. This command allows the execution of certain low-risk actions, the most critical of which is clearing the local system log." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-633269.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json index 1b424949725..fe444352a66 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4217", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.097", - "lastModified": "2024-11-21T09:42:24.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:00:06.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "7.1.5", + "matchCriteriaId": "3F1B7BBC-4B80-4B84-ACBB-ED00473C995B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/55cb43bf-7c8f-4df7-b4de-bf2bb1c2766d/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/55cb43bf-7c8f-4df7-b4de-bf2bb1c2766d/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43706.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43706.json new file mode 100644 index 00000000000..e58f39b10fa --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43706.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43706", + "sourceIdentifier": "bressers@elastic.co", + "published": "2025-06-10T17:19:24.820", + "lastModified": "2025-06-10T17:19:24.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper authorization in Kibana can lead to privilege abuse via a direct HTTP request to a Synthetic monitor endpoint." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/kibana-8-12-1-security-update-esa-2024-21/379064", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45329.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45329.json new file mode 100644 index 00000000000..d7b49d1990d --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45329.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45329", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:19:25.083", + "lastModified": "2025-06-10T17:19:25.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A authorization bypass through user-controlled key in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.8 may allow an authenticated attacker to view unauthorized device information via key modification in API requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-274", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50562.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50562.json new file mode 100644 index 00000000000..b8b9c08a30f --- /dev/null +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50562.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50562", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:19:25.360", + "lastModified": "2025-06-10T17:19:25.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-339", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50568.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50568.json new file mode 100644 index 00000000000..e53ddb5044f --- /dev/null +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50568.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50568", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:19:25.660", + "lastModified": "2025-06-10T17:19:25.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-300" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-058", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json index 134ce9674de..6578bf5f768 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5198", "sourceIdentifier": "security@openvpn.net", "published": "2025-01-15T13:15:15.090", - "lastModified": "2025-01-15T15:15:13.607", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:12:09.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:ovpn-dco-win:1.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "264682CB-480A-4292-A9AA-055F693D5513" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5198", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54019.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54019.json new file mode 100644 index 00000000000..a4443b6e05e --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54019.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54019", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:19:40.090", + "lastModified": "2025-06-10T17:19:40.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A improper validation of certificate with host mismatch in Fortinet FortiClientWindows version 7.4.0, versions 7.2.0 through 7.2.6, and 7.0 all versions allow an unauthorized attacker to redirect VPN connections via DNS spoofing or another form of redirection." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-297" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-365", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json index 041ddd0a2dc..59a9221b118 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5594.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5594", "sourceIdentifier": "security@openvpn.net", "published": "2025-01-06T14:15:08.807", - "lastModified": "2025-04-02T21:15:31.310", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:26:11.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.11", + "matchCriteriaId": "0D6C4FD9-4627-4A45-89FC-2DB53985C516" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56181.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56181.json index bf1d3166361..3ab580b44a9 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56181.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56181.json @@ -2,13 +2,13 @@ "id": "CVE-2024-56181", "sourceIdentifier": "productcert@siemens.com", "published": "2025-03-11T10:15:15.597", - "lastModified": "2025-03-11T10:15:15.597", + "lastModified": "2025-06-10T16:15:35.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller." + "value": "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543A (All versions), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC RW-543B (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56182.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56182.json index d9db80e5e20..acc27c1e07f 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56182.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56182.json @@ -2,13 +2,13 @@ "id": "CVE-2024-56182", "sourceIdentifier": "productcert@siemens.com", "published": "2025-03-11T10:15:15.823", - "lastModified": "2025-03-11T10:15:15.823", + "lastModified": "2025-06-10T16:15:35.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions < V26.01.12), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller." + "value": "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions < V26.01.12), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543A (All versions), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC RW-543B (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57186.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57186.json new file mode 100644 index 00000000000..48fba374e5f --- /dev/null +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57186.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57186", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-10T17:19:40.367", + "lastModified": "2025-06-10T17:19:40.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Erxes <1.6.2, an unauthenticated attacker can read arbitrary files from the system using a Path Traversal vulnerability in the /read-file endpoint handler." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/erxes/erxes/commit/d626070a0fcd435ae29e689aca051ccfb440c2f3", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57189.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57189.json new file mode 100644 index 00000000000..b1db3c06655 --- /dev/null +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57189.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57189", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-10T17:20:09.367", + "lastModified": "2025-06-10T17:20:09.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Erxes <1.6.2, an authenticated attacker can write to arbitrary files on the system using a Path Traversal vulnerability in the importHistoriesCreate GraphQL mutation handler." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/erxes/erxes/commit/d626070a0fcd435ae29e689aca051ccfb440c2f3", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57190.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57190.json new file mode 100644 index 00000000000..fb5ac73d16e --- /dev/null +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57190.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57190", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-10T17:20:38.540", + "lastModified": "2025-06-10T17:20:38.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Erxes <1.6.1 is vulnerable to Incorrect Access Control. An attacker can bypass authentication by providing a \"User\" HTTP header that contains any user, allowing them to talk to any GraphQL endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6272.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6272.json index 5ff78c36913..3c22545ddef 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6272.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6272.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6272", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-31T06:15:03.637", - "lastModified": "2024-08-01T15:35:19.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:03:21.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:spidercontacts:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.7", + "matchCriteriaId": "7F07D1E0-93FE-4AF0-A718-D46665FE99A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/146b94df-7fc6-4da3-9ef1-d2875ae3fa9e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6412.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6412.json index 859f1f48b5b..291ad416918 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6412.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6412", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-31T06:15:04.083", - "lastModified": "2024-08-01T18:35:24.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:11:43.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibericode:html_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.34", + "matchCriteriaId": "7035651A-D81E-4060-822A-8FA84F1F4420" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/9eb0dad6-3c19-4fe4-a20d-d45b51410444/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json index 7f81f0e4d89..555073b6514 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6536", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:04.013", - "lastModified": "2024-11-21T09:49:50.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:01:07.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dylanjkotze:zephyr_project_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.99", + "matchCriteriaId": "0BF1CB7C-B902-40A1-A11C-83A98410ED86" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/ee40c1c6-4186-4b97-866c-fb0e76cedeb8/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://wpscan.com/vulnerability/ee40c1c6-4186-4b97-866c-fb0e76cedeb8/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json index e7bc9d07a1f..abe1bfff381 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8474", "sourceIdentifier": "security@openvpn.net", "published": "2025-01-06T15:15:14.983", - "lastModified": "2025-01-06T17:15:44.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T16:31:24.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:android:*:*", + "versionEndExcluding": "3.5.0", + "matchCriteriaId": "3C5CCC69-B938-4CCE-98B3-0B8064C987F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://openvpn.net/connect-docs/android-release-notes.html", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22251.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22251.json new file mode 100644 index 00000000000..f391d63ec25 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22251.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22251", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:21:08.117", + "lastModified": "2025-06-10T17:21:08.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-287", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22254.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22254.json new file mode 100644 index 00000000000..fe68e72487b --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22254.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22254", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:21:08.420", + "lastModified": "2025-06-10T17:21:08.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Privilege Management vulnerability [CWE-269] affecting Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16 and before 6.4.15, FortiProxy version 7.6.0 through 7.6.1 and before 7.4.7 & FortiWeb version 7.6.0 through 7.6.1 and before 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to\u00a0Node.js websocket module." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-006", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22256.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22256.json new file mode 100644 index 00000000000..1833505eed2 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22256.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22256", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:21:08.703", + "lastModified": "2025-06-10T17:21:08.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A improper handling of insufficient permissions or privileges in Fortinet FortiPAM 1.4.0 through 1.4.1, 1.3.0, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSRA 1.4.0 through 1.4.1 allows attacker to improper access control via specially crafted HTTP requests" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-008", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json index 8e6705b50a0..a10c6ab6fed 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23363.json @@ -2,13 +2,13 @@ "id": "CVE-2025-23363", "sourceIdentifier": "productcert@siemens.com", "published": "2025-02-11T11:15:16.250", - "lastModified": "2025-03-20T17:15:38.153", + "lastModified": "2025-06-10T16:15:35.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Teamcenter V14.1 (All versions), Teamcenter V14.2 (All versions), Teamcenter V14.3 (All versions), Teamcenter V2312 (All versions), Teamcenter V2406 (All versions), Teamcenter V2412 (All versions). The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-chosen URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link." + "value": "A vulnerability has been identified in Teamcenter V14.1 (All versions), Teamcenter V14.2 (All versions), Teamcenter V14.3 (All versions < V14.3.0.14), Teamcenter V2312 (All versions < V2312.0010), Teamcenter V2406 (All versions < V2406.0008), Teamcenter V2412 (All versions < V2412.0004). The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-chosen URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24065.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24065.json new file mode 100644 index 00000000000..be69ae1cd1d --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24065.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24065", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:08.970", + "lastModified": "2025-06-10T17:21:08.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24068.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24068.json new file mode 100644 index 00000000000..99447a68168 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24068.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24068", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:11.880", + "lastModified": "2025-06-10T17:21:11.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24069.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24069.json new file mode 100644 index 00000000000..ab8dd50f83e --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24069.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24069", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:14.257", + "lastModified": "2025-06-10T17:21:14.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24471.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24471.json new file mode 100644 index 00000000000..ab224b74410 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24471.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24471", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:21:16.277", + "lastModified": "2025-06-10T17:21:16.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An\u00a0Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, version 7.4.7 and below may allow an EAP verified remote user to connect from FortiClient via revoked certificate." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-544", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25250.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25250.json new file mode 100644 index 00000000000..c65b606910d --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25250.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25250", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:21:16.550", + "lastModified": "2025-06-10T17:21:16.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS version 7.6.0, version 7.4.7 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions SSL-VPN web-mode may allow an authenticated user to access full SSL-VPN settings via crafted URL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-257", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26468.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26468.json index 4052b821212..98e6d26ac54 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26468.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26468.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26468", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-06-09T23:15:21.753", - "lastModified": "2025-06-09T23:15:21.753", + "lastModified": "2025-06-10T16:15:36.120", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CyberData\u00a0\n011209 \n\n\nIntercom exposes features that could allow an unauthenticated to gain \naccess and cause a denial-of-service condition or system disruption." + }, + { + "lang": "es", + "value": "CyberData 011209 Intercom expone caracter\u00edsticas que podr\u00edan permitir que una persona no autenticada obtenga acceso y provoque una condici\u00f3n de denegaci\u00f3n de servicio o una interrupci\u00f3n del sistema." } ], "metrics": { @@ -89,6 +93,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27206.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27206.json new file mode 100644 index 00000000000..49e2fdc9857 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27206.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27206", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T16:15:36.273", + "lastModified": "2025-06-10T16:15:36.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain limited write access. Exploitation of this issue does not require user interaction." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27207.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27207.json new file mode 100644 index 00000000000..4f5ac8317e7 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27207.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27207", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T16:15:36.433", + "lastModified": "2025-06-10T16:15:36.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue does not require user interaction." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json index b48ae1b5e01..fa74ba09b3d 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27531", "sourceIdentifier": "security@apache.org", "published": "2025-06-06T15:15:23.883", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-10T16:15:36.583", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,34 @@ "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache InLong. Este problema afecta a Apache InLong: desde la versi\u00f3n 1.13.0 hasta la 2.1.0, este problema permit\u00eda a un atacante autenticado leer archivos arbitrarios mediante la escritura duplicada del par\u00e1metro. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.1.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27817.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27817.json index e493337e60e..e6e8648fe20 100644 --- a/CVE-2025/CVE-2025-278xx/CVE-2025-27817.json +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27817.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27817", "sourceIdentifier": "security@apache.org", "published": "2025-06-10T08:15:22.367", - "lastModified": "2025-06-10T08:15:22.367", + "lastModified": "2025-06-10T16:15:36.750", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including \"sasl.oauthbearer.token.endpoint.url\" and \"sasl.oauthbearer.jwks.endpoint.url\". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the \"sasl.oauthbearer.token.endpoint.url\" and \"sasl.oauthbearer.jwks.endpoint.url\" configuratin to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products. \n\nSince Apache Kafka 3.9.1/4.0.0, we have added a system property (\"-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls\") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly." + }, + { + "lang": "es", + "value": "Se ha identificado una posible vulnerabilidad de lectura de archivos arbitrarios y SSRF en el cliente Apache Kafka. Los clientes Apache Kafka aceptan datos de configuraci\u00f3n para establecer la conexi\u00f3n SASL/OAUTHBEARER con los br\u00f3keres, incluyendo \"sasl.oauthbearer.token.endpoint.url\" y \"sasl.oauthbearer.jwks.endpoint.url\". Apache Kafka permite a los clientes leer un archivo arbitrario y devolver el contenido en el registro de errores, o enviar solicitudes a una ubicaci\u00f3n no deseada. En aplicaciones donde las configuraciones de los clientes Apache Kafka pueden ser especificadas por un tercero no confiable, los atacantes pueden usar las configuraciones \"sasl.oauthbearer.token.endpoint.url\" y \"sasl.oauthbearer.jwks.endpoint.url\" para leer contenido arbitrario del disco y las variables de entorno, o realizar solicitudes a una ubicaci\u00f3n no deseada. En particular, esta falla puede utilizarse en Apache Kafka Connect para escalar desde el acceso a la API REST al acceso al sistema de archivos, entorno o URL, lo cual puede ser indeseable en ciertos entornos, incluidos los productos SaaS. A partir de Apache Kafka 3.9.1/4.0.0, hemos a\u00f1adido una propiedad del sistema (\"-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls\") para establecer las URL permitidas en la configuraci\u00f3n SASL JAAS. En la versi\u00f3n 3.9.1, acepta todas las URL de forma predeterminada para garantizar la compatibilidad con versiones anteriores. Sin embargo, a partir de la versi\u00f3n 4.0.0, el valor predeterminado es una lista vac\u00eda y los usuarios deben configurar las URL permitidas expl\u00edcitamente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://kafka.apache.org/cve-list", diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27818.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27818.json index 6fa4c0cd637..e6ffc9757ae 100644 --- a/CVE-2025/CVE-2025-278xx/CVE-2025-27818.json +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27818.json @@ -2,20 +2,47 @@ "id": "CVE-2025-27818", "sourceIdentifier": "security@apache.org", "published": "2025-06-10T08:15:22.533", - "lastModified": "2025-06-10T08:15:22.533", + "lastModified": "2025-06-10T16:15:36.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A possible security vulnerability has been identified in Apache Kafka.\nThis requires access to a alterConfig to the\u00a0cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config\nand a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0).\nWhen configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator\u00a0can set the `sasl.jaas.config`\nproperty for any of the connector's Kafka clients to \"com.sun.security.auth.module.LdapLoginModule\", which can be done via the\n`producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties.\nThis will allow the server to connect to the attacker's LDAP server\nand deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server.\nAttacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.\n\nSince Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box\nconfigurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector\nclient override policy that permits them.\n\nSince Apache Kafka 3.9.1/4.0.0, we have added a system property (\"-Dorg.apache.kafka.disallowed.login.modules\") to disable the problematic login modules usage\nin SASL JAAS configuration. Also by default \"com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule\" are disabled in Apache Kafka Connect 3.9.1/4.0.0. \n\nWe advise the Kafka users to validate connector configurations and only allow trusted LDAP configurations. Also examine connector dependencies for \nvulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally,\nin addition to leveraging the \"org.apache.kafka.disallowed.login.modules\" system property, Kafka Connect users can also implement their own connector\nclient config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot." + }, + { + "lang": "es", + "value": "Se ha identificado una posible vulnerabilidad de seguridad en Apache Kafka. Esta vulnerabilidad requiere acceso a un `alterConfig` del recurso del cl\u00faster o del trabajador de Kafka Connect, y la capacidad de crear o modificar conectores en \u00e9l con una configuraci\u00f3n SASL JAAS de cliente de Kafka arbitraria y un protocolo de seguridad basado en SASL. Esto es posible en cl\u00fasteres de Kafka desde Apache Kafka 2.0.0 (Kafka Connect 2.3.0). Al configurar el br\u00f3ker mediante el archivo de configuraci\u00f3n o el comando `AlterConfig`, o el conector mediante la API REST de Kafka Connect, un operador autenticado puede establecer la propiedad `sasl.jaas.config` para cualquiera de los clientes de Kafka del conector como \"com.sun.security.auth.module.LdapLoginModule\", lo cual se puede hacer mediante las propiedades `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config` o `admin.override.sasl.jaas.config`. Esto permitir\u00e1 que el servidor se conecte al servidor LDAP del atacante y deserialice la respuesta LDAP, que el atacante puede usar para ejecutar cadenas de gadgets de deserializaci\u00f3n de Java en el servidor de Kafka Connect. El atacante puede provocar la deserializaci\u00f3n sin restricciones de datos no confiables (o) una vulnerabilidad de RCE cuando hay gadgets en la ruta de clases. Desde Apache Kafka 3.0.0, los usuarios pueden especificar estas propiedades en las configuraciones del conector para cl\u00fasteres de Kafka Connect que se ejecutan con configuraciones predeterminadas. Antes de Apache Kafka 3.0.0, los usuarios no pod\u00edan especificar estas propiedades a menos que el cl\u00faster de Kafka Connect se hubiera reconfigurado con una pol\u00edtica de anulaci\u00f3n del cliente del conector que lo permitiera. Desde Apache Kafka 3.9.1/4.0.0, hemos a\u00f1adido una propiedad del sistema (\"-Dorg.apache.kafka.disallowed.login.modules\") para deshabilitar el uso problem\u00e1tico de los m\u00f3dulos de inicio de sesi\u00f3n en la configuraci\u00f3n SASL JAAS. Adem\u00e1s, \"com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule\" est\u00e1n deshabilitados de forma predeterminada en Apache Kafka Connect 3.9.1/4.0.0. Recomendamos a los usuarios de Kafka que validen las configuraciones de los conectores y solo permitan configuraciones LDAP confiables. Asimismo, examinen las dependencias de los conectores para detectar versiones vulnerables y actualicen sus conectores, ya sea actualizando esa dependencia espec\u00edfica o elimin\u00e1ndolos como opciones de soluci\u00f3n. Finalmente, adem\u00e1s de aprovechar la propiedad del sistema \"org.apache.kafka.disallowed.login.modules\", los usuarios de Kafka Connect pueden implementar su propia pol\u00edtica de anulaci\u00f3n de la configuraci\u00f3n del cliente del conector, que permite controlar qu\u00e9 propiedades del cliente de Kafka se pueden anular directamente en la configuraci\u00f3n del conector y cu\u00e1les no." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27819.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27819.json index 5c078014153..bdee8ca74a6 100644 --- a/CVE-2025/CVE-2025-278xx/CVE-2025-27819.json +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27819.json @@ -2,20 +2,47 @@ "id": "CVE-2025-27819", "sourceIdentifier": "security@apache.org", "published": "2025-06-10T08:15:22.687", - "lastModified": "2025-06-10T08:15:22.687", + "lastModified": "2025-06-10T16:15:37.083", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource.\n\n\nSince Apache Kafka 3.4.0, we have added a system property (\"-Dorg.apache.kafka.disallowed.login.modules\") to disable the problematic login modules usage in SASL JAAS configuration. Also by default \"com.sun.security.auth.module.JndiLoginModule\" is disabled in Apache Kafka 3.4.0, and \"com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule\" is disabled by default in in Apache Kafka 3.9.1/4.0.0" + }, + { + "lang": "es", + "value": "En CVE-2023-25194, anunciamos un ataque de RCE/denegaci\u00f3n de servicio mediante la configuraci\u00f3n JndiLoginModule de SASL JAAS en la API de Kafka Connect. Sin embargo, no solo la API de Kafka Connect es vulnerable a este ataque, sino que los brokers de Apache Kafka tambi\u00e9n presentan esta vulnerabilidad. Para explotar esta vulnerabilidad, el atacante debe poder conectarse al cl\u00faster de Kafka y tener el permiso AlterConfigs en el recurso del cl\u00faster. A partir de Apache Kafka 3.4.0, hemos a\u00f1adido una propiedad del sistema (\"-Dorg.apache.kafka.disallowed.login.modules\") para deshabilitar el uso problem\u00e1tico de los m\u00f3dulos de inicio de sesi\u00f3n en la configuraci\u00f3n de SASL JAAS. Tambi\u00e9n, de forma predeterminada, \"com.sun.security.auth.module.JndiLoginModule\" est\u00e1 deshabilitado en Apache Kafka 3.4.0, y \"com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule\" est\u00e1 deshabilitado de forma predeterminada en Apache Kafka 3.9.1/4.0.0" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29828.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29828.json new file mode 100644 index 00000000000..4476c402f16 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29828.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29828", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:17.087", + "lastModified": "2025-06-10T17:21:17.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30220.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30220.json new file mode 100644 index 00000000000..67e1f3d6206 --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30220.json @@ -0,0 +1,84 @@ +{ + "id": "CVE-2025-30220", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T16:15:37.387", + "lastModified": "2025-06-10T16:15:37.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. GeoTools Schema class use of Eclipse XSD library to represent schema data structure is vulnerable to XML External Entity (XXE) exploit. This impacts whoever exposes XML processing with gt-xsd-core involved in parsing, when the documents carry a reference to an external XML schema. The gt-xsd-core Schemas class is not using the EntityResolver provided by the ParserHandler (if any was configured). This also impacts users of gt-wfs-ng DataStore where the ENTITY_RESOLVER connection parameter was not being used as intended. This vulnerability is fixed in GeoTools 33.1, 32.3, 31.7, and 28.6.1, GeoServer 2.27.1, 2.26.3, and 2.25.7, and GeoNetwork 4.4.8 and 4.2.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://docs.geoserver.org/latest/en/user/production/config.html#production-config-external-entities", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geonetwork/core-geonetwork/pull/8757", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geonetwork/core-geonetwork/pull/8803", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geonetwork/core-geonetwork/pull/8812", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geonetwork/core-geonetwork/security/advisories/GHSA-2p76-gc46-5fvc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-jj54-8f66-c5pc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geotools/geotools/security/advisories/GHSA-826p-4gcg-35vw", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json index 0f21cf42870..df5648cd3c6 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json @@ -2,13 +2,13 @@ "id": "CVE-2025-30280", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:27.793", - "lastModified": "2025-04-14T08:15:13.823", + "lastModified": "2025-06-10T16:15:37.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions < V10.12.16), Mendix Runtime V10.18 (All versions < V10.18.5), Mendix Runtime V10.6 (All versions < V10.6.22), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.34). Affected applications allow for entity enumeration due to distinguishable responses in certain client actions. This could allow an unauthenticated remote attacker to list all valid entities and attribute names of a Mendix Runtime-based application." + "value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions < V10.12.16), Mendix Runtime V10.18 (All versions < V10.18.5), Mendix Runtime V10.6 (All versions < V10.6.22), Mendix Runtime V8 (All versions < V8.18.35), Mendix Runtime V9 (All versions < V9.24.34). Affected applications allow for entity enumeration due to distinguishable responses in certain client actions. This could allow an unauthenticated remote attacker to list all valid entities and attribute names of a Mendix Runtime-based application." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30317.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30317.json new file mode 100644 index 00000000000..11963e51a97 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30317.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30317", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:21:19.150", + "lastModified": "2025-06-10T17:21:19.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30321.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30321.json new file mode 100644 index 00000000000..512d9216617 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30321.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30321", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:21:21.627", + "lastModified": "2025-06-10T17:21:21.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31104.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31104.json new file mode 100644 index 00000000000..56247c7ab8d --- /dev/null +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31104.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31104", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-10T17:21:22.873", + "lastModified": "2025-06-10T17:21:22.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiADC 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2.0 through 7.2.7, 7.1.0 through 7.1.4, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated attacker to execute unauthorized code via crafted HTTP requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-099", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32454.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32454.json index 5d4ca05ac42..ed45222c004 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32454.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32454.json @@ -2,13 +2,13 @@ "id": "CVE-2025-32454", "sourceIdentifier": "productcert@siemens.com", "published": "2025-05-13T10:15:24.953", - "lastModified": "2025-05-13T19:35:18.080", + "lastModified": "2025-06-10T16:15:37.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.14), Teamcenter Visualization V2312 (All versions < V2312.0010), Teamcenter Visualization V2406 (All versions < V2406.0008), Teamcenter Visualization V2412 (All versions < V2412.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.14), Teamcenter Visualization V2312 (All versions < V2312.0010), Teamcenter Visualization V2406 (All versions < V2406.0008), Teamcenter Visualization V2412 (All versions < V2412.0004), Tecnomatix Plant Simulation V2404 (All versions < V2404.0013). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -96,6 +96,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-486186.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-542540.html", "source": "productcert@siemens.com" diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32710.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32710.json new file mode 100644 index 00000000000..12d1178ad9c --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32710.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32710", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:45.853", + "lastModified": "2025-06-10T17:21:45.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32712.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32712.json new file mode 100644 index 00000000000..3420ae7190a --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32712.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32712", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:47.883", + "lastModified": "2025-06-10T17:21:47.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32713.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32713.json new file mode 100644 index 00000000000..acdb1284485 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32713.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32713", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:49.897", + "lastModified": "2025-06-10T17:21:49.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32714.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32714.json new file mode 100644 index 00000000000..4dba5a5a6e8 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32714.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32714", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:51.843", + "lastModified": "2025-06-10T17:21:51.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows Installer allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32715.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32715.json new file mode 100644 index 00000000000..ec3c5f6a15b --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32715.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32715", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:53.943", + "lastModified": "2025-06-10T17:21:53.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32716.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32716.json new file mode 100644 index 00000000000..80dfb3fe1ab --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32716.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32716", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:56.087", + "lastModified": "2025-06-10T17:21:56.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Media allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32718.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32718.json new file mode 100644 index 00000000000..e2801f538ed --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32718.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32718", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:21:58.097", + "lastModified": "2025-06-10T17:21:58.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Integer overflow or wraparound in Windows SMB allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32719.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32719.json new file mode 100644 index 00000000000..31c0469d64e --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32719.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32719", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:00.110", + "lastModified": "2025-06-10T17:22:00.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32720.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32720.json new file mode 100644 index 00000000000..64997e73ed1 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32720.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32720", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:02.053", + "lastModified": "2025-06-10T17:22:02.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32721.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32721.json new file mode 100644 index 00000000000..67e04d9ab60 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32721.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32721", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:04.147", + "lastModified": "2025-06-10T17:22:04.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper link resolution before file access ('link following') in Windows Recovery Driver allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32722.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32722.json new file mode 100644 index 00000000000..e63bb370fe8 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32722.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32722", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:06.363", + "lastModified": "2025-06-10T17:22:06.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows Storage Port Driver allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32724.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32724.json new file mode 100644 index 00000000000..f448ed1fd72 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32724.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32724", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:08.343", + "lastModified": "2025-06-10T17:22:08.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32725.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32725.json new file mode 100644 index 00000000000..583c108761f --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32725.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32725", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:10.373", + "lastModified": "2025-06-10T17:22:10.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33050.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33050.json new file mode 100644 index 00000000000..663e55c1460 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33050.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33050", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:12.643", + "lastModified": "2025-06-10T17:22:12.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33052.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33052.json new file mode 100644 index 00000000000..e404958fc1c --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33052.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33052", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:16.713", + "lastModified": "2025-06-10T17:22:16.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of uninitialized resource in Windows DWM Core Library allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json new file mode 100644 index 00000000000..62f84e57d9f --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33053", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:18.853", + "lastModified": "2025-06-10T17:22:18.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33055.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33055.json new file mode 100644 index 00000000000..bfc8f264282 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33055.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33055", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:21.100", + "lastModified": "2025-06-10T17:22:21.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33056.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33056.json new file mode 100644 index 00000000000..fb1a730242e --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33056.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33056", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:23.163", + "lastModified": "2025-06-10T17:22:23.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Microsoft Local Security Authority Server (lsasrv) allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33057.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33057.json new file mode 100644 index 00000000000..f229445f5c9 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33057.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33057", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:25.360", + "lastModified": "2025-06-10T17:22:25.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Null pointer dereference in Windows Local Security Authority (LSA) allows an authorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33058.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33058.json new file mode 100644 index 00000000000..ed5820dacef --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33058.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33058", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:27.967", + "lastModified": "2025-06-10T17:22:27.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33059.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33059.json new file mode 100644 index 00000000000..1306de57ff9 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33059.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33059", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:30.727", + "lastModified": "2025-06-10T17:22:30.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33060.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33060.json new file mode 100644 index 00000000000..ff3923219a1 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33060.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33060", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:33.300", + "lastModified": "2025-06-10T17:22:33.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33061.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33061.json new file mode 100644 index 00000000000..4f1de47620c --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33061.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33061", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:35.353", + "lastModified": "2025-06-10T17:22:35.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33062.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33062.json new file mode 100644 index 00000000000..8fe1d782169 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33062.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33062", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:37.330", + "lastModified": "2025-06-10T17:22:37.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33063.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33063.json new file mode 100644 index 00000000000..6e61d8e993d --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33063.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33063", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:39.490", + "lastModified": "2025-06-10T17:22:39.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33064.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33064.json new file mode 100644 index 00000000000..a44e173c947 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33064.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33064", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:43.050", + "lastModified": "2025-06-10T17:22:43.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33065.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33065.json new file mode 100644 index 00000000000..1ac59b3e642 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33065.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33065", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:45.323", + "lastModified": "2025-06-10T17:22:45.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33066.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33066.json new file mode 100644 index 00000000000..c653d25860d --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33066.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33066", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:47.313", + "lastModified": "2025-06-10T17:22:47.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33067.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33067.json new file mode 100644 index 00000000000..c9b472b3564 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33067.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33067", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:49.647", + "lastModified": "2025-06-10T17:22:49.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper privilege management in Windows Kernel allows an unauthorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33068.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33068.json new file mode 100644 index 00000000000..5f26b0379f8 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33068.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33068", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:51.657", + "lastModified": "2025-06-10T17:22:51.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33069.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33069.json new file mode 100644 index 00000000000..4a97a36e393 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33069.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33069", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:53.657", + "lastModified": "2025-06-10T17:22:53.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper verification of cryptographic signature in App Control for Business (WDAC) allows an unauthorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33070.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33070.json new file mode 100644 index 00000000000..1ca3bfb969d --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33070.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33070", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:55.743", + "lastModified": "2025-06-10T17:22:55.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33071.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33071.json new file mode 100644 index 00000000000..d39c7a90453 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33071.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33071", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:22:59.847", + "lastModified": "2025-06-10T17:22:59.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33073.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33073.json new file mode 100644 index 00000000000..4f22fe4a5d1 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33073.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33073", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:02.967", + "lastModified": "2025-06-10T17:23:02.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33075.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33075.json new file mode 100644 index 00000000000..9074ffafcb5 --- /dev/null +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33075.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33075", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:08.797", + "lastModified": "2025-06-10T17:23:08.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-331xx/CVE-2025-33112.json b/CVE-2025/CVE-2025-331xx/CVE-2025-33112.json new file mode 100644 index 00000000000..0f12b9ffa87 --- /dev/null +++ b/CVE-2025/CVE-2025-331xx/CVE-2025-33112.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-33112", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-10T17:23:11.607", + "lastModified": "2025-06-10T17:23:11.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM AIX 7.3 and IBM VIOS 4.1.1 Perl implementation could allow a non-privileged local user to exploit a vulnerability to execute arbitrary code due to improper neutralization of pathname input." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7236103", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json index f320e224c33..f4f5873714f 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json @@ -2,20 +2,51 @@ "id": "CVE-2025-3581", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-09T06:15:25.067", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T16:15:38.080", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Newsletter WordPress plugin before 8.8.5 does not validate and escape some of its Widget options before outputting them back in a page/post where the block is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Newsletter de WordPress anterior a la versi\u00f3n 8.8.5 no valida ni escapa algunas de las opciones de su widget antes de mostrarlas nuevamente en una p\u00e1gina o publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/2d96f018-510d-40ab-9e73-76fa44784813/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/2d96f018-510d-40ab-9e73-76fa44784813/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json index f4507d4fc46..9635d0e05f8 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json @@ -2,20 +2,51 @@ "id": "CVE-2025-3582", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-09T06:15:25.200", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T16:15:38.227", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Newsletter WordPress plugin before 8.85 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Newsletter de WordPress anterior a la versi\u00f3n 8.85 no depura ni escapa de algunas de las configuraciones de formulario, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/19db8521-8dff-48c5-b21a-1001895292e0/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/19db8521-8dff-48c5-b21a-1001895292e0/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-371xx/CVE-2025-37100.json b/CVE-2025/CVE-2025-371xx/CVE-2025-37100.json index 55438531d7d..10273337e13 100644 --- a/CVE-2025/CVE-2025-371xx/CVE-2025-37100.json +++ b/CVE-2025/CVE-2025-371xx/CVE-2025-37100.json @@ -2,7 +2,7 @@ "id": "CVE-2025-37100", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-06-10T15:15:24.233", - "lastModified": "2025-06-10T15:15:24.233", + "lastModified": "2025-06-10T16:15:37.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,22 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04883en_us&docLocale=en_US", diff --git a/CVE-2025/CVE-2025-405xx/CVE-2025-40567.json b/CVE-2025/CVE-2025-405xx/CVE-2025-40567.json new file mode 100644 index 00000000000..573698c55b2 --- /dev/null +++ b/CVE-2025/CVE-2025-405xx/CVE-2025-40567.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-40567", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-06-10T16:15:38.357", + "lastModified": "2025-06-10T16:15:38.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). The \"Load Rollback\" functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with \"guest\" role to make the affected product roll back configuration changes made by privileged users." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-693776.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-405xx/CVE-2025-40568.json b/CVE-2025/CVE-2025-405xx/CVE-2025-40568.json new file mode 100644 index 00000000000..79b69477f8a --- /dev/null +++ b/CVE-2025/CVE-2025-405xx/CVE-2025-40568.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-40568", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-06-10T16:15:38.537", + "lastModified": "2025-06-10T16:15:38.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). An internal session termination functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with \"guest\" role to terminate legitimate users' sessions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-693776.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-405xx/CVE-2025-40569.json b/CVE-2025/CVE-2025-405xx/CVE-2025-40569.json new file mode 100644 index 00000000000..75fa837708e --- /dev/null +++ b/CVE-2025/CVE-2025-405xx/CVE-2025-40569.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-40569", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-06-10T16:15:38.727", + "lastModified": "2025-06-10T16:15:38.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). The \"Load Configuration from Local PC\" functionality in the web interface of affected products contains a race condition vulnerability. This could allow an authenticated remote attacker to make the affected product load an attacker controlled configuration instead of the legitimate one. Successful exploitation requires that a legitimate administrator invokes the functionality and the attacker wins the race condition." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-693776.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-405xx/CVE-2025-40585.json b/CVE-2025/CVE-2025-405xx/CVE-2025-40585.json new file mode 100644 index 00000000000..3ba948085d1 --- /dev/null +++ b/CVE-2025/CVE-2025-405xx/CVE-2025-40585.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-40585", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-06-10T16:15:38.943", + "lastModified": "2025-06-10T16:15:38.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Energy Services (All versions with G5DFR). Affected solutions using G5DFR contain default credentials. This could allow an attacker to gain control of G5DFR component and tamper with outputs from the device." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.5, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-345750.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-405xx/CVE-2025-40591.json b/CVE-2025/CVE-2025-405xx/CVE-2025-40591.json new file mode 100644 index 00000000000..98029f9a8e9 --- /dev/null +++ b/CVE-2025/CVE-2025-405xx/CVE-2025-40591.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-40591", + "sourceIdentifier": "productcert@siemens.com", + "published": "2025-06-10T16:15:39.123", + "lastModified": "2025-06-10T16:15:39.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.5), RUGGEDCOM ROX MX5000RE (All versions < V2.16.5), RUGGEDCOM ROX RX1400 (All versions < V2.16.5), RUGGEDCOM ROX RX1500 (All versions < V2.16.5), RUGGEDCOM ROX RX1501 (All versions < V2.16.5), RUGGEDCOM ROX RX1510 (All versions < V2.16.5), RUGGEDCOM ROX RX1511 (All versions < V2.16.5), RUGGEDCOM ROX RX1512 (All versions < V2.16.5), RUGGEDCOM ROX RX1524 (All versions < V2.16.5), RUGGEDCOM ROX RX1536 (All versions < V2.16.5), RUGGEDCOM ROX RX5000 (All versions < V2.16.5). The 'Log Viewers' tool in the web interface of affected devices is vulnerable to command injection due to missing server side input sanitation. This could allow an authenticated remote attacker to execute the 'tail' command with root privileges and disclose contents of all files in the filesystem." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-602" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-301229.html", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43558.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43558.json new file mode 100644 index 00000000000..cebb6d403a0 --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43558.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43558", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:14.190", + "lastModified": "2025-06-10T17:23:14.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43585.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43585.json new file mode 100644 index 00000000000..5da1a2da07f --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43585.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43585", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T16:15:40.043", + "lastModified": "2025-06-10T16:15:40.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access leading to a limited impact to confidentiality and a high impact to integrity. Exploitation of this issue does not require user interaction." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43586.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43586.json new file mode 100644 index 00000000000..dc033b53c2d --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43586.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43586", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T16:15:40.207", + "lastModified": "2025-06-10T16:15:40.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized elevated access. Exploitation of this issue does not require user interaction." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43589.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43589.json new file mode 100644 index 00000000000..a098512446d --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43589.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43589", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:15.613", + "lastModified": "2025-06-10T17:23:15.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43590.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43590.json new file mode 100644 index 00000000000..852535ad3cf --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43590.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43590", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:16.903", + "lastModified": "2025-06-10T17:23:16.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43593.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43593.json new file mode 100644 index 00000000000..8fc01ae5b47 --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43593.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43593", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:18.123", + "lastModified": "2025-06-10T17:23:18.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-436xx/CVE-2025-43699.json b/CVE-2025/CVE-2025-436xx/CVE-2025-43699.json index b8528cdb8d2..d0d7b450ffc 100644 --- a/CVE-2025/CVE-2025-436xx/CVE-2025-43699.json +++ b/CVE-2025/CVE-2025-436xx/CVE-2025-43699.json @@ -2,16 +2,43 @@ "id": "CVE-2025-43699", "sourceIdentifier": "security@salesforce.com", "published": "2025-06-10T12:15:24.357", - "lastModified": "2025-06-10T12:15:24.357", + "lastModified": "2025-06-10T16:15:40.353", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for OmniUICard objects.\u00a0\n\nThis impacts OmniStudio: before Spring 2025" + }, + { + "lang": "es", + "value": "La vulnerabilidad de conservaci\u00f3n incorrecta de permisos en Salesforce OmniStudio (FlexCards) permite eludir los controles de seguridad de campo para objetos OmniUICard. Esto afecta a OmniStudio: antes de la primavera de 2025." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@salesforce.com", diff --git a/CVE-2025/CVE-2025-437xx/CVE-2025-43700.json b/CVE-2025/CVE-2025-437xx/CVE-2025-43700.json index fe1fc2d8985..87063a8a568 100644 --- a/CVE-2025/CVE-2025-437xx/CVE-2025-43700.json +++ b/CVE-2025/CVE-2025-437xx/CVE-2025-43700.json @@ -2,16 +2,43 @@ "id": "CVE-2025-43700", "sourceIdentifier": "security@salesforce.com", "published": "2025-06-10T12:15:24.483", - "lastModified": "2025-06-10T12:15:24.483", + "lastModified": "2025-06-10T16:15:40.513", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data.\u00a0\n\nThis impacts OmniStudio: before Spring 2025." + }, + { + "lang": "es", + "value": "La vulnerabilidad de conservaci\u00f3n incorrecta de permisos en Salesforce OmniStudio (FlexCards) permite la exposici\u00f3n de datos cifrados. Esto afecta a OmniStudio: antes de la primavera de 2025." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@salesforce.com", diff --git a/CVE-2025/CVE-2025-437xx/CVE-2025-43701.json b/CVE-2025/CVE-2025-437xx/CVE-2025-43701.json index 72ef4cbc51b..28d13772bfa 100644 --- a/CVE-2025/CVE-2025-437xx/CVE-2025-43701.json +++ b/CVE-2025/CVE-2025-437xx/CVE-2025-43701.json @@ -2,16 +2,43 @@ "id": "CVE-2025-43701", "sourceIdentifier": "security@salesforce.com", "published": "2025-06-10T12:15:24.607", - "lastModified": "2025-06-10T12:15:24.607", + "lastModified": "2025-06-10T16:15:40.667", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data.\u00a0\n\nThis impacts OmniStudio: before version 254." + }, + { + "lang": "es", + "value": "La vulnerabilidad de conservaci\u00f3n incorrecta de permisos en Salesforce OmniStudio (FlexCards) permite la exposici\u00f3n de datos de configuraci\u00f3n personalizada. Esto afecta a OmniStudio: versiones anteriores a la 254." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@salesforce.com", diff --git a/CVE-2025/CVE-2025-440xx/CVE-2025-44043.json b/CVE-2025/CVE-2025-440xx/CVE-2025-44043.json new file mode 100644 index 00000000000..e1b228fbd87 --- /dev/null +++ b/CVE-2025/CVE-2025-440xx/CVE-2025-44043.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-44043", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-10T16:15:40.823", + "lastModified": "2025-06-10T16:15:40.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Keyoti SearchUnit prior to 9.0.0. is vulnerable to Server-Side Request Forgery (SSRF) in /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetResults and /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetLocationAndContentCategories. An attacker can specify their own SMB server as the indexDirectory value when making POST requests to the affected components. In doing so an attacker can get the SearchUnit server to read and write configuration and log files from/to the attackers server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://keyoti.com/products/search/dotNetWeb/HtmlHelp9/?topic=UserGuide/Release%20Notes.htm", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sprocketsecurity.com/blog/cve-alert-cve-2025-44043-cve-2025-44044-the-search-bar-hacks-arent-dead-yet", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-440xx/CVE-2025-44044.json b/CVE-2025/CVE-2025-440xx/CVE-2025-44044.json new file mode 100644 index 00000000000..fe8c966889e --- /dev/null +++ b/CVE-2025/CVE-2025-440xx/CVE-2025-44044.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-44044", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-10T16:15:40.940", + "lastModified": "2025-06-10T16:15:40.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Keyoti SearchUnit prior to 9.0.0. is vulnerable to XML External Entity (XXE). An attacker who can force a vulnerable SearchUnit host into parsing maliciously crafted XML and/or DTD files can exfiltrate some files from the underlying operating system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://keyoti.com/products/search/dotNetWeb/HtmlHelp9/?topic=UserGuide/Release%20Notes.htm", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sprocketsecurity.com/blog/cve-alert-cve-2025-44043-cve-2025-44044-the-search-bar-hacks-arent-dead-yet", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46178.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46178.json index 59421f46aab..194d9053f85 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46178.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46178.json @@ -2,20 +2,63 @@ "id": "CVE-2025-46178", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-09T16:15:40.800", - "lastModified": "2025-06-09T16:15:40.800", + "lastModified": "2025-06-10T16:15:41.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting (XSS) vulnerability exists in askquery.php via the eid parameter in the CloudClassroom PHP Project. This allows remote attackers to inject arbitrary JavaScript in the context of a victim s browser session by sending a crafted URL, leading to session hijacking or defacement." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) en askquery.php a trav\u00e9s del par\u00e1metro eid en CloudClassroom PHP Project. Esto permite a atacantes remotos inyectar JavaScript arbitrario en el contexto de la sesi\u00f3n del navegador de la v\u00edctima mediante el env\u00edo de una URL manipulada, lo que provoca el secuestro o la desfiguraci\u00f3n de la sesi\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/SacX-7/CVE-2025-46178/blob/main/Cross-Site%20Scripting%20%28XSS%29%20in%20CloudClassroom%20PHP%20Project", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SacX-7/CVE-2025-46178/blob/main/Cross-Site%20Scripting%20%28XSS%29%20in%20CloudClassroom%20PHP%20Project", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4653.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4653.json new file mode 100644 index 00000000000..5537810d6e9 --- /dev/null +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4653.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4653", + "sourceIdentifier": "security@pandorafms.com", + "published": "2025-06-10T16:15:42.607", + "lastModified": "2025-06-10T16:15:42.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements in the backup name field may allow OS command injection. This issue affects Pandora ITSM 5.0.105." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@pandorafms.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:M/U:Green", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "NO", + "Recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@pandorafms.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/", + "source": "security@pandorafms.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4678.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4678.json new file mode 100644 index 00000000000..48021f6cb34 --- /dev/null +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4678.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-4678", + "sourceIdentifier": "security@pandorafms.com", + "published": "2025-06-10T16:15:42.800", + "lastModified": "2025-06-10T16:15:42.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements in the chromium_path variable may allow OS command injection. This issue affects Pandora ITSM 5.0.105." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@pandorafms.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:M/U:Green", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "NO", + "Recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@pandorafms.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/", + "source": "security@pandorafms.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47104.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47104.json new file mode 100644 index 00000000000..eeede3730a7 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47104.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47104", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:19.443", + "lastModified": "2025-06-10T17:23:19.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47105.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47105.json new file mode 100644 index 00000000000..4fa69302248 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47105.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47105", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:20.873", + "lastModified": "2025-06-10T17:23:20.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47106.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47106.json new file mode 100644 index 00000000000..7f9593be4be --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47106.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47106", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:22.100", + "lastModified": "2025-06-10T17:23:22.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-53.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47108.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47108.json new file mode 100644 index 00000000000..22961fdebb5 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47108.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47108", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T17:23:23.340", + "lastModified": "2025-06-10T17:23:23.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 11.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-58.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47110.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47110.json new file mode 100644 index 00000000000..527d3051df0 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47110.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47110", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-06-10T16:15:41.210", + "lastModified": "2025-06-10T16:15:41.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47160.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47160.json new file mode 100644 index 00000000000..fd3ace885b2 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47160.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47160", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:24.643", + "lastModified": "2025-06-10T17:23:24.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47162.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47162.json new file mode 100644 index 00000000000..0a354d4216d --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47162.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47162", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:26.630", + "lastModified": "2025-06-10T17:23:26.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47162", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47163.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47163.json new file mode 100644 index 00000000000..fb4c92b55a6 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47163.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47163", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:28.840", + "lastModified": "2025-06-10T17:23:28.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47164.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47164.json new file mode 100644 index 00000000000..d43ab82e9dd --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47164.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47164", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:31.333", + "lastModified": "2025-06-10T17:23:31.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47164", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47165.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47165.json new file mode 100644 index 00000000000..89cb82b57f3 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47165.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47165", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:36.527", + "lastModified": "2025-06-10T17:23:36.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47165", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47166.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47166.json new file mode 100644 index 00000000000..24b4116a3af --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47166.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47166", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:38.753", + "lastModified": "2025-06-10T17:23:38.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47167.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47167.json new file mode 100644 index 00000000000..e987df5b1c3 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47167.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47167", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:41.107", + "lastModified": "2025-06-10T17:23:41.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47167", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47168.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47168.json new file mode 100644 index 00000000000..89b0ee1b033 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47168.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47168", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:43.307", + "lastModified": "2025-06-10T17:23:43.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47169.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47169.json new file mode 100644 index 00000000000..8d2578cfb9f --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47169.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47169", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:45.317", + "lastModified": "2025-06-10T17:23:45.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47170.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47170.json new file mode 100644 index 00000000000..daa235136ce --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47170.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47170", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:47.287", + "lastModified": "2025-06-10T17:23:47.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47170", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47171.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47171.json new file mode 100644 index 00000000000..6063141f045 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47171.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47171", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:49.350", + "lastModified": "2025-06-10T17:23:49.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Microsoft Office Outlook allows an authorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47171", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47172.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47172.json new file mode 100644 index 00000000000..7110d6ebd15 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47172.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47172", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:51.607", + "lastModified": "2025-06-10T17:23:51.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47172", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47173.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47173.json new file mode 100644 index 00000000000..6308dda6a52 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47173.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47173", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:53.543", + "lastModified": "2025-06-10T17:23:53.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-641" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47173", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47174.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47174.json new file mode 100644 index 00000000000..877b7bd7440 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47174.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47174", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:55.607", + "lastModified": "2025-06-10T17:23:55.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47174", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47175.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47175.json new file mode 100644 index 00000000000..55aaff830f4 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47175.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47175", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:57.607", + "lastModified": "2025-06-10T17:23:57.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47175", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47176.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47176.json new file mode 100644 index 00000000000..c0ae7018fc8 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47176.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-47176", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:23:59.800", + "lastModified": "2025-06-10T17:23:59.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "'.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47953.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47953.json new file mode 100644 index 00000000000..09ae501aa60 --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47953.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47953", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:01.917", + "lastModified": "2025-06-10T17:24:01.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-641" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47953", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47955.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47955.json new file mode 100644 index 00000000000..8a0ec439c28 --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47955.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47955", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:03.870", + "lastModified": "2025-06-10T17:24:03.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47956.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47956.json new file mode 100644 index 00000000000..471ce2418ab --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47956.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47956", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:06.050", + "lastModified": "2025-06-10T17:24:06.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47957.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47957.json new file mode 100644 index 00000000000..bc92156a8a2 --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47957.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47957", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:08.037", + "lastModified": "2025-06-10T17:24:08.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47957", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47962.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47962.json new file mode 100644 index 00000000000..821289111cf --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47962.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47962", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:10.140", + "lastModified": "2025-06-10T17:24:10.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows SDK allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47968.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47968.json new file mode 100644 index 00000000000..c66d409abc0 --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47968.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47968", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:13.030", + "lastModified": "2025-06-10T17:24:13.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47968", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47969.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47969.json new file mode 100644 index 00000000000..80d309f4f02 --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47969.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47969", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:15.183", + "lastModified": "2025-06-10T17:24:15.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive information to an unauthorized actor in Windows Hello allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47977.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47977.json new file mode 100644 index 00000000000..a8b76a69cfe --- /dev/null +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47977.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47977", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-10T17:24:17.200", + "lastModified": "2025-06-10T17:24:17.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of input during web page generation ('cross-site scripting') in Nuance Digital Engagement Platform allows an authorized attacker to perform spoofing over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47977", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48067.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48067.json new file mode 100644 index 00000000000..87289a0f84f --- /dev/null +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48067.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-48067", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T16:15:41.357", + "lastModified": "2025-06-10T16:15:41.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OctoPrint/OctoPrint/commit/9984b20773f5895a432f965b759999b16c57f7d8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-m9jh-jf9h-x3h2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48432.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48432.json index 4e95b954018..6892ea748cd 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48432.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48432.json @@ -2,13 +2,13 @@ "id": "CVE-2025-48432", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-05T03:15:25.563", - "lastModified": "2025-06-05T20:12:23.777", + "lastModified": "2025-06-10T17:24:19.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2.22. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems." + "value": "An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve@mitre.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -64,9 +64,21 @@ "url": "https://www.djangoproject.com/weblog/2025/jun/04/security-releases/", "source": "cve@mitre.org" }, + { + "url": "https://www.djangoproject.com/weblog/2025/jun/10/bugfix-releases/", + "source": "cve@mitre.org" + }, { "url": "http://www.openwall.com/lists/oss-security/2025/06/04/5", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/10/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/10/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48879.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48879.json new file mode 100644 index 00000000000..cb5fdd80779 --- /dev/null +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48879.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-48879", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T16:15:41.513", + "lastModified": "2025-06-10T16:15:41.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows any unauthenticated attacker to send a manipulated broken multipart/form-data request to OctoPrint and through that make the web server component become unresponsive. The issue can be triggered by a broken multipart/form-data request lacking an end boundary to any of OctoPrint's endpoints implemented through the octoprint.server.util.tornado.UploadStorageFallbackHandler request handler. The request handler will get stuck in an endless busy loop, looking for a part of the request that will never come. As Tornado is single-threaded, that will effectively block the whole web server. The vulnerability has been patched in version 1.11.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-140" + }, + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OctoPrint/OctoPrint/commit/c9c35c17bd820f19c6b12e6c0359fc0cfdd0c1ec", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-9wj4-8h85-pgrw", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48937.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48937.json new file mode 100644 index 00000000000..06b588aed57 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48937.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-48937", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T16:15:41.670", + "lastModified": "2025-06-10T16:15:41.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "matrix-rust-sdk is an implementation of a Matrix client-server library in Rust. matrix-sdk-crypto since version 0.8.0 and up to 0.11.0 does not correctly validate the sender of an encrypted event. Accordingly, a malicious homeserver operator can modify events served to clients, making those events appear to the recipient as if they were sent by another user. This vulnerability is fixed in 0.11.1 and 0.12.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/matrix-rust-sdk/commit/13c1d2048286bbabf5e7bc6b015aafee98f04d55", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/matrix-rust-sdk/commit/56980745b4f27f7dc72ac296e6aa003e5d92a75b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/matrix-rust-sdk/security/advisories/GHSA-x958-rvg6-956w", + "source": "security-advisories@github.com" + }, + { + "url": "https://spec.matrix.org/v1.14/client-server-api/#mmegolmv1aes-sha2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4801.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4801.json new file mode 100644 index 00000000000..f73939e612a --- /dev/null +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4801.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-4801", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-10T16:15:42.923", + "lastModified": "2025-06-10T16:15:42.923", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49137.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49137.json index 0d6b69a50da..afbb00361c7 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49137.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49137.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49137", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-09T21:15:46.890", - "lastModified": "2025-06-09T21:15:46.890", + "lastModified": "2025-06-10T16:15:41.880", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, the application does not sufficiently sanitize user input, allowing for the execution of arbitrary JavaScript code. The 'saveNode' and 'saveManifest' endpoints take user input and store it in the JSON schema for the site. This content is then rendered in the generated HAX site. Although the application does not allow users to supply a `script` tag, it does allow the use of other HTML tags to run JavaScript. Version 11.0.0 fixes the issue." + }, + { + "lang": "es", + "value": "HAX CMS PHP permite a los usuarios gestionar su universo de micrositios con un backend PHP. Antes de la versi\u00f3n 11.0.0, la aplicaci\u00f3n no depuraba adecuadamente la entrada del usuario, lo que permit\u00eda la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario. Los endpoints \"saveNode\" y \"saveManifest\" reciben la entrada del usuario y la almacenan en el esquema JSON del sitio. Este contenido se renderiza en el sitio HAX generado. Aunque la aplicaci\u00f3n no permite a los usuarios proporcionar una etiqueta `script`, s\u00ed permite el uso de otras etiquetas HTML para ejecutar JavaScript. La versi\u00f3n 11.0.0 soluciona este problema." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -63,6 +67,10 @@ { "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-2vc4-3hx7-v7v7", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-2vc4-3hx7-v7v7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49138.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49138.json index f7c51290fdb..0aa427a8c9b 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49138.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49138.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49138", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-09T21:15:47.047", - "lastModified": "2025-06-09T21:15:47.047", + "lastModified": "2025-06-10T16:15:41.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -59,6 +59,10 @@ { "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-hxrr-x32w-cg8g", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-hxrr-x32w-cg8g", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49139.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49139.json index 05e7c043d4b..4e5978c6d39 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49139.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49139.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49139", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-09T21:15:47.203", - "lastModified": "2025-06-09T21:15:47.203", + "lastModified": "2025-06-10T16:15:42.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, in the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client's browser will query the supplied URL. An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials. Version 11.0.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "HAX CMS PHP permite a los usuarios gestionar su universo de micrositios con un backend PHP. Antes de la versi\u00f3n 11.0.0, en el editor de sitios HAX, los usuarios pod\u00edan crear un bloque de sitio web para cargar otro sitio en un iframe. La aplicaci\u00f3n permite introducir una URL de destino en el bloque de sitio web. Al visitar el sitio HAX, el navegador del cliente consultar\u00e1 la URL proporcionada. Un atacante autenticado puede crear un sitio HAX con un bloque de sitio web que apunte a un servidor controlado por el atacante que ejecute Responder o una herramienta similar. Posteriormente, el atacante puede realizar un ataque de phishing convenciendo a otro usuario de que visite su sitio HAX malicioso para obtener credenciales. La versi\u00f3n 11.0.0 incluye un parche para este problema." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-v3ph-2q5q-cg88", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-v3ph-2q5q-cg88", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49141.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49141.json index cfab6d5759e..fc013fd4acc 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49141.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49141.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49141", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-09T21:15:47.360", - "lastModified": "2025-06-09T21:15:47.360", + "lastModified": "2025-06-10T16:15:42.193", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue." + }, + { + "lang": "es", + "value": "HAX CMS PHP permite a los usuarios gestionar su universo de micrositios con un backend PHP. Antes de la versi\u00f3n 11.0.3, la funci\u00f3n `gitImportSite` obten\u00eda una URL de una solicitud POST y no validaba adecuadamente la entrada del usuario. La funci\u00f3n `set_remote` posteriormente pasa esta entrada a `proc_open`, lo que provoca la inyecci\u00f3n de comandos del sistema operativo. Un atacante autenticado puede manipular una URL que omita las comprobaciones de validaci\u00f3n empleadas por las funciones `filter_var` y `strpos` para ejecutar comandos arbitrarios del sistema operativo en el servidor backend. El atacante puede extraer la salida del comando mediante una solicitud HTTP. La versi\u00f3n 11.0.3 incluye un parche para este problema." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49142.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49142.json new file mode 100644 index 00000000000..6c1f67e6225 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49142.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-49142", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T16:15:42.293", + "lastModified": "2025-06-10T16:15:42.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions prior to 2.4.10 or prior to 1.6.32 are potentially affected. Due to insufficient security configuration of the Jinja2 templating feature used in computed fields, custom links, etc. in Nautobot, a malicious user could configure this feature set in ways that could expose the value of Secrets defined in Nautobot when the templated content is rendered or that could call Python APIs to modify data within Nautobot when the templated content is rendered, bypassing the object permissions assigned to the viewing user. Nautobot versions 1.6.32 and 2.4.10 will include fixes for the vulnerability. The vulnerability can be partially mitigated by configuring object permissions appropriately to limit certain actions to only trusted users." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], + "references": [ + { + "url": "https://docs.djangoproject.com/en/4.2/ref/templates/api/#alters-data-description", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nautobot/nautobot/pull/7417", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nautobot/nautobot/pull/7429", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-wjw6-95h5-4jpx", + "source": "security-advisories@github.com" + }, + { + "url": "https://jinja.palletsprojects.com/en/stable/sandbox", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49143.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49143.json new file mode 100644 index 00000000000..12b249e7994 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49143.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-49143", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T16:15:42.450", + "lastModified": "2025-06-10T16:15:42.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nautobot is a Network Source of Truth and Network Automation Platform. Prior to v2.4.10 and v1.6.32 , files uploaded by users to Nautobot's MEDIA_ROOT directory, including DeviceType image attachments as well as images attached to a Location, Device, or Rack, are served to users via a URL endpoint that was not enforcing user authentication. As a consequence, such files can be retrieved by anonymous users who know or can guess the correct URL for a given file. Nautobot v2.4.10 and v1.6.32 address this issue by adding enforcement of Nautobot user authentication to this endpoint." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nautobot/nautobot/commit/9c892dc300429948a4714f743c9c2879d8987340", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nautobot/nautobot/commit/d99a53b065129cff3a0fa9abe7355a9ef1ad4c95", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nautobot/nautobot/pull/6672", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nautobot/nautobot/pull/6703", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-rh67-4c8j-hjjh", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5895.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5895.json index 37787d3884b..5faaf5f54fb 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5895.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5895.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5895", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T20:15:25.890", - "lastModified": "2025-06-09T20:15:25.890", + "lastModified": "2025-06-10T16:15:43.003", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Metabase 54.10. It has been classified as problematic. This affects the function parseDataUri of the file frontend/src/metabase/lib/dom.js. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 4454ebbdc7719016bf80ca0f34859ce5cee9f6b0. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Metabase 54.10. Se ha clasificado como problem\u00e1tica. Afecta a la funci\u00f3n parseDataUri del archivo frontend/src/mebase/lib/dom.js. La manipulaci\u00f3n genera una complejidad ineficiente en las expresiones regulares. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se denomina 4454ebbdc7719016bf80ca0f34859ce5cee9f6b0. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +148,10 @@ { "url": "https://vuldb.com/?submit.585795", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/metabase/metabase/pull/57011", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5896.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5896.json index b46c3947806..dc06004ff3e 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5896.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5896.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5896", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T21:15:47.517", - "lastModified": "2025-06-09T21:15:47.517", + "lastModified": "2025-06-10T16:15:43.133", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in tarojs taro up to 4.1.1. It has been declared as problematic. This vulnerability affects unknown code of the file taro/packages/css-to-react-native/src/index.js. The manipulation leads to inefficient regular expression complexity. The attack can be initiated remotely. Upgrading to version 4.1.2 is able to address this issue. The name of the patch is c2e321a8b6fc873427c466c69f41ed0b5e8814bf. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en tarojs (hasta la versi\u00f3n 4.1.1). Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo taro/packages/css-to-react-native/src/index.js. La manipulaci\u00f3n genera una complejidad ineficiente en las expresiones regulares. El ataque puede iniciarse en remoto. Actualizar a la versi\u00f3n 4.1.2 puede solucionar este problema. El parche se llama c2e321a8b6fc873427c466c69f41ed0b5e8814bf. Se recomienda actualizar el componente afectado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +148,10 @@ { "url": "https://vuldb.com/?submit.585796", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/NervJS/taro/pull/17619", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5897.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5897.json index 38b3899566c..eafeaeef599 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5897.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5897.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5897", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T21:15:47.707", - "lastModified": "2025-06-09T21:15:47.707", + "lastModified": "2025-06-10T16:15:43.257", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in vuejs vue-cli up to 5.0.8. It has been rated as problematic. This issue affects the function HtmlPwaPlugin of the file packages/@vue/cli-plugin-pwa/lib/HtmlPwaPlugin.js of the component Markdown Code Handler. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en vuejs vue-cli hasta la versi\u00f3n 5.0.8. Se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n HtmlPwaPlugin del archivo packages/@vue/cli-plugin-pwa/lib/HtmlPwaPlugin.js del componente Markdown Code Handler. La manipulaci\u00f3n genera una complejidad ineficiente en las expresiones regulares. El ataque puede iniciarse en remoto." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.585798", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/vuejs/vue-cli/pull/7478", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5898.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5898.json index ae9d2e9447e..d1816547762 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5898.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5898.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5898", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T22:15:22.327", - "lastModified": "2025-06-09T22:15:22.327", + "lastModified": "2025-06-10T16:15:43.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Affected is the function parse_variables_option of the file utilities/pspp-convert.c. The manipulation leads to out-of-bounds write. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. La funci\u00f3n parse_variables_option del archivo utility/pspp-convert.c se ve afectada. La manipulaci\u00f3n provoca escritura fuera de los l\u00edmites. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +148,10 @@ { "url": "https://www.gnu.org/", "source": "cna@vuldb.com" + }, + { + "url": "https://savannah.gnu.org/bugs/index.php?67071", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5899.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5899.json index 422327e8c36..b5937463080 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5899.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5899.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5899", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T22:15:22.557", - "lastModified": "2025-06-09T22:15:22.557", + "lastModified": "2025-06-10T16:15:43.510", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Affected by this vulnerability is the function parse_variables_option of the file utilities/pspp-convert.c. The manipulation leads to free of memory not on the heap. An attack has to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Esta vulnerabilidad afecta a la funci\u00f3n parse_variables_option del archivo utility/pspp-convert.c. La manipulaci\u00f3n libera memoria que no est\u00e1 en el mont\u00f3n. Un ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.gnu.org/", "source": "cna@vuldb.com" + }, + { + "url": "https://savannah.gnu.org/bugs/index.php?67072", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5900.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5900.json index 1b593511424..2c536815a5f 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5900.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5900.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5900", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T22:15:22.790", - "lastModified": "2025-06-09T22:15:22.790", + "lastModified": "2025-06-10T16:15:43.627", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Tenda AC9 15.03.02.13. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Tenda AC9 15.03.02.13. Esta afecta a una parte desconocida. La manipulaci\u00f3n provoca cross-site request forgery. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -148,6 +152,10 @@ { "url": "https://www.tenda.com.cn/", "source": "cna@vuldb.com" + }, + { + "url": "https://candle-throne-f75.notion.site/Tenda-AC9-fromSysToolRestoreSet-20adf0aa11858094a25ae21f9b4203da", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5901.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5901.json index c00e62ed38b..f9895cf6db0 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5901.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5901.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5901", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T23:15:22.433", - "lastModified": "2025-06-09T23:15:22.433", + "lastModified": "2025-06-10T16:15:43.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in TOTOLINK T10 4.1.8cu.5207 and classified as critical. This vulnerability affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument File leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en TOTOLINK T10 4.1.8cu.5207, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n UploadCustomModule del archivo /cgi-bin/cstecgi.cgi del componente POST Request Handler. La manipulaci\u00f3n del argumento \"File\" provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-UploadCustomModule-20bdf0aa118580d59961cd545582c118", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5902.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5902.json index a989d39acd4..f7d1693814d 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5902.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5902.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5902", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T23:15:22.617", - "lastModified": "2025-06-09T23:15:22.617", + "lastModified": "2025-06-10T16:15:43.877", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207 and classified as critical. This issue affects the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument slaveIpList leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK T10 4.1.8cu.5207, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n setUpgradeFW del archivo /cgi-bin/cstecgi.cgi del componente POST Request Handler. La manipulaci\u00f3n del argumento \"slaveIpList\" provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setUpgradeFW-20bdf0aa11858089bc28f634bb140d00", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5903.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5903.json index 777b1764da8..8638d1f6dc1 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5903.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5903.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5903", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T00:15:22.243", - "lastModified": "2025-06-10T00:15:22.243", + "lastModified": "2025-06-10T16:15:44.000", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK T10 4.1.8cu.5207. Se ha clasificado como cr\u00edtica. La funci\u00f3n setWiFiAclRules del archivo /cgi-bin/cstecgi.cgi del componente POST Request Handler se ve afectada. La manipulaci\u00f3n del argumento desc provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiAclRules-20bdf0aa118580399a8df6ba2a44c197", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5904.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5904.json index 90d3746ab12..5649fba3e42 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5904.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5904.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5904", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T00:15:22.453", - "lastModified": "2025-06-10T00:15:22.453", + "lastModified": "2025-06-10T16:15:44.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument device_name leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK T10 4.1.8cu.5207. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setWiFiMeshName del archivo /cgi-bin/cstecgi.cgi del componente POST Request Handler. La manipulaci\u00f3n del argumento device_name provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiMeshName-20bdf0aa1185806eb922dbd496c4a4b4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5905.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5905.json index d36383295e4..db19e52eab6 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5905.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5905.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5905", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T00:15:22.653", - "lastModified": "2025-06-10T00:15:22.653", + "lastModified": "2025-06-10T16:15:44.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument Password leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK T10 4.1.8cu.5207. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n setWiFiRepeaterCfg del archivo /cgi-bin/cstecgi.cgi del componente POST Request Handler. La manipulaci\u00f3n del argumento \"Password\" provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiRepeaterCfg-20bdf0aa118580bd8cd0da62d4d2e47f?pvs=73", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5906.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5906.json index ec8fafd0b3e..31ce5bf74f6 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5906.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5906.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5906", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T01:15:23.720", - "lastModified": "2025-06-10T01:15:23.720", + "lastModified": "2025-06-10T16:15:44.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Laundry System 1.0. This affects an unknown part of the file /data/. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Laundry System 1.0 Esta afecta a una parte desconocida del archivo /data/. La manipulaci\u00f3n provoca la omisi\u00f3n de la autenticaci\u00f3n. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.592266", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/tuooo/CVE/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5907.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5907.json index 5d6272a3d76..2c49a1d4886 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5907.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5907.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5907", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T01:15:23.963", - "lastModified": "2025-06-10T01:15:23.963", + "lastModified": "2025-06-10T16:15:45.127", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en TOTOLINK EX1200T hasta la versi\u00f3n 4.1.2cu.5232_B20210713. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /boafrm/formFilter del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/byxs0x0/cve2/blob/main/3.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5908.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5908.json index 6edc5a647b7..69202da3b9a 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5908.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5908.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5908", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T01:15:24.167", - "lastModified": "2025-06-10T01:15:24.167", + "lastModified": "2025-06-10T16:15:45.247", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK EX1200T hasta la versi\u00f3n 4.1.2cu.5232_B20210713. Este problema afecta a un procesamiento desconocido del archivo /boafrm/formIpQoS del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/byxs0x0/cve2/blob/main/4.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5909.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5909.json index 2d9a4d6e9de..c579e40c3c0 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5909.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5909.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5909", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T02:15:21.007", - "lastModified": "2025-06-10T02:15:21.007", + "lastModified": "2025-06-10T16:15:45.370", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK EX1200T hasta la versi\u00f3n 4.1.2cu.5232_B20210713. Se ve afectada una funci\u00f3n desconocida del archivo /boafrm/formReflashClientTbl del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/byxs0x0/cve2/blob/main/5.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5910.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5910.json index 89ff5e09f7f..a15cf55c1ad 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5910.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5910.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5910", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T03:15:38.583", - "lastModified": "2025-06-10T03:15:38.583", + "lastModified": "2025-06-10T16:15:45.490", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en TOTOLINK EX1200T hasta la versi\u00f3n 4.1.2cu.5232_B20210713, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /boafrm/formWsc del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/byxs0x0/cve2/blob/main/6.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5914.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5914.json index c6f1863bc84..9bba35ab457 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5914.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5914.json @@ -2,20 +2,24 @@ "id": "CVE-2025-5914", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-09T20:15:26.123", - "lastModified": "2025-06-09T20:15:26.123", + "lastModified": "2025-06-10T16:15:45.610", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la librer\u00eda libarchive, espec\u00edficamente en la funci\u00f3n archive_read_format_rar_seek_data(). Esta falla implica un desbordamiento de enteros que puede provocar una condici\u00f3n de doble liberaci\u00f3n. Explotar una vulnerabilidad de doble liberaci\u00f3n puede provocar corrupci\u00f3n de memoria, lo que permite a un atacante ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -63,6 +67,10 @@ { "url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0", "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/libarchive/libarchive/pull/2598", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5952.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5952.json index da07e2bd29a..9a61d395205 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5952.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5952.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5952", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T05:15:23.023", - "lastModified": "2025-06-10T05:15:23.023", + "lastModified": "2025-06-10T16:15:45.717", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release." + "value": "A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release. Additional countermeasures have been added in 6.15-8." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Zend.To hasta la versi\u00f3n 6.10-6 Beta. Este problema afecta a la funci\u00f3n exec del archivo NSSDropoff.php. La manipulaci\u00f3n del argumento file_1 provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 6.10-7 puede solucionar este problema. Se recomienda actualizar el componente afectado. Esto afecta a una versi\u00f3n bastante antigua del software. El proveedor recomienda actualizar a la \u00faltima versi\u00f3n." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5969.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5969.json new file mode 100644 index 00000000000..a6199ec6845 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5969.json @@ -0,0 +1,156 @@ +{ + "id": "CVE-2025-5969", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T17:25:20.293", + "lastModified": "2025-06-10T17:25:20.293", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in D-Link DIR-632 FW103B08 and classified as critical. Affected by this vulnerability is the function FUN_00425fd8 of the file /biurl_grou of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-FUN_00425fd8", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink-FUN_00425fd8#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311845", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311845", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592336", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5970.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5970.json new file mode 100644 index 00000000000..e8ef37c1244 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5970.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5970", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T17:25:24.033", + "lastModified": "2025-06-10T17:25:24.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php. The manipulation of the argument fullname leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kakalalaww/CVE/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311846", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311846", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592338", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index eea6ff32103..690c06665be 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-10T16:00:23.374176+00:00 +2025-06-10T18:00:23.762324+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-10T15:55:48.787000+00:00 +2025-06-10T17:58:18.297000+00:00 ``` ### Last Data Feed Release @@ -33,58 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297283 +297399 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `116` -- [CVE-2024-29198](CVE-2024/CVE-2024-291xx/CVE-2024-29198.json) (`2025-06-10T15:15:22.140`) -- [CVE-2024-34711](CVE-2024/CVE-2024-347xx/CVE-2024-34711.json) (`2025-06-10T15:15:22.710`) -- [CVE-2024-38524](CVE-2024/CVE-2024-385xx/CVE-2024-38524.json) (`2025-06-10T15:15:22.880`) -- [CVE-2024-40625](CVE-2024/CVE-2024-406xx/CVE-2024-40625.json) (`2025-06-10T15:15:23.043`) -- [CVE-2025-22455](CVE-2025/CVE-2025-224xx/CVE-2025-22455.json) (`2025-06-10T15:15:23.210`) -- [CVE-2025-22463](CVE-2025/CVE-2025-224xx/CVE-2025-22463.json) (`2025-06-10T15:15:23.383`) -- [CVE-2025-26394](CVE-2025/CVE-2025-263xx/CVE-2025-26394.json) (`2025-06-10T15:15:23.543`) -- [CVE-2025-26395](CVE-2025/CVE-2025-263xx/CVE-2025-26395.json) (`2025-06-10T15:15:23.723`) -- [CVE-2025-27505](CVE-2025/CVE-2025-275xx/CVE-2025-27505.json) (`2025-06-10T15:15:23.903`) -- [CVE-2025-30145](CVE-2025/CVE-2025-301xx/CVE-2025-30145.json) (`2025-06-10T15:15:24.070`) -- [CVE-2025-37100](CVE-2025/CVE-2025-371xx/CVE-2025-37100.json) (`2025-06-10T15:15:24.233`) -- [CVE-2025-46612](CVE-2025/CVE-2025-466xx/CVE-2025-46612.json) (`2025-06-10T15:15:25.027`) -- [CVE-2025-5335](CVE-2025/CVE-2025-53xx/CVE-2025-5335.json) (`2025-06-10T15:15:25.703`) -- [CVE-2025-5353](CVE-2025/CVE-2025-53xx/CVE-2025-5353.json) (`2025-06-10T15:15:25.883`) +- [CVE-2025-47168](CVE-2025/CVE-2025-471xx/CVE-2025-47168.json) (`2025-06-10T17:23:43.307`) +- [CVE-2025-47169](CVE-2025/CVE-2025-471xx/CVE-2025-47169.json) (`2025-06-10T17:23:45.317`) +- [CVE-2025-47170](CVE-2025/CVE-2025-471xx/CVE-2025-47170.json) (`2025-06-10T17:23:47.287`) +- [CVE-2025-47171](CVE-2025/CVE-2025-471xx/CVE-2025-47171.json) (`2025-06-10T17:23:49.350`) +- [CVE-2025-47172](CVE-2025/CVE-2025-471xx/CVE-2025-47172.json) (`2025-06-10T17:23:51.607`) +- [CVE-2025-47173](CVE-2025/CVE-2025-471xx/CVE-2025-47173.json) (`2025-06-10T17:23:53.543`) +- [CVE-2025-47174](CVE-2025/CVE-2025-471xx/CVE-2025-47174.json) (`2025-06-10T17:23:55.607`) +- [CVE-2025-47175](CVE-2025/CVE-2025-471xx/CVE-2025-47175.json) (`2025-06-10T17:23:57.607`) +- [CVE-2025-47176](CVE-2025/CVE-2025-471xx/CVE-2025-47176.json) (`2025-06-10T17:23:59.800`) +- [CVE-2025-47953](CVE-2025/CVE-2025-479xx/CVE-2025-47953.json) (`2025-06-10T17:24:01.917`) +- [CVE-2025-47955](CVE-2025/CVE-2025-479xx/CVE-2025-47955.json) (`2025-06-10T17:24:03.870`) +- [CVE-2025-47956](CVE-2025/CVE-2025-479xx/CVE-2025-47956.json) (`2025-06-10T17:24:06.050`) +- [CVE-2025-47957](CVE-2025/CVE-2025-479xx/CVE-2025-47957.json) (`2025-06-10T17:24:08.037`) +- [CVE-2025-47962](CVE-2025/CVE-2025-479xx/CVE-2025-47962.json) (`2025-06-10T17:24:10.140`) +- [CVE-2025-47968](CVE-2025/CVE-2025-479xx/CVE-2025-47968.json) (`2025-06-10T17:24:13.030`) +- [CVE-2025-47969](CVE-2025/CVE-2025-479xx/CVE-2025-47969.json) (`2025-06-10T17:24:15.183`) +- [CVE-2025-47977](CVE-2025/CVE-2025-479xx/CVE-2025-47977.json) (`2025-06-10T17:24:17.200`) +- [CVE-2025-4801](CVE-2025/CVE-2025-48xx/CVE-2025-4801.json) (`2025-06-10T16:15:42.923`) +- [CVE-2025-48067](CVE-2025/CVE-2025-480xx/CVE-2025-48067.json) (`2025-06-10T16:15:41.357`) +- [CVE-2025-48879](CVE-2025/CVE-2025-488xx/CVE-2025-48879.json) (`2025-06-10T16:15:41.513`) +- [CVE-2025-48937](CVE-2025/CVE-2025-489xx/CVE-2025-48937.json) (`2025-06-10T16:15:41.670`) +- [CVE-2025-49142](CVE-2025/CVE-2025-491xx/CVE-2025-49142.json) (`2025-06-10T16:15:42.293`) +- [CVE-2025-49143](CVE-2025/CVE-2025-491xx/CVE-2025-49143.json) (`2025-06-10T16:15:42.450`) +- [CVE-2025-5969](CVE-2025/CVE-2025-59xx/CVE-2025-5969.json) (`2025-06-10T17:25:20.293`) +- [CVE-2025-5970](CVE-2025/CVE-2025-59xx/CVE-2025-5970.json) (`2025-06-10T17:25:24.033`) ### CVEs modified in the last Commit -Recently modified CVEs: `130` +Recently modified CVEs: `70` -- [CVE-2025-5716](CVE-2025/CVE-2025-57xx/CVE-2025-5716.json) (`2025-06-10T15:46:32.377`) -- [CVE-2025-5721](CVE-2025/CVE-2025-57xx/CVE-2025-5721.json) (`2025-06-10T15:47:37.680`) -- [CVE-2025-5722](CVE-2025/CVE-2025-57xx/CVE-2025-5722.json) (`2025-06-10T14:59:17.903`) -- [CVE-2025-5723](CVE-2025/CVE-2025-57xx/CVE-2025-5723.json) (`2025-06-10T14:59:02.027`) -- [CVE-2025-5724](CVE-2025/CVE-2025-57xx/CVE-2025-5724.json) (`2025-06-10T14:58:46.713`) -- [CVE-2025-5725](CVE-2025/CVE-2025-57xx/CVE-2025-5725.json) (`2025-06-10T14:58:33.113`) -- [CVE-2025-5728](CVE-2025/CVE-2025-57xx/CVE-2025-5728.json) (`2025-06-10T14:58:21.970`) -- [CVE-2025-5732](CVE-2025/CVE-2025-57xx/CVE-2025-5732.json) (`2025-06-10T14:58:00.633`) -- [CVE-2025-5755](CVE-2025/CVE-2025-57xx/CVE-2025-5755.json) (`2025-06-10T15:46:20.973`) -- [CVE-2025-5758](CVE-2025/CVE-2025-57xx/CVE-2025-5758.json) (`2025-06-10T15:46:05.007`) -- [CVE-2025-5759](CVE-2025/CVE-2025-57xx/CVE-2025-5759.json) (`2025-06-10T14:57:42.917`) -- [CVE-2025-5761](CVE-2025/CVE-2025-57xx/CVE-2025-5761.json) (`2025-06-10T14:57:30.623`) -- [CVE-2025-5762](CVE-2025/CVE-2025-57xx/CVE-2025-5762.json) (`2025-06-10T14:57:14.800`) -- [CVE-2025-5763](CVE-2025/CVE-2025-57xx/CVE-2025-5763.json) (`2025-06-10T14:55:49.067`) -- [CVE-2025-5782](CVE-2025/CVE-2025-57xx/CVE-2025-5782.json) (`2025-06-10T15:42:31.557`) -- [CVE-2025-5783](CVE-2025/CVE-2025-57xx/CVE-2025-5783.json) (`2025-06-10T15:42:17.287`) -- [CVE-2025-5784](CVE-2025/CVE-2025-57xx/CVE-2025-5784.json) (`2025-06-10T14:56:59.937`) -- [CVE-2025-5785](CVE-2025/CVE-2025-57xx/CVE-2025-5785.json) (`2025-06-10T14:56:41.397`) -- [CVE-2025-5786](CVE-2025/CVE-2025-57xx/CVE-2025-5786.json) (`2025-06-10T14:56:32.553`) -- [CVE-2025-5838](CVE-2025/CVE-2025-58xx/CVE-2025-5838.json) (`2025-06-10T14:56:21.530`) -- [CVE-2025-5840](CVE-2025/CVE-2025-58xx/CVE-2025-5840.json) (`2025-06-10T15:45:31.043`) -- [CVE-2025-5856](CVE-2025/CVE-2025-58xx/CVE-2025-5856.json) (`2025-06-10T14:56:12.723`) -- [CVE-2025-5858](CVE-2025/CVE-2025-58xx/CVE-2025-5858.json) (`2025-06-10T14:55:58.620`) -- [CVE-2025-5886](CVE-2025/CVE-2025-58xx/CVE-2025-5886.json) (`2025-06-10T14:15:31.160`) -- [CVE-2025-5911](CVE-2025/CVE-2025-59xx/CVE-2025-5911.json) (`2025-06-10T14:15:31.300`) +- [CVE-2025-43701](CVE-2025/CVE-2025-437xx/CVE-2025-43701.json) (`2025-06-10T16:15:40.667`) +- [CVE-2025-46178](CVE-2025/CVE-2025-461xx/CVE-2025-46178.json) (`2025-06-10T16:15:41.050`) +- [CVE-2025-48432](CVE-2025/CVE-2025-484xx/CVE-2025-48432.json) (`2025-06-10T17:24:19.100`) +- [CVE-2025-49137](CVE-2025/CVE-2025-491xx/CVE-2025-49137.json) (`2025-06-10T16:15:41.880`) +- [CVE-2025-49138](CVE-2025/CVE-2025-491xx/CVE-2025-49138.json) (`2025-06-10T16:15:41.983`) +- [CVE-2025-49139](CVE-2025/CVE-2025-491xx/CVE-2025-49139.json) (`2025-06-10T16:15:42.090`) +- [CVE-2025-49141](CVE-2025/CVE-2025-491xx/CVE-2025-49141.json) (`2025-06-10T16:15:42.193`) +- [CVE-2025-5895](CVE-2025/CVE-2025-58xx/CVE-2025-5895.json) (`2025-06-10T16:15:43.003`) +- [CVE-2025-5896](CVE-2025/CVE-2025-58xx/CVE-2025-5896.json) (`2025-06-10T16:15:43.133`) +- [CVE-2025-5897](CVE-2025/CVE-2025-58xx/CVE-2025-5897.json) (`2025-06-10T16:15:43.257`) +- [CVE-2025-5898](CVE-2025/CVE-2025-58xx/CVE-2025-5898.json) (`2025-06-10T16:15:43.380`) +- [CVE-2025-5899](CVE-2025/CVE-2025-58xx/CVE-2025-5899.json) (`2025-06-10T16:15:43.510`) +- [CVE-2025-5900](CVE-2025/CVE-2025-59xx/CVE-2025-5900.json) (`2025-06-10T16:15:43.627`) +- [CVE-2025-5901](CVE-2025/CVE-2025-59xx/CVE-2025-5901.json) (`2025-06-10T16:15:43.753`) +- [CVE-2025-5902](CVE-2025/CVE-2025-59xx/CVE-2025-5902.json) (`2025-06-10T16:15:43.877`) +- [CVE-2025-5903](CVE-2025/CVE-2025-59xx/CVE-2025-5903.json) (`2025-06-10T16:15:44.000`) +- [CVE-2025-5904](CVE-2025/CVE-2025-59xx/CVE-2025-5904.json) (`2025-06-10T16:15:44.140`) +- [CVE-2025-5905](CVE-2025/CVE-2025-59xx/CVE-2025-5905.json) (`2025-06-10T16:15:44.870`) +- [CVE-2025-5906](CVE-2025/CVE-2025-59xx/CVE-2025-5906.json) (`2025-06-10T16:15:44.993`) +- [CVE-2025-5907](CVE-2025/CVE-2025-59xx/CVE-2025-5907.json) (`2025-06-10T16:15:45.127`) +- [CVE-2025-5908](CVE-2025/CVE-2025-59xx/CVE-2025-5908.json) (`2025-06-10T16:15:45.247`) +- [CVE-2025-5909](CVE-2025/CVE-2025-59xx/CVE-2025-5909.json) (`2025-06-10T16:15:45.370`) +- [CVE-2025-5910](CVE-2025/CVE-2025-59xx/CVE-2025-5910.json) (`2025-06-10T16:15:45.490`) +- [CVE-2025-5914](CVE-2025/CVE-2025-59xx/CVE-2025-5914.json) (`2025-06-10T16:15:45.610`) +- [CVE-2025-5952](CVE-2025/CVE-2025-59xx/CVE-2025-5952.json) (`2025-06-10T16:15:45.717`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a0081995cf0..d0e387cae20 100644 --- a/_state.csv +++ b/_state.csv @@ -64032,7 +64032,7 @@ CVE-2013-6950,0,0,d0f4033174b11a0dcfc777b93cff0550e69141ff141c1e33337c773ade0549 CVE-2013-6951,0,0,5bd8681aa049f4a2951b02bb107fc3f7e6cfdd2a5b6dc19f97945499ea846ccd,2025-04-11T00:51:21.963000 CVE-2013-6952,0,0,19bb0b615d5660a88b1895c696b98c8f52d20239c82b79371e3f24967749dab9,2025-04-11T00:51:21.963000 CVE-2013-6953,0,0,03523ae8a09c9dca272e832610f7cb40c062c6ec4e17abb6950e3cde0ec96fc3,2025-04-11T00:51:21.963000 -CVE-2013-6954,0,1,695b20043b70c617d8bbfc538fac4e0346404afa693603d72de991190a771e5e,2025-06-10T14:15:22.367000 +CVE-2013-6954,0,0,695b20043b70c617d8bbfc538fac4e0346404afa693603d72de991190a771e5e,2025-06-10T14:15:22.367000 CVE-2013-6955,0,0,250360140c97234cf3d66191989f22e9e76a7f0499ce73b28b732a52ac793d9c,2025-04-11T00:51:21.963000 CVE-2013-6956,0,0,46d24b47af4e56d58794e46356ff3e9ed0be6ab7598976568872a5d87ddab818,2025-04-11T00:51:21.963000 CVE-2013-6957,0,0,4e4439e78a842ad4601881be694f1c5ff3355961926934ff329a332cdace35f6,2025-04-11T00:51:21.963000 @@ -131995,7 +131995,7 @@ CVE-2019-13933,0,0,fa7c523a7cb4dffda66495832cd418ef5267c30ffd49714b54a6ac36b43f0 CVE-2019-13934,0,0,6e86c89f3cbbb4282d9760e94cea0e2845164f6aff544ae8a1f1ef92a8ceef61,2024-11-21T04:25:43.740000 CVE-2019-13935,0,0,c7217616644d34059822d1489191ef8efbc4f73daa21781b22e6627f3575b63d,2024-11-21T04:25:43.893000 CVE-2019-13936,0,0,f328b18daf8837f9f58b9676878a3bdc5e48a74bfec92f622714439a5bd88668,2024-11-21T04:25:44.010000 -CVE-2019-13939,0,0,2489421bef243ec1ccda019dbb3d0845e376a24a73cfac831f6b066b73766ea1,2025-03-11T10:15:11.460000 +CVE-2019-13939,0,1,7be93e14ad8276336f0deda17a91ed803e9c23c50d514a5599eb932e7cdbfda8,2025-06-10T16:15:33.853000 CVE-2019-1394,0,0,914b87ec399d40d9f0cbc1e06578ba3b31701524469a797023de1dbcf25b3068,2024-11-21T04:36:37.310000 CVE-2019-13940,0,0,191ace86162d0205a934d083ddd804e34e761b890c2706f6f0fddbb90a822aae,2024-11-21T04:25:44.283000 CVE-2019-13941,0,0,773a8594648bdbc3a086a35118bb66caf1873d0757ba8674066655dbcc9ad456,2024-11-21T04:25:44.447000 @@ -171451,10 +171451,10 @@ CVE-2021-25250,0,0,96519546aeb87bad9029102e4300efb25b808ffdf1c828af74d8d543fe8fd CVE-2021-25251,0,0,8c8a953b35b3c6e5c868ffcdd7a83f2a6369d515eddabb2af8810ffb1ef353bd,2024-11-21T05:54:37.997000 CVE-2021-25252,0,0,b40ffbd137384ef442803b417e70cc774bb124d382846609d546be19f0b4e85e,2024-11-21T05:54:38.113000 CVE-2021-25253,0,0,cef2da2f2368330d32f768134c44dc06d846a0e31fc9829e407445816d3ee74d,2024-11-21T05:54:38.240000 -CVE-2021-25254,0,1,2acb3ad356362788c8f1b42ba57f56fb045f1bd14c8a4d2a71c4e9c807ba7f8f,2025-06-10T15:51:27.827000 -CVE-2021-25255,0,1,c2492daceb4de7c3043a61d34fb7ab4dfccffa6a0345da16ae14ea1b56708d5e,2025-06-10T15:50:05.830000 +CVE-2021-25254,0,0,2acb3ad356362788c8f1b42ba57f56fb045f1bd14c8a4d2a71c4e9c807ba7f8f,2025-06-10T15:51:27.827000 +CVE-2021-25255,0,0,c2492daceb4de7c3043a61d34fb7ab4dfccffa6a0345da16ae14ea1b56708d5e,2025-06-10T15:50:05.830000 CVE-2021-25261,0,0,e424baf935cc2db17e7e9aa8dcc27202f3de4105b2e80009de8df8c0cea86d31,2024-11-21T05:54:38.350000 -CVE-2021-25262,0,1,fd63f5b952ba6c0d5ab5df718b91f0eb985fd454141e79d30df12e9cf2ec53a8,2025-06-10T15:49:44.813000 +CVE-2021-25262,0,0,fd63f5b952ba6c0d5ab5df718b91f0eb985fd454141e79d30df12e9cf2ec53a8,2025-06-10T15:49:44.813000 CVE-2021-25263,0,0,8a4f44573226c5d23cad36c4ef35264823931930bfb498cd8e6f9bcd97cb7ed2,2024-11-21T05:54:38.477000 CVE-2021-25264,0,0,edc127a1408accde22a7ba9636f26063c7c22770e733c74a28bb9bffa142ac57,2024-11-21T05:54:38.583000 CVE-2021-25265,0,0,a9dd62733ae74882452e725edf4339311bf95ed2c987dce38156b96069be94b8,2024-11-21T05:54:38.700000 @@ -188837,7 +188837,7 @@ CVE-2022-0929,0,0,8eb2d49790094222f3e1b1e3730166c7766d1b2a761363231993be19fa068e CVE-2022-0930,0,0,7b347b917ab4ef7590facfd8cc1f14a3589c2365e60cf8537cf34dbd5d843e67,2024-11-21T06:39:41.333000 CVE-2022-0931,0,0,f1812330146c5798b9336aa7423455b3beda2b64568cff4b83b7cb7d4394737c,2024-02-08T23:15:09.470000 CVE-2022-0932,0,0,232507ae4f08357064c68babd3a4d9bacfbc8e6c28f5337bd203996adcee988d,2024-11-21T06:39:41.500000 -CVE-2022-0934,0,1,86832de5cf7e48936676be22b56a1f49afecdd2f9db8d7dce51c808e938464d4,2025-06-10T14:15:23.860000 +CVE-2022-0934,0,0,86832de5cf7e48936676be22b56a1f49afecdd2f9db8d7dce51c808e938464d4,2025-06-10T14:15:23.860000 CVE-2022-0935,0,0,651ca8316ac83d30e136caaddf2acfb39dad79185ec1ace694cc50972630257c,2024-11-21T06:39:41.787000 CVE-2022-0936,0,0,96c0b8cc746ef0f809e1d686ac79f9a6bf6979e23d6aebc05855b0499a68f253,2024-11-21T06:39:41.917000 CVE-2022-0937,0,0,9ef2934705b2deda24915105ab0565e2ecbb7aff04c1c8cbe4e36550322ef32f,2024-11-21T06:39:42.043000 @@ -206399,10 +206399,10 @@ CVE-2022-3976,0,0,8b7eb574300d8293649a80f2eb920531a13102a351572dd9be5d3ad761c0e9 CVE-2022-3977,0,0,1b3d248fee2b390f433d2ff842a3d12766d41799ebb941b58975dc634aac6aa0,2025-04-08T18:15:44.317000 CVE-2022-3978,0,0,9e8def547d5f62c73202afccf8e23bbfcaf00f3e6379f819a46d279fc18b9eab,2024-11-21T07:20:39.780000 CVE-2022-3979,0,0,012bbfb3edbc71141fc3b45d42489bcfc33c65e3c11991d37616f13000b6b0ad,2024-11-21T07:20:39.910000 -CVE-2022-39799,0,1,5feefb00406dbb63b228c7668a76aa12ef2f603b9c927a97bfd63b5252e618f5,2025-06-10T14:15:24.157000 +CVE-2022-39799,0,0,5feefb00406dbb63b228c7668a76aa12ef2f603b9c927a97bfd63b5252e618f5,2025-06-10T14:15:24.157000 CVE-2022-3980,0,0,1f7faea7d5fe07a575a9dfcfecc9c25b908f620050e83e2150071fe7631dd314,2025-04-29T14:15:21.007000 CVE-2022-39800,0,0,2df85a180a5b1fbfe23eba6be754c72cf82c664964002af2a5873351485d49b5,2024-11-21T07:18:16.463000 -CVE-2022-39801,0,1,e728aa2ceb1ff2410540d4e631cd7e8868a29e4d842567b5f09f8ded56a27428,2025-06-10T14:15:24.650000 +CVE-2022-39801,0,0,e728aa2ceb1ff2410540d4e631cd7e8868a29e4d842567b5f09f8ded56a27428,2025-06-10T14:15:24.650000 CVE-2022-39802,0,0,57fa4c00eeffa723285d0ea3f21652c0656681c7feff312c25a882ff275126cb,2024-11-21T07:18:16.743000 CVE-2022-39803,0,0,812d4b21b76fa4b588b54c6ba111b05b628e7158209aa0c96728f7ecc9329889,2024-11-21T07:18:16.887000 CVE-2022-39804,0,0,a62039c52de28674c58aed13f49647743f6dfb9522eb829522ecc6c327027e86,2024-11-21T07:18:17.030000 @@ -211438,7 +211438,7 @@ CVE-2022-46333,0,0,286a501731caa1ffd562ccb1f6f8205d7df1c526194e326ba1c0d0c8d080c CVE-2022-46334,0,0,a82b3335d9a6bf8efb79d0356a41bdc6e9442aaa9e5d7e266bcb2b306ae7b14e,2024-11-21T07:30:24.627000 CVE-2022-46335,0,0,e259beb92c513d1124dd96e204fdd98d08d712bc5fd51915be9f584c82c4a598,2023-11-07T03:55:34.570000 CVE-2022-46336,0,0,b9b7990e8d019749cbe644f3ba6c710979efbc6fbc868b0a3a3be3136e0194c3,2023-11-07T03:55:34.907000 -CVE-2022-46337,0,1,7da57ec9b0d0223153c0e02171c37662ce117d223648b0dd03b763886f103706,2025-06-10T14:15:24.907000 +CVE-2022-46337,0,0,7da57ec9b0d0223153c0e02171c37662ce117d223648b0dd03b763886f103706,2025-06-10T14:15:24.907000 CVE-2022-46338,0,0,e9e726a04af67152ae753eadaa2e71e9fd4a11f7298cb4ec71d0886d4bd02e59,2025-04-24T19:15:44.960000 CVE-2022-4634,0,0,305a790119c0c30ea4458e486c1183ab24639122ae391d4aeb8ff84b4a9d9ede,2024-11-21T07:35:38.370000 CVE-2022-46340,0,0,b7104f21186e3258f6ebc7d2620e1fee364c2ad530b8b2b59016d468a6781d97,2025-04-22T16:15:40.820000 @@ -216698,6 +216698,7 @@ CVE-2023-20594,0,0,7aad91080c6a13f0a0b508684038941964c52e96ba7ac77cc4d649d4cf35f CVE-2023-20596,0,0,5b2bce570c3a41831e228fca0439c8b43c565eb8206629753215f3aa992a61a3,2024-11-21T07:41:11.750000 CVE-2023-20597,0,0,1ce3daeb1083e877ed67ba7eb1e0c169b92397e49e6b8d5547e7fdafb9c41f1d,2024-11-21T07:41:11.923000 CVE-2023-20598,0,0,10bdb3216576a83083efc44a069662dde254102fd0b21ecf4ce722f0ae080fd5,2024-11-21T07:41:12.177000 +CVE-2023-20599,1,1,6ef8031bd33b1cc888389ec001c50af71d94d323e6d6437f6fdb98539d6a5c0c,2025-06-10T17:17:51.013000 CVE-2023-2060,0,0,c256a39dd7e962fae313c1daa7316cb92aff2ed2ab60c07792ec1909b8ec56d0,2024-11-21T07:57:51.607000 CVE-2023-20602,0,0,92aa84c767db7a6dd721658b208a6551e447db436cc5586d8936ad5ca538f8ec,2025-03-26T15:15:44.483000 CVE-2023-20604,0,0,4bf3c778b64a500781c003e8d67a4041a820012182b71c7a18179e3bc020fa9e,2025-03-26T15:15:44.670000 @@ -224084,6 +224085,7 @@ CVE-2023-29180,0,0,6438ed73dac39ba45254274602774457b4b6972d4b84528009c133d0bc796 CVE-2023-29181,0,0,038a3118a1b2f3cb92ea87ef9fc9ddaecbfd9995e2a12031ce780ec04db56dd6,2024-12-10T19:07:41.227000 CVE-2023-29182,0,0,8e6f055a404b6bc97de586d6cde173cb4bec24f2991682f6b5f7fb8a67d03256,2024-11-21T07:56:40.370000 CVE-2023-29183,0,0,eb9482a74122ef99aa275848849976d909de5051785e444061c6a07addfb45e2,2024-11-21T07:56:40.483000 +CVE-2023-29184,1,1,db37be2d9757325cb9757907a9968ead94267b9f87f269eb829b0ed93a450733,2025-06-10T17:17:51.383000 CVE-2023-29185,0,0,41ddcafee2e281b72ff94445eb71397c0d64003dbc083441752749f5f28e3446,2024-11-21T07:56:40.593000 CVE-2023-29186,0,0,14db7e75041062fda3eed03c1d833daebde0753c1562937dcf68667477b1cf33,2024-11-21T07:56:40.720000 CVE-2023-29187,0,0,22e6d9d2ed088c4b8448a1ef022ad1a1178042d89e41c77195ee57ccd6501049,2024-11-21T07:56:40.843000 @@ -224787,7 +224789,7 @@ CVE-2023-30285,0,0,b017c76829843f812705e981d9e63efeb2edeb15c827ffda1a53fea998af3 CVE-2023-3029,0,0,58c4f4735b5d302f2156f5d47abc0e2a3b0bad61864afaca5f7bb668ac9ae636,2024-11-21T08:16:16.747000 CVE-2023-30297,0,0,80d95eb10669043c6c7c71c4ea5a34d6ceb46a1b738615f09e959374780bd9ac,2024-11-21T07:59:59.137000 CVE-2023-30300,0,0,384b34c8970c8d94d27211f584968a001e6158aadffb2a719513f04e0e593772,2025-01-30T21:15:11.870000 -CVE-2023-30305,0,0,efcc6031cb842cec6a10873af5c5020bf7f98f4c36b8622da4831b343c2d0a30,2024-11-21T07:59:59.433000 +CVE-2023-30305,0,1,41f7f9d2b6d02d9f14572959ad738425d2de384b8694736cf6a4739d441edc6b,2025-06-10T17:09:48.863000 CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000 CVE-2023-30307,0,0,770feea52682071fcf9018307b3ce7e46516bce082cff0011f0f356dbe14eb7a,2025-03-27T21:15:42.407000 CVE-2023-30308,0,0,fd87c6a0d0962acbd3b78c36844649609644f0a499e688bdd567d9a916d40e5d,2024-11-21T07:59:59.913000 @@ -229308,7 +229310,7 @@ CVE-2023-36222,0,0,ea51bf212bfceb27f2b84510bdfd63b47cbc46615dfeb9daea70219018cdb CVE-2023-36223,0,0,d16652ecc22f089d29badb1a0087722df90b386d822612396de81688914995ba,2024-11-21T08:09:25.853000 CVE-2023-3623,0,0,58f6fbc2dac7804d2f6ad4649270cd072940718c8efc97f423d912b5674a0667,2024-11-21T08:17:41.730000 CVE-2023-36234,0,0,371f1a9fe6d1b1dc16b9d1ea10ea114e7eb692627ec7f646d52589df5fbb33fc,2024-11-21T08:09:26.010000 -CVE-2023-36235,0,0,56fa8a6f0b0f2b4f0219461a84aee903f6020ec4f89b7326ea4f56a42f7e81c5,2024-11-21T08:09:26.153000 +CVE-2023-36235,0,1,3d2b70007409f5f0c6d2adf239a32b1639fe653d423481413d2733dc7352c051,2025-06-10T17:17:51.890000 CVE-2023-36236,0,0,ed892a5be5cd89045bf58519030585ee3526284778a1f01ad439665801e2d638,2024-11-21T08:09:26.313000 CVE-2023-36237,0,0,66f4fa284ac8cd77d5adf7806a99441b2c7c7fb7455a5b3f41d46f4424732243,2025-04-11T20:20:35.777000 CVE-2023-36238,0,0,74d82b6db1d7c339bcbf92fb4d805a86745b3c5d31c3da1e2ecff2f0a20d7720,2025-04-14T13:13:25.427000 @@ -230341,7 +230343,7 @@ CVE-2023-37472,0,0,d2529cdb8a46cdf554e580ced7575bb64a4f85102c1fcf9d4f17ad17d32e1 CVE-2023-37473,0,0,27ddd7b88af427cde0a0764691c0cacb872ffbd4c44c459bb5024ed6c41fc97a,2024-11-21T08:11:47.053000 CVE-2023-37474,0,0,d82a060716117ab6966aa8f768bdd52553833964907143ef59372bc5a5af9959,2024-11-21T08:11:47.207000 CVE-2023-37475,0,0,505b13f032ac0208ccd1fc5d5b3b5bd764d244cacd59d8426208470eab862767,2024-11-21T08:11:47.353000 -CVE-2023-37476,0,0,edfeccb11784829004f4e4b1be46725df79ce4ef85dc8357c58936677f6cad6f,2024-11-21T08:11:47.503000 +CVE-2023-37476,0,1,34c97175cc6a5aeae5f6be525ebdc30a281541b72ddca83028300ab7902c9d0e,2025-06-10T16:15:34.153000 CVE-2023-37477,0,0,6b787a47da47a60a1c05108deb20e3356b6441339b22f8bd46c4480afc828728,2024-11-21T08:11:47.650000 CVE-2023-37478,0,0,00ebfc2e3ceee21b9b0704c8451e81c2d4d9f7efac8d8c263181c13c58e5c695,2024-11-21T08:11:47.787000 CVE-2023-37479,0,0,3ce00ce6b059b71ec57f98c52c6d42302fa03ccc4d4ceb0e932e3820db679118,2024-11-21T08:11:47.940000 @@ -231504,7 +231506,7 @@ CVE-2023-38814,0,0,9aac3e73f3dea67ff499610adc8aebc4b1bdfe7348e3a0c13ce93d8235db4 CVE-2023-38815,0,0,64c2f1cafe170788d2dae17acd97f143483ea35d344d1c405785fd711091d743,2023-11-07T04:17:24.550000 CVE-2023-38817,0,0,7edd4aee8397d7ea6c17893642f9290cb29a5d9fd7c9db5652d62d6ce572c9ec,2024-11-21T08:14:13.280000 CVE-2023-3882,0,0,444c96bf639eaba5c5e11c4b1be3fd64667922722cd1e3c7603c25d682c81b4f,2024-11-21T08:18:16.887000 -CVE-2023-38823,0,1,f1f6ebba0d7926006072e2372b0eff6b8873ab649bbf35691abff002dc5f01c8,2025-06-10T14:15:25.570000 +CVE-2023-38823,0,0,f1f6ebba0d7926006072e2372b0eff6b8873ab649bbf35691abff002dc5f01c8,2025-06-10T14:15:25.570000 CVE-2023-38825,0,0,b5dc7921fec8f930362d7e11d3f5725ad347a7557f1899b34604e07196bf8968,2025-03-05T18:49:13.880000 CVE-2023-38826,0,0,d70943162fe82eb28a7a7256c113a957db59bad2f162c4e502e1cf20871c0cca,2024-11-21T08:14:14.593000 CVE-2023-38827,0,0,5767919e44df42a6fdfd6672329daed951da4e76b81458a2e8fcf17855625181,2025-06-03T15:15:39.060000 @@ -236355,7 +236357,7 @@ CVE-2023-45373,0,0,3b30c044b0876fd9b27fda72b50042def7985a679a325ba539da2fc8ec5b0 CVE-2023-45374,0,0,f1203dd7b64ad589bec413cd96a8f0d80dc28337038c25ee7ed3fdb1b97c9933,2024-11-21T08:26:50.750000 CVE-2023-45375,0,0,b273bea762ec9958c31fa5a3446e0533e28499413b60c02fd0e2af2e487f316e,2024-11-21T08:26:50.910000 CVE-2023-45376,0,0,ef3d457b58fba45f17ce4d6107bc429d4bbfd02614bf97c4522138c2028605e7,2024-11-21T08:26:51.047000 -CVE-2023-45377,0,1,6f6a6df39103c142c00ebcb5b0645af9ecfab4036318338ea1a3c3d648143e71,2025-06-10T14:15:25.827000 +CVE-2023-45377,0,0,6f6a6df39103c142c00ebcb5b0645af9ecfab4036318338ea1a3c3d648143e71,2025-06-10T14:15:25.827000 CVE-2023-45378,0,0,f5801878fa05a05bf6487d751c87aa7b88026ea12f0a5b80a54d48f7a76e1b04,2024-11-21T08:26:51.370000 CVE-2023-45379,0,0,9fa15aba8cb43ee89ecc9819d87d1977016a065312229f2b1f8c50f9903c9d1f,2024-11-21T08:26:51.517000 CVE-2023-4538,0,0,ae0d11d8ec6407d88b839e8227ebcad0803179426546d08bdf7cd576cbf1506f,2025-01-23T17:17:07.870000 @@ -237162,7 +237164,7 @@ CVE-2023-46467,0,0,ee69c138fc64569b4a2680db9893225c61f933d13844d37f2a2dec06c7a55 CVE-2023-46468,0,0,5b26955a3193c65b37c2ef9f9ef1fcaa89d93687b2a1cdd82f284f290e4995c0,2024-11-21T08:28:33.380000 CVE-2023-4647,0,0,22a8533f7f191199009e85b567550a48673487fe3a1d01d4c2b445a643800604,2025-05-05T14:12:17.193000 CVE-2023-46470,0,0,bc11e355e9c44593401ba9310cfe1ca146d12cb71553922456bfc5f1fd0e2c4e,2024-11-21T08:28:33.527000 -CVE-2023-46471,0,1,5311f63af9a98b846ceb783e9d3becc5318c9db6f02b86d415d13566d6dce489,2025-06-10T14:15:26.130000 +CVE-2023-46471,0,0,5311f63af9a98b846ceb783e9d3becc5318c9db6f02b86d415d13566d6dce489,2025-06-10T14:15:26.130000 CVE-2023-46474,0,0,42f8e24ad47e96f102a785fd1dffe4d442c1799b9f437138569d16c61d20de87,2025-06-03T15:15:42.350000 CVE-2023-46475,0,0,3750704742c926668653b403b3427e7ab0b9ebb5d3f09b11dc63210a79ce85b0,2024-11-21T08:28:33.980000 CVE-2023-46478,0,0,9cd62f743f5e56e366cd21405c36fcbfd89a66ae0fc1710aac938780d922d5ec,2024-11-21T08:28:34.133000 @@ -237589,7 +237591,7 @@ CVE-2023-4701,0,0,43ec92fa3ed154d03a458e8422915dc45577247db51777e6112aadb19888d2 CVE-2023-47014,0,0,cf3ec8df8f908a9658f186d037e553e7c804cdcc432a191ff8128cbfa3276a0f,2024-11-21T08:29:37.330000 CVE-2023-47016,0,0,c9f05ec08e3f259cfd01fc2ff65cd765a8c30a61ad161240dfcd4868dc2f2f32,2024-11-21T08:29:37.463000 CVE-2023-4702,0,0,5e1a069430f16fcf9c61533a1c00d9e08c0ba60b7d6da69bad91bbc42f092055,2024-11-21T08:35:43.633000 -CVE-2023-47020,0,0,e938c93cb0ee38fda27de1e505f5bb6aaaf0eb027bd38dcff699b1f6671d5344,2024-11-21T08:29:37.683000 +CVE-2023-47020,0,1,77958b1e974ce3a0af29c7a34f0132e69536d415fc0c65e83c01b308bc43dce1,2025-06-10T16:15:34.370000 CVE-2023-47022,0,0,3b5a204d0d7e80c0734b2644b51e15f20e36a31142999d4ddeba0aeacde65a23,2024-11-21T08:29:37.830000 CVE-2023-47024,0,0,42f5693fcdc39885985b8f79b40370fbaef9b86e4b3a7be8c11b38356ba0b9a5,2024-11-21T08:29:37.980000 CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000 @@ -238997,6 +238999,7 @@ CVE-2023-48782,0,0,95b480354037833708e5ea1bd8952550f6b86c93b127b2df8fe28ea859382 CVE-2023-48783,0,0,a3d3d9c515425dc9d4a6694931094094bce0ad1bf598561f8cce66e53871e146,2024-11-21T08:32:26.210000 CVE-2023-48784,0,0,c3ef2e27b11fb6ffd8ddcca8a633eb7e20e018f88c101026e785ef77dc6dd70f,2025-01-17T17:19:51.033000 CVE-2023-48785,0,0,ec2883cb195b40fa96680da8a7a9286532cac8fc27dc93e31b669422ce08ee4e,2025-03-14T16:15:27.733000 +CVE-2023-48786,1,1,dc242dff11a70cd3090667d85131b7ea77fdbd7238300cab5f9c89f0ce5cf743,2025-06-10T17:18:40.720000 CVE-2023-48788,0,0,4b064b63dc13a2052b7743118f7456620a863d2d867170b1bb1a1bfffcd5d451,2025-01-27T20:56:34.083000 CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000 CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000 @@ -241453,7 +241456,7 @@ CVE-2023-52323,0,0,5047ec1eea863ec22a1711a690094809ecbf2819ee94889ef05f8b413d77b CVE-2023-52324,0,0,8219fd3e2b91a9351d3ad6f2b15c51b4ed6abf5e2c2be2e8d09079b7ee738090,2025-05-30T15:15:27.220000 CVE-2023-52325,0,0,f5525f43f03162b910035324e34ab7fb2c2ae44212abd9e4678019af952a10a3,2024-11-21T08:39:34.187000 CVE-2023-52326,0,0,da19caf54b4b9c6f0f2871573057ccccaa3ece34653376422ad5d13e167c6c07,2024-11-21T08:39:34.327000 -CVE-2023-52327,0,0,5a0bdbe4826d58149121bef186f38e5535a0070a443dd555fad2be54ef91f172,2024-11-21T08:39:34.450000 +CVE-2023-52327,0,1,136a9bc8ff3ec6b61a2bfd823596cd526917bcf945e6be16b0298a724b20f2f9,2025-06-10T16:15:34.613000 CVE-2023-52328,0,0,94b1bd35b1cff1d0296aac76311d3b1be048e8392a0d34170100d00271e0ec9d,2025-05-30T15:15:27.670000 CVE-2023-52329,0,0,a004108f5dec698da3445c22156a25c0905c095ac77fbcbf47586a25dfd8d9b9,2024-11-21T08:39:34.700000 CVE-2023-5233,0,0,a570340c5d21a2e43bb2751db7fdb9c8db3d4a296bd64b600ba4abeb833a5faa,2024-11-21T08:41:20.597000 @@ -242534,7 +242537,7 @@ CVE-2023-5549,0,0,d91998a71984a8eba725c2b392783cc21ca8c63497ee0f5f135a0debeba9d4 CVE-2023-5550,0,0,3f1644778a9482ff969db256e12b29b8646045929a2fd3fe3d99640f72b49a39,2024-11-21T08:41:59.613000 CVE-2023-5551,0,0,cb870c0fb1bbc016f06581c55710501beb9eacd67a1ce72427da4d199c6e423c,2024-11-21T08:41:59.760000 CVE-2023-5552,0,0,a61f4f990f4a544d786207a8953356adfb3c74f6ac58df21246574b308e4a277,2024-11-21T08:41:59.903000 -CVE-2023-5553,0,1,3fa326c8beea15694d57ca7b4f172b6c463351f184649fe89d3cbb816f2b1834,2025-06-10T14:15:26.850000 +CVE-2023-5553,0,0,3fa326c8beea15694d57ca7b4f172b6c463351f184649fe89d3cbb816f2b1834,2025-06-10T14:15:26.850000 CVE-2023-5554,0,0,5180bd3f76a0eab77411c82d91809cebabd14f24fef84a5d2f934c8d44c0a54d,2024-11-21T08:42:00.210000 CVE-2023-5555,0,0,e211ba1dc358f1d5c15613aaa60cf65129e8fc1481763424f04558350cc792c9,2024-11-21T08:42:00.340000 CVE-2023-5556,0,0,f08fa81939216ecc2e6fb93578d877a2408f26ca503ee07f18c8a7f4236c22f8,2024-11-21T08:42:00.480000 @@ -245042,7 +245045,7 @@ CVE-2024-0970,0,0,1bf1419ef69a6494796789e524bf8a135fa92d97c1a5ca84888328c6bf2e09 CVE-2024-0971,0,0,0fbf66131068316f18a459309bb5abd202482e32856952ee011afb233e507491,2024-11-21T08:47:55.270000 CVE-2024-0972,0,0,e58be32866f33c67069bcbf1a6ed4e3bd511aaced28f98cb0cc22c6a351ffb25,2024-11-21T08:47:55.493000 CVE-2024-0973,0,0,aed8eb330b3491d473a0c3659e7bd14152bc998dac9bc6833bcc7f238dfe0d40,2025-05-05T18:53:59.060000 -CVE-2024-0974,0,1,d9a281d7eaaf188c3ca11e3061dfa1948807c7e91facbc9ef8fe78ac9864b7c7,2025-06-10T15:54:40.860000 +CVE-2024-0974,0,0,d9a281d7eaaf188c3ca11e3061dfa1948807c7e91facbc9ef8fe78ac9864b7c7,2025-06-10T15:54:40.860000 CVE-2024-0975,0,0,927902427c81e78a820da29ca78a14e906507ae17eb4d8834d59df87d8387cd2,2025-02-07T01:11:02.703000 CVE-2024-0976,0,0,c79dabcd2e4b14a1e26c7170d6a384930b136ebbac47519fca77529002b6ebdb,2025-03-07T19:56:59.733000 CVE-2024-0977,0,0,35ddbdf47de5d8a387b9c11235d17fbe38212db92abcf7af4a134a44c909b461,2024-11-21T08:47:56.303000 @@ -251755,7 +251758,7 @@ CVE-2024-22255,0,0,9e18cdd84446e31a757b60582f5ccca6ae00b45a149bd719400a2670fcf49 CVE-2024-22256,0,0,993de2145831c7f61700fd0ab2fd95ca6c5116ee67bd38000c382e5007dbfbd6,2024-11-21T08:55:54.243000 CVE-2024-22257,0,0,1a5a0b35972b87fc52a9911fc56030783b26d8d4485f5584791104f906536b2c,2025-02-13T18:16:47.687000 CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d6d9,2024-12-05T21:15:07.530000 -CVE-2024-22259,0,1,e72db1d388000a3cb16784350ade9a63f18648cc161480b565e68fbbd2dfc9f0,2025-06-10T15:55:48.787000 +CVE-2024-22259,0,0,e72db1d388000a3cb16784350ade9a63f18648cc161480b565e68fbbd2dfc9f0,2025-06-10T15:55:48.787000 CVE-2024-2226,0,0,e107cca46a2655e701e8c46100939a0066c75df49d6d2a8a3cb908f83c971a7b,2025-01-31T01:45:28.230000 CVE-2024-22260,0,0,69cd08889223393ff53cc4a0d777e6e7eee01e3e0b81747bd7ed583cdd66c1f7,2025-03-19T18:15:20.353000 CVE-2024-22261,0,0,46d669194198080bacc4599579892d52d349bfce87a7598545a77f0180f961cd,2025-02-27T15:14:51.320000 @@ -253125,7 +253128,7 @@ CVE-2024-24100,0,0,f4ba34cc95b0190f580ada65b8f03eca5c5575fefce42a920c29ade696fa7 CVE-2024-24101,0,0,8c8c5d78f74164f6c55dbd2d7ee4be4970b1a59ee1d4279b7a0532aeb6a8d129,2025-03-13T17:15:28.980000 CVE-2024-24105,0,0,aa3f860d6915309f408681b2b3119d25030316f86ea69fb09f732429052412d3,2025-03-27T20:15:23.327000 CVE-2024-2411,0,0,80617ce8dc31b8e83eb2beef80c39afc1f74e19ab0ddd6a4eb931ef62e887412,2025-02-13T17:01:09.280000 -CVE-2024-24110,0,1,1fb115b633e50bda2eac87a86b11b52bf18355442d25fa5c13b5c90c0251f50f,2025-06-10T15:50:19.520000 +CVE-2024-24110,0,0,1fb115b633e50bda2eac87a86b11b52bf18355442d25fa5c13b5c90c0251f50f,2025-06-10T15:50:19.520000 CVE-2024-24112,0,0,fa2e3e7c3fcd453559e34c075845d4fcb313c6fd23214935b122beb782fc0c40,2025-05-08T19:15:58.530000 CVE-2024-24113,0,0,a516f265b8153f0a027545f2a188df9a3586caa127e0706759a4bc7bf3b498c3,2025-05-15T20:15:45.590000 CVE-2024-24115,0,0,3bbcdb03c559df344243325b54bdfce43d333b593de152334d8a64bb5fe49231,2024-11-21T08:58:56.140000 @@ -254794,7 +254797,7 @@ CVE-2024-26491,0,0,4ac68c4f5d9839fa0162b25e54b7c51348b91fa70ebbd8a9179b37c0e980c CVE-2024-26492,0,0,40a1f31da682a040c97eec908001f00e46ac39f66e792c6ce155e0d44bc69018,2025-05-08T14:24:55.010000 CVE-2024-26495,0,0,84f6e6990ef162c0bb66ea94d04512668c9f6cac12b94d5aed8974314eaf330c,2025-04-07T14:25:49.647000 CVE-2024-2650,0,0,e734ec5659d61ffc4accf737956e73f738843d131d9ee7da9d67366df08b49d9,2025-01-08T20:06:29.560000 -CVE-2024-26503,0,0,df7d61dcb7128154350761a771150cb0494b47d4aafbfd7f2024eef22b0ed39b,2024-11-21T09:02:31.040000 +CVE-2024-26503,0,1,16b08329d5e5d1ab0dd00750ca183fef7d49533505a785100dd54b9b81089d40,2025-06-10T16:05:55.953000 CVE-2024-26504,0,0,04368ca408cf828c52c9d21e0e159c77cba39aeb7ead3b77c45c5792276ceb5f,2024-11-21T09:02:31.240000 CVE-2024-26507,0,0,6739efe9e31958f6327926c478411ff4c4c7914d75460fb344892d5adbfedceb,2024-11-21T09:02:31.463000 CVE-2024-2651,0,0,e37bdfb7dc096f6ce937a78f1a216a418ddc8cb116de50fcbfcd7ca9d5cfe815,2024-12-12T22:00:20.573000 @@ -254803,10 +254806,10 @@ CVE-2024-26519,0,0,42ca4a0c4b211c122582c27745eb547ffa77c2e7db99d10a1b3d6d738459a CVE-2024-2652,0,0,1afd95108c8cfaee7b679614bcc752c2677b9aa793c8284b60f0740fc9eb0a27,2025-02-11T02:15:34.433000 CVE-2024-26520,0,0,7cdc56c5d27885a06d263f0d33badd1c8b5db539649a135f3710771b22a3a7e2,2024-11-21T09:02:32.160000 CVE-2024-26521,0,0,7a4a8c17931324da0360080baca8e9b8985dc9e1a6b4a9fe5e3ac63cc7433d0c,2024-11-21T09:02:32.387000 -CVE-2024-26529,0,0,13dd109218fc3681b79aadcbd907b30ca74ae2768f049720456b0aa2533764d1,2024-11-21T09:02:32.617000 +CVE-2024-26529,0,1,f60edeb88ea80f8c288c58feb69d2b94c458b81f22de1ad16647cdf12b5b29c5,2025-06-10T16:31:53.810000 CVE-2024-2653,0,0,2740d2471c15491d9ea329b79cb148ef218e8f532d711ebb3c9abf47fb26cb31,2024-11-21T09:10:13.160000 CVE-2024-2654,0,0,de0e9aeb600c35d393cda0d9b71327456c70ba2dcd19304dcb4a563e697a2b27,2025-03-24T14:41:58.103000 -CVE-2024-26540,0,0,3d64b9896eeddd880dc18112546effadecf914643710c25da435a35d7a7a5a49,2024-11-21T09:02:32.843000 +CVE-2024-26540,0,1,824ac0b3dbb479d655828ab34ab075884859c40a8cb99decf6fa1b9e0dfe92ca,2025-06-10T16:04:16.680000 CVE-2024-26542,0,0,5f0b8fac4544c06b01df41a855001250d28bffc49ff87601287cb3ea22616524,2024-11-21T09:02:33.060000 CVE-2024-26548,0,0,ebb38b51037a544aeaca78d2978daf5dbe43c77d36d6e5cbe956e6afdca5f326,2025-05-13T14:34:21.830000 CVE-2024-2655,0,0,0feab97c289640bf500dd7527d61858533072964c9502239802f5c822f5470cc,2025-01-17T19:18:36.207000 @@ -255744,7 +255747,7 @@ CVE-2024-27444,0,0,f2782679746ac825122096e332d365a1377f937908fa850657f47ae756272 CVE-2024-27447,0,0,58c4b3b2043c957ce5dade74764c4bc1aebd307c6b5a0cfc4a4a2fe5b787a9fd,2024-11-21T09:04:37.677000 CVE-2024-27448,0,0,8d84df435d462af3b84b4a4f1503868d7e64fb34bcf7329beab88ef9e1029260,2025-03-13T15:15:42.293000 CVE-2024-2745,0,0,28743d3482c4dc2cc7e95a6a28bdb765faa2729a76e91dd4c556600c182f0f12,2025-02-25T18:36:41.020000 -CVE-2024-27453,0,0,2a7fb93da9bb058626f4513255b864521945096f1e98b7c5a8c5fa5c1f40a72f,2024-11-21T09:04:38.020000 +CVE-2024-27453,0,1,d7a686cd701b8be9d28be91ce51b1a48b487049402a86408c25fdcdc51bc0bfb,2025-06-10T17:58:18.297000 CVE-2024-27454,0,0,c6ecae2cf1c6f578c27b5adc6fcda4b7094fb566c7b4f6a2268e87ef41ae5f7d,2024-11-21T09:04:38.243000 CVE-2024-27455,0,0,595f0c39f33de902fb7c90764200fb5bd466bb6750a1bba2c5add98e3417f6b4,2024-11-21T09:04:38.400000 CVE-2024-27456,0,0,ae7f47f470e1cd48e757eb3f1c90191f0e32b82c7049d1afc90ebb6a8467b0b8,2024-11-21T09:04:38.630000 @@ -256375,7 +256378,7 @@ CVE-2024-28276,0,0,1a436bda8dde83214de99ffe7a676d94ddd56c0cacbadb5830dca107ef6af CVE-2024-28277,0,0,22f3695f3ef7a6eee36a865e904ba36f875ce11a46525a27c6dc26bb671dd0ca,2025-03-27T20:15:24.940000 CVE-2024-28279,0,0,371a6db4bfcfaa0c72291cbc279291879c814e6e774d39db4e4c005f7e298918,2025-04-10T14:13:50.587000 CVE-2024-2828,0,0,79034e33018335efad10934558e8b84384b5f2f2133fce62438d617ea963efcf,2024-11-21T09:10:37.513000 -CVE-2024-28283,0,1,255be6618da6ba643fd0e86bc10a72c22c4b14d4fc8216df35f93b39332c9ac8,2025-06-10T15:52:54.640000 +CVE-2024-28283,0,0,255be6618da6ba643fd0e86bc10a72c22c4b14d4fc8216df35f93b39332c9ac8,2025-06-10T15:52:54.640000 CVE-2024-28285,0,0,d6af77d4c1b881ace2cde569269de77c400ab0444445e8beeda0612dd6100440,2024-11-21T09:06:08.497000 CVE-2024-28286,0,0,0757249cbaa15bc07df502c32c1b53781d52e423b8f162fc3de5e29bd12f0076,2025-06-02T13:59:05.650000 CVE-2024-28287,0,0,a8c69a5ccabbb193237debf5f07040ef395a0f376f000c1003682d3fc4f3b2ce,2024-11-21T09:06:08.947000 @@ -256417,8 +256420,8 @@ CVE-2024-28387,0,0,edcf845b6fe208900e49529598d8e9e75d7f2e72dd97a85453bae639adf9e CVE-2024-28388,0,0,95b64f8911ba70a40936aac75bd6274ffeb9103197023d39d5c96d0976370013,2024-11-21T09:06:14.763000 CVE-2024-28389,0,0,94fdc93233da7727f0a9074cdad3ddf52c584c8e8f2b21467b47ad4499de76ba,2024-11-21T09:06:14.990000 CVE-2024-2839,0,0,bbe9f5435e5c7bdec670ff8dd9c7f0c19451bb7cce7859cd58a9f3bb599942ce,2025-01-28T18:11:04.917000 -CVE-2024-28390,0,0,8b5a3e4c3e540123e9f4c25a2556a5ba072326ec9a886385cc4b55bc446d641a,2024-11-21T09:06:15.217000 -CVE-2024-28391,0,0,0cfdc0970646c6a29b4535a385b1b671beaabe151c1ae1ecc3929ee18b7c71d0,2024-11-21T09:06:15.450000 +CVE-2024-28390,0,1,e912062027bbf33f754a47663b789f14de23666bd0a0db3a06b61f31b6b1d906,2025-06-10T16:45:39.930000 +CVE-2024-28391,0,1,434c29b85eefa0728dd2735a4cff69ef7b58f260dc8f407ecbc942e7319059e7,2025-06-10T16:25:58.220000 CVE-2024-28392,0,0,d390c6938d5b44056d413b2b408bcc32550deb780a0d9ab9cc047b0024cc367e,2024-11-21T09:06:15.677000 CVE-2024-28393,0,0,c9f4dc38aa7cb62a7fcaedfa3fead844b0689c54fefaa509c2816ddb9d2b633f,2024-11-21T09:06:15.917000 CVE-2024-28394,0,0,c9f8c97d4aca10910d8f2d44c13ca923fb7aa68ef01730f568b161c43521e5c7,2024-11-21T09:06:16.133000 @@ -256690,7 +256693,7 @@ CVE-2024-28878,0,0,90956f79f168fc36d6b6bacee918ce9e058b32142fa56831e843f9bd0ad86 CVE-2024-2888,0,0,30f9d97cce50bcb1ff1760369d7263c58d4c14a2d1912b861813fda0696822cc,2025-03-19T19:02:10.360000 CVE-2024-28880,0,0,dce67170de98f0e8d2cb2c5e6724ba2918f4b3e757ed17b2daea09b41e6729b6,2024-11-21T09:07:06.070000 CVE-2024-28881,0,0,76f33caf69bc593b5028f013928afa615e33f660b6dfd892a36ded448eb993e4,2024-11-15T14:00:09.720000 -CVE-2024-28882,0,0,15c232a73a749f4a71b5977f9a6cfac79f7178abdb166390370efd4291b54fc8,2024-11-21T09:07:06.380000 +CVE-2024-28882,0,1,c831f818d29aa2db0bb720e9dff48a480c3d4a7ee4f1b6426fb1907561bff224,2025-06-10T16:26:09.473000 CVE-2024-28883,0,0,5bceb1aefba919d3e1dc9e7fc54626e9cd85b8a44bbab4e37a3067c4c485fa2d,2024-11-21T09:07:06.570000 CVE-2024-28885,0,0,31e789a31b9926af7cc0fc6a0244468b129479458c53416aa2c08f9b8ddcb35b,2024-11-15T14:00:09.720000 CVE-2024-28886,0,0,bbcc47e55178a464eeb9491bb2f1ee2056c2c4b8f04fccd315c68c42c8748eec,2024-11-21T09:07:06.777000 @@ -257009,7 +257012,7 @@ CVE-2024-29194,0,0,7e86f1d7dfe4f15cacbcce8cad9be7cfe38c260357c2c48fb92d5a54745ce CVE-2024-29195,0,0,5c94b16253f400ba6bb0ef665df6bebbf3188de73ab0df2806b5c2180f298084,2024-11-21T09:07:46.467000 CVE-2024-29196,0,0,5729f56924a65c817283601b77538f4530c180646008ccfbce73c06b0974e2f9,2025-01-09T16:58:38.057000 CVE-2024-29197,0,0,d61f8497bf6f8a1e63c46af3032bfe6193f99315ea572729f627ecd15c5269ab,2024-11-21T09:07:46.843000 -CVE-2024-29198,1,1,d0fa18fb787ebff7fd70d6dd32baf22ec52072f71beece3bfe47474fc615ca87,2025-06-10T15:15:22.140000 +CVE-2024-29198,0,0,d0fa18fb787ebff7fd70d6dd32baf22ec52072f71beece3bfe47474fc615ca87,2025-06-10T15:15:22.140000 CVE-2024-29199,0,0,09cc6e473adce584cd4120ccee4d6a5ea4bdb7bdd90b7f55d43dc2af16f0e4db,2024-11-21T09:07:47.030000 CVE-2024-2920,0,0,ef6630752834056fa8cc7ab93e97b2cf76454bf49c9150c8d1ff05dd4741ce0a,2024-11-21T09:10:50.530000 CVE-2024-29200,0,0,1a038098db45714aeb3be524d0e7d08f9c875e1682a6c96908006240e85006ba,2024-11-21T09:07:47.207000 @@ -258207,7 +258210,7 @@ CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015a CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000 CVE-2024-3074,0,0,3994c2cc8b929115537999419e9e3fcc4366d9ad5b592787d0ddf7bba23509f6,2024-11-21T09:28:50.367000 CVE-2024-3075,0,0,79e774c47eb18851562c97832d067dddf9a748a04470426bc1a3785e01ac544e,2025-06-10T01:23:11.353000 -CVE-2024-3076,0,1,9c25a9fc980ba47dd8ff33a0dda6a4a7aeba692a5023e5a085194957609e21be,2025-06-10T15:05:59.980000 +CVE-2024-3076,0,0,9c25a9fc980ba47dd8ff33a0dda6a4a7aeba692a5023e5a085194957609e21be,2025-06-10T15:05:59.980000 CVE-2024-3077,0,0,fcbdd34b10368896e2c3c22301b222fc061a71cd9d47f461bb0e75567c8c2976,2025-01-23T19:21:44.207000 CVE-2024-3078,0,0,f23febdf123fb1167e6d15c44d9f90ae5c695a87735eb2afb067ff82e8b10873,2025-05-07T16:29:10.603000 CVE-2024-3079,0,0,1bb74d40e37f82d88a8767e40d33c9e3ded28d80bc3a1cc49cb882442f6d019c,2024-11-21T09:28:51.060000 @@ -258286,8 +258289,8 @@ CVE-2024-3094,0,0,b9e85c0248ef2cd036bdd4cbb530b96250054f5e14f6d51439fbf04202b0fd CVE-2024-30946,0,0,377a4d69a3316def640c171befad2d35850a0a77388338767e966f749486eb06,2025-04-01T18:05:53.003000 CVE-2024-30949,0,0,31959e66683fc85ff4c276689d94014abb248a7fae0f804c055ab1ee5864556a,2024-08-21T15:48:31.937000 CVE-2024-3095,0,0,cbe393ec5392dd667126d228b108af98c0fb9795feb5e5dd8f573e0e9ea21bf5,2024-11-21T09:28:53.367000 -CVE-2024-30950,0,1,ece6dda16745c005f468a231df1243654886ab826b9231af9d99841e06c6ed34,2025-06-10T15:35:56.830000 -CVE-2024-30951,0,1,8816fa288dcd423eecbfbd1d91bd3dcea3b0699ff8ede203d26791740f8fb504,2025-06-10T15:37:30.170000 +CVE-2024-30950,0,0,ece6dda16745c005f468a231df1243654886ab826b9231af9d99841e06c6ed34,2025-06-10T15:35:56.830000 +CVE-2024-30951,0,0,8816fa288dcd423eecbfbd1d91bd3dcea3b0699ff8ede203d26791740f8fb504,2025-06-10T15:37:30.170000 CVE-2024-30952,0,0,29254c769977b2a21104b7bc3b0a8b336663d1d5367ab8c3beaf574fad73c358,2025-03-21T21:15:35.300000 CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000 CVE-2024-3096,0,0,6ca88014ce9a550e53740c810ba5e3769e3b253e549db68d15a92323deb5b97a,2025-02-13T18:18:09.553000 @@ -258814,7 +258817,7 @@ CVE-2024-31574,0,0,eda266a12496af246ed53e1fd05e929d584bd2ec9d1bc8cdbb80fa6f19bd3 CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000 CVE-2024-31578,0,0,dc380347c06a12bd8c09105adbfc2d499b79f7bc13f6095c94abd554b69dcc45,2025-06-03T18:09:18.917000 CVE-2024-3158,0,0,64ba1d8f16765085f53ed9bc04ebfd9e3747ac661f2c36e1e05c9b39e1f126dc,2025-03-13T15:15:46.370000 -CVE-2024-31580,0,0,edde7918add3c016a5d1a89364b3c85df232b957b4de682b61bed612a4074f41,2025-03-29T00:15:21.733000 +CVE-2024-31580,0,1,9f1ed18d4c2422ea6d3013d5b32b3b3f49d5eacb19adbdb1fe9a92d9455bd586,2025-06-10T17:38:16.883000 CVE-2024-31581,0,0,26f0b24afcce49599eab006e4dd0f04d587c422933e6a771f6252572dbc45bb1,2025-06-03T15:30:44.147000 CVE-2024-31582,0,0,99d23ed94eadae550f3d5e4c7af4b99a2ab1c155adf84f6b0b2f2ac44026309e,2025-06-03T15:42:14.187000 CVE-2024-31583,0,0,1d576dd3b933c7522919c517b06d1ad1b517de1d12fdfb1240e571027186192e,2025-06-10T01:33:43.180000 @@ -259188,6 +259191,7 @@ CVE-2024-32115,0,0,8373cf43ba80980b3351137d5a54804d88750a340a2ad23a0aa1e14cfebf6 CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000 CVE-2024-32117,0,0,bd78be4c7fc18e4c6cdf647393be0c96c39e14b7e7c17f1e39dba267511a48ce,2025-01-21T22:19:39.353000 CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 +CVE-2024-32119,1,1,5d5b3ad1aa22c65e2c15c3ad497a298d4d945e1348a2ce2d49fe4351b4002df7,2025-06-10T17:19:14.323000 CVE-2024-32122,0,0,6f35e5381381f2676320b6de1c8a3629b1ca38678672c35a80b453468e963a1b,2025-04-08T18:13:53.347000 CVE-2024-32123,0,0,60129c37069c23661983217154006f556b580f62559adb1b35a9e1f56364af41,2025-03-11T15:15:41.353000 CVE-2024-32125,0,0,d36ac7f8a17677d938b5bf6c12b9c868ee2ece6d692e8f1181aa5a94b725cccb,2025-03-12T18:52:52.640000 @@ -260372,7 +260376,7 @@ CVE-2024-33669,0,0,29f56069d6f8dc9c42c264b9e7fdf059d03067714c0582444c764df089feb CVE-2024-3367,0,0,6c0aec54854b096f8e878555e9125762e19df628121d5279f20fc46c0c73cc6e,2024-12-05T14:28:32.407000 CVE-2024-33670,0,0,bd6a675aeea7490463671a77c65b9928115cc573162bb8df88f5a5a7d06516ca,2024-11-21T09:17:22.573000 CVE-2024-33671,0,0,11ca607d730d384f046bfb50f7439d2c55ed7715b188d089c54603d5130dfd65,2024-11-21T09:17:22.737000 -CVE-2024-33672,0,1,8b1650c8b10c28f09a3826e003aa8dee352e02a41ac68246cc28a5b89f1f6f51,2025-06-10T15:32:30.493000 +CVE-2024-33672,0,0,8b1650c8b10c28f09a3826e003aa8dee352e02a41ac68246cc28a5b89f1f6f51,2025-06-10T15:32:30.493000 CVE-2024-33673,0,0,9a24b7ab7a01fadf3250caec966114047d99e6b4ec5d789a54b1b02a7ffacf1f,2024-11-21T09:17:23.073000 CVE-2024-33677,0,0,8c026ba50efd58074ee9fc7efbb88e0c06b2f621d30fb1b24c5e8cd3b5e751f3,2024-11-21T09:17:23.230000 CVE-2024-33678,0,0,0354f1d0d3f7ae634b20d321a0a5fe882afb0c2e7d1d7eb371cc2e66e362d410,2024-11-21T09:17:23.353000 @@ -260853,7 +260857,7 @@ CVE-2024-34343,0,0,e22efeb554f5d83b9c6badb85c6c0dedcf5786879e37c0de401d8f24092ec CVE-2024-34344,0,0,e28975bd6b46873769e941d76fc2c6f004b704c0373b34452dd881928b9ff0e9,2024-09-19T20:58:01.827000 CVE-2024-34345,0,0,47baf8647a40a5d643cb034c9f205d972dd70341b1b5eb4bde44ea560d1ada2f,2024-11-21T09:18:28.497000 CVE-2024-34346,0,0,b4d5d009ccbd0adb493172b6525286c6e00927027ff41daea728d00c7e5c3c19,2024-11-21T09:18:28.633000 -CVE-2024-34347,0,0,1ae5e55dd92ca95e3d80a0fda8e11ba9c0912e952a04f2b84e470a63f93711ee,2024-11-21T09:18:28.767000 +CVE-2024-34347,0,1,585ef94b63b5bc34f592bbd8f9288009e39939e1915c7d8904445d5250706ef6,2025-06-10T16:15:34.867000 CVE-2024-34349,0,0,6ae5959e6f6ba907493ebae040c30daa791dfc7ece6644e5e5282b43c801ec7c,2024-11-21T09:18:28.893000 CVE-2024-3435,0,0,5f721c6cabdafa9ababa6d9e38a4a029e1590c3ff0effa51aea03b5d4e206be1,2024-11-21T09:29:36.027000 CVE-2024-34350,0,0,6bf70fbd9fa7e778a24a4b66bc8f272fc21a47d33eb41231005b7e60a6449c36,2024-11-21T09:18:29.013000 @@ -260971,7 +260975,7 @@ CVE-2024-34459,0,0,099050e8057df0375a0b7cea098802e8cd5e61ae0c81df892b627717efb8a CVE-2024-3446,0,0,9d576be84abad7006e7f5609a5e6628fac8977415a2a5cce21316bdf40557180,2025-05-02T23:15:15.797000 CVE-2024-34460,0,0,72ea78910fcc6d5be830f8346ce3f69b0941dd6cf9a67f1ace5ca0108dda9891,2024-11-21T09:18:43.837000 CVE-2024-34461,0,0,c5a1d6fd0d0f85ab6d3fe40169deb0459ad0af3f0539266d0cae58e6e40ea1c8,2025-03-29T00:15:22.290000 -CVE-2024-34462,0,0,4863019022cb8729f2d8e85f599cc9d989e0be381b90f830b29ff815db6d6258,2024-11-21T09:18:44.267000 +CVE-2024-34462,0,1,382b69b4d65ff7d4fb7e8efbd069728a2c9fb930dc8c5e2ec23c0f73515e8b2a,2025-06-10T17:48:47.850000 CVE-2024-34463,0,0,56e29bee1bacb79fb80159be5fec6fd4dbf960af7d71832b8ae5ddba29330a36,2024-09-03T15:12:16.467000 CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411685,2024-05-06T15:15:24.473000 CVE-2024-34467,0,0,a01e6ce59c04801783e802b8f1192e31a97a5f2d690ba31a668cd490b46ef6cb,2024-11-21T09:18:44.753000 @@ -261003,7 +261007,7 @@ CVE-2024-34500,0,0,ad0d4277fb282ffeba130e48b29d422feab82a804fbd90a55147b70fa341b CVE-2024-34502,0,0,76aeea82543e0b722fdedcdb5720bd94dbdd5a58653d6c0fe9797dd2b1c558cc,2024-11-21T09:18:49.567000 CVE-2024-34506,0,0,765d28adb88f0afe403385b61b81ec66e649746dec0e99fdef13c9e005ff0645,2024-11-21T09:18:49.790000 CVE-2024-34507,0,0,d148d49269b067aac1ed2e5c7c327d93c5f56910a5e7ae430eca8a9fbf2ef9eb,2024-11-21T09:18:49.997000 -CVE-2024-34508,0,0,19fa6f446a99cdf501acc1c98d05216800cba3fc996ab8e57ed1170296edca1a,2025-03-26T20:15:20.337000 +CVE-2024-34508,0,1,c837d85f215debfd4876cf202e711a6ae35fdcbae2f4f24a57d2ef7ef10c5af2,2025-06-10T17:44:33.870000 CVE-2024-34509,0,0,18b67055124fa20b0e91c183169f58ecae6378de7abdd8b999f1e0307f71e986,2024-11-21T09:18:50.360000 CVE-2024-34510,0,0,0cd296a8ed9ad583e4681fc3af8f3a5c25699e2d2db65e494d34dafe2b8c0615,2024-11-21T09:18:50.597000 CVE-2024-34511,0,0,c1d20a47728b6c5526364d02e8958d8fb0539448423cf5c76333bac10d97f143,2024-05-14T15:39:15.780000 @@ -261207,7 +261211,7 @@ CVE-2024-34708,0,0,b6103d931f8db49de80394f3b0543e5df8df422ea783f294484fc137bbb2f CVE-2024-34709,0,0,4dd1030c3fb3e8cc330f2849a60862b197aa7ed76d8cc6aef7b0c90fdf00b844,2025-01-03T16:20:01.927000 CVE-2024-3471,0,0,a02b4e38dd6cde89110dd0146c1d954518d16b9add9346ac1806e104b8081110,2025-05-08T18:45:13.967000 CVE-2024-34710,0,0,05f4e9fcad99d59c221e6b73e2dd714053cd2db6f98c9291777c51b4e036ca01,2024-11-21T09:19:14.687000 -CVE-2024-34711,1,1,5d6089d879209ccf65b269a9576c1cd8ba1afbf9fc1d62c31bf9e8380c8db005,2025-06-10T15:15:22.710000 +CVE-2024-34711,0,0,5d6089d879209ccf65b269a9576c1cd8ba1afbf9fc1d62c31bf9e8380c8db005,2025-06-10T15:15:22.710000 CVE-2024-34712,0,0,cf5b325ebd7ddae90933e1bc277473f4d6cae9ff57c40754d15ebf6965ef4770,2024-11-21T09:19:14.830000 CVE-2024-34713,0,0,b206aae50897a4773c53b884158e7edc900433d8305492b823dfad73b1366504,2024-11-21T09:19:14.963000 CVE-2024-34714,0,0,035cb787cbe8de483ee4a16645070a6bb19000dfd09bef360b4a3489520b8957,2024-11-21T09:19:15.093000 @@ -261332,8 +261336,8 @@ CVE-2024-34832,0,0,d666b06e90db5d6103a7a5afb8a8f24858f5807cda782791ee77b38748da0 CVE-2024-34833,0,0,e921c52f8ba4aab0c818e238060dd9e8102cfc354231beb927b6583adaca3137,2025-04-30T16:21:23.247000 CVE-2024-3484,0,0,6436f89a5a918c130a3185756b1df756c1acba6c004c2b7a667c8fe8c3a2a0ce,2025-01-21T17:31:21.470000 CVE-2024-3485,0,0,b0e5c6c944785af17b0befd8263495908fedb37d601a800c28021c805e2af58c,2025-01-21T17:30:23.697000 -CVE-2024-34852,0,0,58074201394c52bf220e9a5d6579c41c5aa06e41596fec606364d65b4be22f3f,2024-11-21T09:19:29.667000 -CVE-2024-34854,0,0,ed8e2e8029ffc1bca2e9996fdb26935c25a1a7d30f9250be8b01cc26bde7837a,2024-11-21T09:19:29.877000 +CVE-2024-34852,0,1,54e2455b8c91ee25d334297589930500f3334416b5bf787679d748dd8fd7294a,2025-06-10T17:21:00.860000 +CVE-2024-34854,0,1,f255e80c4c1450234c3d10ab6aae9ef5f660462931e31acf8593de8b732fe322,2025-06-10T17:19:30.180000 CVE-2024-3486,0,0,0d5993d17197571d5cd09f33d87d89a1217d980bbed31e625a79bf331807c3d7,2025-01-21T17:55:27.967000 CVE-2024-3487,0,0,f02d105b9c966812a2abef4e8ab06614b7e6d7c4676b4647188943cf735a64a0,2025-01-21T17:54:33.157000 CVE-2024-3488,0,0,e0d7148f43b957ef9d7e5c6884cee4d75f931d9a140eaac64ca4f557ed9c60d6,2025-01-21T17:54:10.537000 @@ -261665,8 +261669,8 @@ CVE-2024-35368,0,0,9da6139a9df4799940792f290317b8db49591fdcf449097ad52cd2ef059da CVE-2024-35369,0,0,79648abe9572ba1d5982014a4b7711db4e7c9a57af06868d6c57445dadffc06c,2025-06-03T16:06:20.667000 CVE-2024-3537,0,0,88b73d7c8f1a261b4ffca2882db9825d253d6931cd78c575f5af74b30d9c4cba,2025-02-27T20:01:58.463000 CVE-2024-35371,0,0,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000 -CVE-2024-35373,0,0,003544dc8eb6fa6dad302354eeb11440cd20673e34000cbfd2387e6712ce6727,2024-11-21T09:20:13.487000 -CVE-2024-35374,0,0,d65b84ca8909409687eacc78608d4a5b59421573852643f942728fbca2dd58aa,2024-11-21T09:20:13.697000 +CVE-2024-35373,0,1,1fded72f5080d87c36b237766fa5835b9dea0ccef6812ba184cb792e6b8a7782,2025-06-10T17:25:52.343000 +CVE-2024-35374,0,1,7e35057479a190a12dfd1742ec77406a19258a69e14eda3e14e8b69663372879,2025-06-10T17:24:11.870000 CVE-2024-35375,0,0,529750c66b29cd8b61cda96bf1c7f758feb6c70ad58ef963cf3f9538cbd23843,2025-04-01T18:05:20.387000 CVE-2024-3538,0,0,f9085328d3641db4852851bac8f6772b68244406d157d6e79d2469ff9aab69a8,2025-02-27T20:02:24.880000 CVE-2024-35384,0,0,8505a2311391c3bfc28b204f55b0770217b74ceb837f59d871e564b739b790d0,2025-05-05T17:20:11.990000 @@ -261778,7 +261782,7 @@ CVE-2024-35593,0,0,91dcda4b6eb9e36336ff5f21e45be42b4410cbde9e6c00e7ab19e173d2ca6 CVE-2024-35595,0,0,ed19450d89ea0f5e939a230190c62bcdcc5cc3f271196e7ee45a9c064bc5fa31,2024-11-21T09:20:31.177000 CVE-2024-3560,0,0,c397428cfcb9b5f18b3a90eac4419a387b27d100babfed08ae37c835d54a300b,2025-01-08T17:25:20.823000 CVE-2024-3561,0,0,88f3e14256d827f46421032889c1c5cda4496483f1001600d1896efa64027275,2024-11-21T09:29:52.747000 -CVE-2024-35618,0,0,33b30812f225ee6bf70fa6d1920c4326fecdb5fba7b8c0a942399a10ef9d3b99,2024-11-21T09:20:31.393000 +CVE-2024-35618,0,1,4054ec096a115a9585f3b520ef333813fd89cecebd2ba5291ad79cde0f61e9dc,2025-06-10T17:30:59.167000 CVE-2024-3562,0,0,9c9f57c5460d61dfdd495d1b087a7861097e9d1e1b57cf14e2455042c8f7bd8b,2024-11-21T09:29:52.887000 CVE-2024-35621,0,0,f51785ebb78acd187faa8aa0ad2ba379530bd3204bd70cc267998376acf520f2,2025-03-28T20:15:23.563000 CVE-2024-35627,0,0,ccde48a8bacc26f12c1c71247e00206b1167454eafcdd659b3ddf4fc995347d2,2024-11-21T09:20:31.750000 @@ -264301,7 +264305,7 @@ CVE-2024-38520,0,0,13714aae8a893cb0cb37ad2183ce57b54c82c46e9436fcf730682b217fb72 CVE-2024-38521,0,0,fe59af26beafb1d6ac3c84b505b695c437a2d939550b13e48891788719e24788,2024-11-21T09:26:10.227000 CVE-2024-38522,0,0,163a0807e895af008e0356107c0ee6a4fe30e3d99691e9f9320a4c7a70b91c5e,2024-11-21T09:26:10.720000 CVE-2024-38523,0,0,fdfbc019b8660073143917c00411fa594869f2e30ae1fcc868663ee02238c566,2024-11-21T09:26:11.020000 -CVE-2024-38524,1,1,9a327cd0f04229fc407891537188d586957871cbdfb36bc1898860204e61e51a,2025-06-10T15:15:22.880000 +CVE-2024-38524,0,0,9a327cd0f04229fc407891537188d586957871cbdfb36bc1898860204e61e51a,2025-06-10T15:15:22.880000 CVE-2024-38525,0,0,227724d36192bb4e2a0af48cfb7f74f403105ccab9b447a7851963b5980ee755,2024-11-21T09:26:11.270000 CVE-2024-38526,0,0,c87b3796553d59f30541329f7bfb421e5fc1050358668dc3718477c22bb7a794,2024-11-21T09:26:11.483000 CVE-2024-38527,0,0,b80767cdd1dc141465114b74c2f216a3b5c29e7d46c42fb40a39c7ea6c867d2d,2024-11-21T09:26:11.813000 @@ -265752,7 +265756,7 @@ CVE-2024-40619,0,0,b6c460da541b2ec2a65586f5bcd57d99e2dc37254f1699fdd5cff8255e98e CVE-2024-4062,0,0,515e00a3ae6381b8be61020be135008853a85db956ffbe0f8a6e0d20f0a11e8a,2024-11-21T09:42:06.907000 CVE-2024-40620,0,0,76c01cbbb89edea54392977bc3cc4d12b52bafb7330131cde0f0106547ffaa50,2025-01-31T15:03:56.407000 CVE-2024-40624,0,0,2f4f28d0ea57b056f61b3a1537dfa2217ca138a77368e5ac42a5f311c8ff8ebb,2024-11-21T09:31:23.177000 -CVE-2024-40625,1,1,33f10d188485b67cbfaa1553af0375241e3d89cf848ef7095a9bd21f7163648a,2025-06-10T15:15:23.043000 +CVE-2024-40625,0,0,33f10d188485b67cbfaa1553af0375241e3d89cf848ef7095a9bd21f7163648a,2025-06-10T15:15:23.043000 CVE-2024-40626,0,0,6c38b8a06ddf6d9027b0d4dfb20f435e0c3c2837b958e0c059d9ba385cc4486d,2024-11-21T09:31:23.287000 CVE-2024-40627,0,0,ae2a93c7ec256d655b44ce063fa8b7439d8971fa08d9580865a26942fb08219a,2024-11-21T09:31:23.393000 CVE-2024-40628,0,0,704ec36bc278aa476c6d7efd391c49c7cdc61960b99c944487ebef0b137b1694,2025-03-25T20:15:22.063000 @@ -265997,7 +266001,7 @@ CVE-2024-40896,0,0,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3d CVE-2024-40897,0,0,5de984c0ce0b5f00f148c2d87f9ba7398ed21388187cb055a9d01cc9ee9adfcc,2024-11-21T09:31:48.450000 CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff81c,2024-11-21T09:31:48.670000 CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000 -CVE-2024-4090,0,0,ce3ba1367e368f35d99b2b76dc3ed4559b43f7abb16ea5ebd7a1b72dcb83782b,2024-08-01T14:35:12.593000 +CVE-2024-4090,0,1,931d8eb7be7e19c0705ff305319c8fb6e0cf140ae4b7489cdfef77cbf37e34ce,2025-06-10T16:12:04.837000 CVE-2024-40900,0,0,2eef31d80f1ee0f80eb06d995c8bd5896501640278c957585e3a2ea9a3d37e66,2024-11-21T09:31:49.010000 CVE-2024-40901,0,0,abbdc1fe508c2030f62aac2db7001ee59f715241c8ac8285395dd6fb0a0182ce,2025-03-05T18:50:38.790000 CVE-2024-40902,0,0,31e499e82c88bfdbc05e678ce43a92fdaf145152d612e5d4fb61a2c9d2151728,2024-11-21T09:31:49.273000 @@ -266655,6 +266659,7 @@ CVE-2024-41793,0,0,8e0f06360f8c9430262f88784cd6d058958bc74bff917fef56ff6df96d005 CVE-2024-41794,0,0,d101542d2feb5713681bb1fffd3a46d79df3d8742e19f9fe28b709711b9a9da5,2025-04-08T18:13:53.347000 CVE-2024-41795,0,0,5142a7be0ad6c4d39b0903178948e0bf21a48094c01e0ebc76e486e0b9fc6296,2025-04-08T18:13:53.347000 CVE-2024-41796,0,0,e96bb81e73cf666075f3771c5042527bfc6dcb0948ae67be6743b1761cdfeb8b,2025-04-08T18:13:53.347000 +CVE-2024-41797,1,1,57a315eafa9348bb80c8e4d5146a72cb2feb59cb807d2197a8e8875f8c397246,2025-06-10T16:15:34.990000 CVE-2024-41798,0,0,5fea74d6ad8cd06d69b9494512651a1267ba07a833ce4e1ec1687234e2029539,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000 CVE-2024-4180,0,0,7b26eb2d9eb2c173832c20124950fd1add79f6b2e59ec9b9cea55f5aed0aacf2,2025-05-29T20:21:42.117000 @@ -267015,7 +267020,7 @@ CVE-2024-42166,0,0,ad7e633f45131cd690a920c41a0a51a5bf0d41de735418be596855d789324 CVE-2024-42167,0,0,a8537f04ff59d4b55355491fa52ffd928dd919682df2e2ae176719a0ae545287,2024-08-29T15:24:12.060000 CVE-2024-42168,0,0,a407c813527fc521382bda7e4a5e806229c38d458710f9f5b6ab34dc75a928d4,2025-05-16T13:46:43.763000 CVE-2024-42169,0,0,ddb168c55b568d65045077b8e45b2c026943dbb18d2033e050c8d00172974c84,2025-05-16T13:46:46.037000 -CVE-2024-4217,0,0,02aab51aadef221bd5046d8a0947318eb8685f6df239aa554275fc9445b6d6e7,2024-11-21T09:42:24.493000 +CVE-2024-4217,0,1,c0fd004f7e6a1585bd1936871150ee708b9f52c036d68967c7c5ce7ffdda5b82,2025-06-10T16:00:06.517000 CVE-2024-42170,0,0,a622db76fc87d78a89b69dc9e12eee535b87c6b9b4c0b978d11c07b11ad4ffa6,2025-05-16T13:47:03.850000 CVE-2024-42171,0,0,3823e3d21e666d536df44e00222f8f15291588f31a989af9172288773a228e15,2025-05-16T13:47:12.563000 CVE-2024-42172,0,0,6a6014355aa4d385413f9c192c18ef1558bd0fbf8b3f281ffe184da648ec82e5,2025-05-16T13:47:39.180000 @@ -268276,6 +268281,7 @@ CVE-2024-43702,0,0,026195b67973267c5f7e1b66b43eadfe3de1f0eaa8dad79a11b9df4d6c345 CVE-2024-43703,0,0,e564d47a3ea8e2e59e7c0c62fe5b37de767d270b87bc716325b902fc07b61a86,2024-12-01T23:15:06.383000 CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5dc8,2024-11-18T17:11:17.393000 CVE-2024-43705,0,0,29f69c0cebaa0d9dd3b94a974b4686ab8ab2fbc5f28104cf63225fbecfd597b0,2024-12-28T17:15:07.190000 +CVE-2024-43706,1,1,39fa86eb73e17ac5a8c94f9e5e54576f1b930def3b8b2e34ac4dede854d1fd9e,2025-06-10T17:19:24.820000 CVE-2024-43707,0,0,c086df33301b56db6990f90f5532c67331696838b257e3be47983d37a2ff18c3,2025-01-23T06:15:27.380000 CVE-2024-43708,0,0,bb58672c949baaa0c0f0449c9266c7da5957c20f91573903a5d8f34b6754633f,2025-01-23T11:15:10.553000 CVE-2024-43709,0,0,0cfe36144398dd836604426e745d703e101291314062998e88fa4323425c0bad,2025-02-21T18:15:16.913000 @@ -269479,6 +269485,7 @@ CVE-2024-45324,0,0,6f2384476cdb21252574f040bf43ebbfa4531878480b92b7bc8c15b75b285 CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce38b,2025-01-31T16:36:15.783000 CVE-2024-45327,0,0,d09034f28dc7eb04e46d8b30e26f6e91afaa4624a6ce1f471921ca0a81a0814b,2025-01-21T21:58:26.373000 CVE-2024-45328,0,0,3825cf4022678fd08ea3ec1cf0cfb590a50f56d10c6a32d87fb40bf45d93870a,2025-03-11T15:15:41.963000 +CVE-2024-45329,1,1,bc995157f6415525845c29d43090377e523288fa40a5bc6faab8433f36e0cb48,2025-06-10T17:19:25.083000 CVE-2024-4533,0,0,44af4b305797db1348a75c48ca9942a2eff56934f4053d575cb80842b66ab4da,2025-05-19T18:29:37.150000 CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44297,2024-10-19T00:41:09.717000 CVE-2024-45331,0,0,6674a987e07ef5cefafbccbf3dee14b9068d9520dc28ed378470c190db2d6c7f,2025-02-03T21:03:06.133000 @@ -273497,11 +273504,13 @@ CVE-2024-50559,0,0,3695740747d676d4e73029de6f556dee8dd79a995dc1037000e244d070367 CVE-2024-5056,0,0,8fffdd4127619c786aa0989407007469ff9a6aa73bf668207b4ad19c19de1531,2024-11-21T09:46:52.267000 CVE-2024-50560,0,0,e5560d8e099bbdb75ebe3a313d5a07fb60056609d630bea2b282b04cbeaa12b3,2025-02-11T11:15:13.803000 CVE-2024-50561,0,0,51d6a6886183d861209a55cd82d08c7368f7ca6eecb96cadd88bb86e0f75077f,2025-02-11T11:15:14.037000 +CVE-2024-50562,1,1,042b4aeddf47a9bcff9798cf964b7b33e5086afb18b03d175d7830e3a694130b,2025-06-10T17:19:25.360000 CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000 CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000 CVE-2024-50565,0,0,0052767052bb2f202b3f6a2bb66a26d0a376b1c95ba46901bccf288399e729ed,2025-04-08T18:13:53.347000 CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000 CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000 +CVE-2024-50568,1,1,018e17ee3284c851c33ecf3773caaba1ca7a93ce2299c6031a79f964a456aafa,2025-06-10T17:19:25.660000 CVE-2024-50569,0,0,f395ce0ea2e4326ce9a1a0e799e0fd9e0f0f63be0581b485aece38df723835fc,2025-02-11T17:15:23.123000 CVE-2024-5057,0,0,24284bac69b4c25212e4a35daa692adcac74ee6bf20853c9d795eba1dce69ef7,2025-02-07T19:44:53.660000 CVE-2024-50570,0,0,902c9adf333cbbdd797d50eb3588c253071ee5e24a2cf88c4322eddb89d895fe,2024-12-18T15:15:12.660000 @@ -274471,7 +274480,7 @@ CVE-2024-51962,0,0,aa5b86386886c09d6f7775b329f01551003fe6d3a5aeafe034e2c76e33a39 CVE-2024-51963,0,0,65d15561511f4792024c62d0c3dbbe1a84656f415b27a24cc7fcb099d4df16a8,2025-04-10T20:15:21.723000 CVE-2024-51966,0,0,69a0d46bcaa28466534ecd74cb2be650273566964ba1c75d7e0cb22b97d45b63,2025-04-10T20:15:21.850000 CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000 -CVE-2024-5198,0,0,e3b60a24e70d05db6a4890e4f4f33bd5edbd2d65a39b50fe1ed5f9129918e2b6,2025-01-15T15:15:13.607000 +CVE-2024-5198,0,1,3fa9ec394e1888d66e83812554066b455d9458d73cda1ea9275cc8bdd128d3dc,2025-06-10T16:12:09.340000 CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000 CVE-2024-51988,0,0,a45b9470dfa3fc9b3b82cb1bacb88f01f17e4e8292b3ec9c884e93e16e6b15ff,2024-11-08T19:01:25.633000 CVE-2024-51989,0,0,a62aa77319eb44e1ae15c0a171eaaf0800894194bc1d4e92f5debdb86b23946b,2024-11-08T19:01:03.880000 @@ -275934,6 +275943,7 @@ CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04 CVE-2024-54015,0,0,40971c469c3896fb9f44684b71eb7b15c5b49eb2e701c300dd7c0c4ad6b2d8b6,2025-05-13T10:15:22.143000 CVE-2024-54016,0,0,3b5eb58b4244700d1bcb32c4dac2bd0c90e1e201611d8a89739b74a30622a284,2025-04-01T20:35:54.023000 CVE-2024-54018,0,0,cad6d12f1a14e927d37238581f95d0e8ab02634a89452232f8dadfac53c033d6,2025-03-11T15:15:43.113000 +CVE-2024-54019,1,1,7dd14f01c5ea08bc2f9a14467c4fb9571f0cac6a91594503123350aec7a742bb,2025-06-10T17:19:40.090000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 CVE-2024-54020,0,0,deedde63d908f2774e588bfa00ef40030e124db57741b462401a683c70fb1d25,2025-06-04T14:34:54.323000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 @@ -276897,7 +276907,7 @@ CVE-2024-55928,0,0,018babed0310658b07b5c4cc048ea862b97dde417bea4aec4ac96e78c63e7 CVE-2024-55929,0,0,73ab0f50a888e1a4aaabff70d3287dce031dab7e455c55fb0f3949fe9cb909b7,2025-02-24T18:15:18.507000 CVE-2024-55930,0,0,200301077d6523a98f2cdf7b12555f283c4f9f49342ea4a79e0f4277912f7457,2025-02-24T18:15:18.663000 CVE-2024-55931,0,0,1707a199fa8f7a35e3d361e474111ddc1bb4d01126b118e72f6c6549081fa177,2025-02-24T18:15:18.830000 -CVE-2024-5594,0,0,e83997683fa99e09aff9c834194094ba64e40aa3f0fa284b66b83f5bab1e96f1,2025-04-02T21:15:31.310000 +CVE-2024-5594,0,1,b17295821f4b5d132529b4c0bddb81c2865db8711ebb0e2cefee51de2a7a48b0,2025-06-10T16:26:11.807000 CVE-2024-55945,0,0,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000 CVE-2024-55946,0,0,4ae99bd7b5e262d4569d876ea072eb7cfefca3750272862019b440360e2e8df5,2024-12-13T21:15:13.603000 CVE-2024-55947,0,0,37ed4b03b4f6e0393447216185584696cf9bbda82efd43b9dbaf1b5d855978b0,2025-04-10T14:47:42.700000 @@ -277082,8 +277092,8 @@ CVE-2024-56175,0,0,dba90ff9c1cbd2e0bbc47d1b12b780c5635a5f3546a1812f47b063f6ce890 CVE-2024-56178,0,0,5e192747338bd9f0e88e598c725112a888b30130ca51c9dd4c8c023892000eb7,2025-04-18T02:16:13.783000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000 -CVE-2024-56181,0,0,823d3c35ce123604f2214312cd615d4a13dd735f5f12f09109822e62eb4333ff,2025-03-11T10:15:15.597000 -CVE-2024-56182,0,0,c6833558044e62c03a373a21a776c7ec05610a46c040b4b436f84fa788d6a48d,2025-03-11T10:15:15.823000 +CVE-2024-56181,0,1,99320f5318c3c983e160c350f6cdf26bf8ee1c17fa626cf4ea95787b0c02e6c8,2025-06-10T16:15:35.567000 +CVE-2024-56182,0,1,5ee1e5b1fdde49b3515b4dcb4f95321f9c089994e2beadf28f64a425c5cfca9a,2025-06-10T16:15:35.710000 CVE-2024-56184,0,0,cfa96ecfb5fa8c21810ae009c6b4f3b06db71fb50957ff937e7c209966648dbe,2025-03-11T21:15:40.710000 CVE-2024-56185,0,0,9bdd48ae93803b071e055266f51cbd1242ee40b4debb9c941d1cb0555b1a3a6c,2025-03-11T21:15:40.857000 CVE-2024-56186,0,0,190ae1bf908514c2f9d2c38d3d34f604f6f1ac9115a2632a974d3e1689496671,2025-03-11T21:15:40.997000 @@ -277832,7 +277842,10 @@ CVE-2024-57177,0,0,06dae5d3ddad2a6c66f8afbd40a9c732b2a499e75a1412c2d2989dabc4f21 CVE-2024-57178,0,0,1f6e448ac583dbc5dc66b3e862fb64a834e1fd6ac65d6692ba488ccfc0af0396,2025-02-10T20:15:42.013000 CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000 CVE-2024-57184,0,0,3fd914158434721c2565c1759ef928a3f64e92f246b28f05ed1e4a71635f067b,2025-01-24T15:15:10.523000 +CVE-2024-57186,1,1,3cb7bfc921c90a0c2e8bf89e93b21235b5460fce01f59754b641c8ef5841e3b8,2025-06-10T17:19:40.367000 +CVE-2024-57189,1,1,4fc162f08873672d8151f27900e054f69ae2c9ba29a1ff213a01b33fcfcbe787,2025-06-10T17:20:09.367000 CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000 +CVE-2024-57190,1,1,96b4ea5b8e89fdf65c2dc7a6134f3d15efcff4445931482d71fe8a7a365fc624,2025-06-10T17:20:38.540000 CVE-2024-5720,0,0,eb323a155cad85d456bd7c0f7894b5f9589ce98c04e2db5736a7c40744f539a9,2024-11-22T20:15:10.563000 CVE-2024-5721,0,0,f143dbbb695fa9f83fd9d3c9d9d3aaa920ced069d4617f7e2c69a39cb694b5ad,2024-11-22T20:15:10.677000 CVE-2024-57211,0,0,98fcb4c7f26e4032b5a1184446b4d799208b39be2e033c671a8c4b297e19eeb9,2025-04-03T15:48:09.543000 @@ -278889,7 +278902,7 @@ CVE-2024-6268,0,0,5900bd8af9a35b9dab7ec0c2fdd2f07e45bc41e7ade99f4ee05dcc3679fe37 CVE-2024-6269,0,0,d2d245d63b1e933e05ec4b88e796e06a36968ca6c7de1a215432194b5ec64008,2024-11-21T09:49:18.817000 CVE-2024-6270,0,0,27b8037c535ceac634987de32499d36983da2b4ecd16c529d414a9fbc99a7a27,2024-08-05T14:35:08.040000 CVE-2024-6271,0,0,136081e174f15c403abc86c391c98c70a8451e51479e549b0d7307fcab4c8703,2024-11-21T09:49:19.120000 -CVE-2024-6272,0,0,ff923f0bc43bfec5c55f3687fb679b311f681f57cf0351a092df48b9c562a355,2024-08-01T15:35:19.753000 +CVE-2024-6272,0,1,8bc4bf34916435fa2b4d6200453c00786411f38f0073366dede4608d6fcf7c75,2025-06-10T16:03:21.030000 CVE-2024-6273,0,0,3621b9bf668694d24430b266f429b473105d8f3ed608f3b4272201dee56f6ea8,2024-11-21T09:49:19.480000 CVE-2024-6274,0,0,99546f32ef4e56d626e144aeae424112b2e7d49396605f80c199f3875f89ccf2,2024-11-21T09:49:19.643000 CVE-2024-6275,0,0,083537d87e392f07fc66f96701ea1b0788135f182ca90c5050e717b556a3011e,2024-11-21T09:49:19.813000 @@ -279027,7 +279040,7 @@ CVE-2024-6408,0,0,30517c84e56653716c763ea9491ffdcc764311cacc6491dd162c5ceec8a281 CVE-2024-6409,0,0,a7fd15ec37d21b5a5103c31d051df2a98fdd11293bcfd671adde2d6b71c1b7da,2024-11-21T09:49:35.850000 CVE-2024-6410,0,0,50165d1662967869bcb3714348c22773aa44b11bd1ca581e38d46fb1aa191fed,2025-02-10T16:02:35.810000 CVE-2024-6411,0,0,90292b1bab251c6b9659c50637f115ebcc12ba19d63f63d982b560f264848cd6,2025-02-10T16:00:19.467000 -CVE-2024-6412,0,0,1cc97318e9847be060ea2dbd112e685fdfd5f487155372b4426273d0d61f6380,2024-08-01T18:35:24.697000 +CVE-2024-6412,0,1,93834292b4e461b3d6e82983eedff531969478cce3625ea93974c034da05d225,2025-06-10T16:11:43.323000 CVE-2024-6413,0,0,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000 CVE-2024-6414,0,0,680b93173475ddcaa6adbc0944f1e5c3530a7e69a2cc6fb17e05baeb0ac3d8c6,2024-11-21T09:49:36.473000 CVE-2024-6415,0,0,da9029682828856895395262c0b9c43d7a83489985ac7e8e0dc7bf925e3b7526,2024-11-21T09:49:36.620000 @@ -279143,7 +279156,7 @@ CVE-2024-6532,0,0,2407b42018f3da2cafc970b52c1c77bde3fd6e6365e373370fa37b28b396b3 CVE-2024-6533,0,0,7c76cd0497295bcea8ddaf17ea367bd3231a092d4f1d355ad959ac1bbed5a96c,2025-05-19T18:15:26.833000 CVE-2024-6534,0,0,77773ba8637f01892ca3f6641fe8442e5c6280672a181b114b53032c7b4aca6d,2025-05-19T19:15:47.540000 CVE-2024-6535,0,0,44388289212b949983bbcb08fc4f387d14a7864b80be8ec8b5ccdce879cce735,2024-11-21T09:49:49.560000 -CVE-2024-6536,0,0,4e1867493e6f7c1e950c15aa2768a98ac72cddbf5d06c6d2259320ca6542fdf4,2024-11-21T09:49:50.537000 +CVE-2024-6536,0,1,9aad41cc349130329c2772e0fffacd9b3eaf7684c2688938e6febfa55873b1aa,2025-06-10T16:01:07.250000 CVE-2024-6538,0,0,f7440ea0b8cf2901f701aeb52d59c6d0dcf7f1ec4b01d2832ad6e6882f217cd6,2025-06-04T10:15:21.357000 CVE-2024-6539,0,0,488f82b4dd195018a4571a7b41599ab86771c19553aea6769341658d3043c227,2024-11-21T09:49:50.707000 CVE-2024-6540,0,0,f3ea6a455e292a17968899748da95526cfa3d10fdcac7853f32fce07f60e60be,2024-11-21T09:49:50.857000 @@ -280974,7 +280987,7 @@ CVE-2024-8470,0,0,0b09aa8b8067433b7afb73b61c7aa44d3ef7ce8628b7e8d3b9e29fa3afb00f CVE-2024-8471,0,0,3934935f0a31bf82a596702efda6613996b08d7c183fa97f6a84e3cc4bc42129,2024-09-06T11:44:22.510000 CVE-2024-8472,0,0,a6a3ced3bf4a7f20791a06fac7764ccd2d88fa692882742c77836c8aae9605ea,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,bbd4d04523589cb8c745e9ab16e4a2c78d73b9497ab6f7282bb7e3bf6a9bfe27,2024-09-06T11:44:45.017000 -CVE-2024-8474,0,0,6053d1d76e4722f33becf551d03e031da64cd84f747e27a99d19db61a43237d0,2025-01-06T17:15:44.747000 +CVE-2024-8474,0,1,bbf13057e6308ec821ef142c0b82245d4c2846b12a2d018e6828009daa8253b2,2025-06-10T16:31:24.740000 CVE-2024-8475,0,0,c86d89e65a4821d108142f782b16ddf63e182d7002314d62a9de3c71a0583b70,2024-12-17T12:15:21.010000 CVE-2024-8476,0,0,e10a403d1e51fb18d41d013015e6a782c14511b4b5a178aec34efa9588c9653e,2024-10-02T17:31:00.583000 CVE-2024-8477,0,0,19e1a50b82df4e949fc45923ac7e1924aea3a0df2879078ebf532cd95acaecd0,2024-10-15T13:30:52.877000 @@ -285553,7 +285566,10 @@ CVE-2025-22247,0,0,e2ccb0d69d4b19d529c00757c1f999c2de56db4ef675be5b764f7810fb3d8 CVE-2025-22248,0,0,6a9e5f44ae59f3eb4fa0812a308821c9129d4ef2a0a8c4fa23d2a9a359e62a28,2025-05-13T19:35:18.080000 CVE-2025-22249,0,0,f4d67d6ed3673265e11af908716828682348f88de500075ac363e3a69c846579,2025-05-13T19:35:18.080000 CVE-2025-2225,0,0,d26980ce605de1c16e8b872e505802fad1242bb85c846db0c5c70a05dbfaf01f,2025-04-15T18:39:27.967000 +CVE-2025-22251,1,1,d4ad6c76ea4dc79f15ab285d5d358ca96dea0d94141b9a85859142e47ac40650,2025-06-10T17:21:08.117000 CVE-2025-22252,0,0,d2f2320f288010f024706c18a6ea879e02f185cf8c34fd036ab23a80b6f775ac,2025-06-04T14:35:38.543000 +CVE-2025-22254,1,1,29de84e055058543952e5058b0c593bd2bd0ef12e1f125655e48ae851ed69319,2025-06-10T17:21:08.420000 +CVE-2025-22256,1,1,cf8bfc89f4bbb90e85537ed597063af68b0af2329e6ba24b820c6865426204b1,2025-06-10T17:21:08.703000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -285708,14 +285724,14 @@ CVE-2025-2245,0,0,47aa418e84b3637e8df058444cbc8a6e983fd5867c6c8fc35a1ae9e7ece391 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 CVE-2025-22452,0,0,ff338c2acc92abbef6e1d867487b0bd2693a0084a4ebaee6adef7d21d7f92aea,2025-04-07T14:17:50.220000 CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000 -CVE-2025-22455,1,1,f5c85bab51d169291a87cc48b82fdca2e7a3f4c06568634dddf327c5cfb7d69b,2025-06-10T15:15:23.210000 +CVE-2025-22455,0,0,f5c85bab51d169291a87cc48b82fdca2e7a3f4c06568634dddf327c5cfb7d69b,2025-06-10T15:15:23.210000 CVE-2025-22457,0,0,38f08c2095b91eac8132ed564fd14198f534885976e426da8483ec6f86216026,2025-05-03T01:00:02.097000 CVE-2025-22458,0,0,1ba3f19027c699ce41e72e1904aec436988c26afbb75393422f286b69c280720,2025-05-17T06:15:17.870000 CVE-2025-22459,0,0,c344631280ed7d336da1ec45c45e7d808eabcfd90e75f4df48c2b7f75013ec85,2025-05-16T14:00:18.793000 CVE-2025-22460,0,0,fa87e8efd2c42f56619d397ee1ae8effa2a4deef13211c7e8012f0ed94f4c60e,2025-05-13T19:35:18.080000 CVE-2025-22461,0,0,bfcd0426d550c133cc0b5bf7ca512847a9828b37dee97a07c0c240c7ee1c7914,2025-05-16T14:00:20.580000 CVE-2025-22462,0,0,02e1e404e23d8a2d6b902e34fe3c6e522b225bf15c1d8026dcd04f539c414ecb,2025-05-13T19:35:18.080000 -CVE-2025-22463,1,1,ada31c76c7a0cb6256803416ebbb2afc10c39ec9761158c770f0d27e345ff0ca,2025-06-10T15:15:23.383000 +CVE-2025-22463,0,0,ada31c76c7a0cb6256803416ebbb2afc10c39ec9761158c770f0d27e345ff0ca,2025-06-10T15:15:23.383000 CVE-2025-22464,0,0,ad03886100376a0ec41e7ca4613c26d39e71749c65342bf61ada280571aba565,2025-05-16T14:00:22.290000 CVE-2025-22465,0,0,908a77a3e0451842fdc9a7db066476e54834da2046dd0ae9eec987eb9b5f29ed,2025-05-16T14:00:28.123000 CVE-2025-22466,0,0,0de7e357b0eeb34991a33cb40eb8f6c143429acd58ed604ea70920f3a5ace203,2025-05-16T14:00:29.970000 @@ -286430,7 +286446,7 @@ CVE-2025-23359,0,0,81173cd0c77c52178cba2d5d61bffbcdde8f7970c410f870445748c25344b CVE-2025-2336,0,0,e04e263f577ee94994be76c7f45e2a366ef0c6a3a1e415c7a4e9e5f507e17810,2025-06-05T20:12:23.777000 CVE-2025-23360,0,0,44ec4858c221e4e9b3ef85a446da660e97979bf1d4ef5b7d7efaafadb38d1c40,2025-03-11T20:15:16.633000 CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000 -CVE-2025-23363,0,0,b9bdb2f5570a42ae3d8b5d6f5614156fb3bb4c04b93a61bb990c205c4501f432,2025-03-20T17:15:38.153000 +CVE-2025-23363,0,1,35c6147ff63b42be8a96d41b6675b8a23b828204268fd2d9be277916193444c2,2025-06-10T16:15:35.990000 CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000 CVE-2025-23367,0,0,dc098e4899b3f306817e6d6c34a4bd055f0e4dc6c153870c1142849722c7141a,2025-05-06T20:15:25.910000 CVE-2025-23368,0,0,420fb00642e39b5577b4518ecebd554328cd6cece3e6b7323ad06772dda6199f,2025-05-31T19:15:20.510000 @@ -287155,8 +287171,11 @@ CVE-2025-24061,0,0,b521a3624cea8bd9d47fb3d8eaec24a07794b1a32700440ca358cd02a5180 CVE-2025-24062,0,0,cabb29da22470c3599c0329336c056dd9a5b4f7cd3ca7edd1a0c02fb1c312923,2025-04-09T20:03:01.577000 CVE-2025-24063,0,0,fec2a9feb349eff190a599709c0adf8e2e813f7b6a6047359eeb483ba241f53d,2025-05-19T18:23:57.450000 CVE-2025-24064,0,0,218f6cc47ad1a62f4f0e68482476a0e2acc1cd45af444b7c3515886baa130a34,2025-03-11T17:16:29.007000 +CVE-2025-24065,1,1,da957471ee7ded405fb9d3006483e67fc05dfae845f5fcb58702dc6102998161,2025-06-10T17:21:08.970000 CVE-2025-24066,0,0,43a950ede5ebe390a8e149dc7e5561d06958436b077b966d3c4014bab1ef06cb,2025-03-11T17:16:29.223000 CVE-2025-24067,0,0,3da9c2b786b8c9c7e14d412d1bb071c43af6d56e744ede25090104ca92ddcceb,2025-03-11T17:16:29.477000 +CVE-2025-24068,1,1,3be7beeefc088677533dd82f6738a6f3a0cdff38aa1b16966c361f84a995c830,2025-06-10T17:21:11.880000 +CVE-2025-24069,1,1,bdc75f1473ef5cd663865fa76cce91729720266bba98d3c906dbebe436bc7368,2025-06-10T17:21:14.257000 CVE-2025-2407,0,0,21e602e5f9293dc5b926b2bcd858886585bd73dfbdfdae3fd03d8f092b288eaa,2025-05-28T15:01:30.720000 CVE-2025-24070,0,0,05e75849f69db310a2e6f6ecf21e5b77998edba4fa819243e609bd27964c9def,2025-05-06T15:16:01.300000 CVE-2025-24071,0,0,937e664eb80922cfe593897847de35569c90602f40294027181c05737e712c25,2025-04-16T16:15:29.953000 @@ -287487,6 +287506,7 @@ CVE-2025-24459,0,0,257e6112464c1679ae0abd32e184bcf8f361e1385cb92f80002e53f6e2f87 CVE-2025-24460,0,0,4f72eb3be22e4f1df5ebc3a0bd9e4b0215891e7379b9cb7c39c53c2299ad1aa4,2025-01-30T21:25:18.337000 CVE-2025-24461,0,0,25f37a551c58c38f8a12f7c46f3328964394f6bf5bab9d552ab0758339b513f4,2025-01-30T21:26:17.583000 CVE-2025-24470,0,0,b97a6fef4b5505dee945d637a8774d8a3a426e3a9c38ffd15f57405368d61eb7,2025-02-11T17:15:34.730000 +CVE-2025-24471,1,1,3f2d6fe574bbff0fd00f627639dab83f6977dc50649f388e7c63522ab03bcc1e,2025-06-10T17:21:16.277000 CVE-2025-24472,0,0,573046e6e59a9878d2f5071b0132cdfc67ff241095b627fd46340e7e712c33a7,2025-03-19T20:21:38.197000 CVE-2025-24473,0,0,3ae93405aff32059fba30d19017fffdbad02a02f70e176e1cb2c599c6cc09d61,2025-06-04T15:38:01.880000 CVE-2025-24478,0,0,0083a83ce8a7467bd79ed623e875ec78bf3adca87990be9aea0e893fa7d8e9bc,2025-01-28T19:15:14.777000 @@ -288141,6 +288161,7 @@ CVE-2025-25245,0,0,9553bdb2bbba17800d10d6fb307dc38303cc249115fd509a4ca397b2ef8f3 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-2525,0,0,6681512816c86a4dc20141a0c3ff6e8c54c015b41d7df5f29fc6bf7816448bbc,2025-04-08T18:13:53.347000 +CVE-2025-25250,1,1,8f33c9952e5c7287f320469cf22ab53257e92797381966d48dc69b1bad74d430,2025-06-10T17:21:16.550000 CVE-2025-25251,0,0,7ba720b0969d846f1f4c94132b0eb572e4c9a81f6898891b935d17882c7c0a34,2025-06-04T15:37:46.183000 CVE-2025-25254,0,0,c4f21e6036ba144ab43461c15a785205542371d6b8f941619552468f7ca5bf0a,2025-04-08T18:13:53.347000 CVE-2025-2526,0,0,b4d2665b0df39fb8efb0ebc6a7ec708e940ede0cae79c4c99d0922650362cbb0,2025-04-08T18:13:53.347000 @@ -288633,8 +288654,8 @@ CVE-2025-26389,0,0,69c0b4482301cbdf7810c0d66dde175a8a55879ae4b001f43aded2e047b17 CVE-2025-2639,0,0,eeccd7e86f1a8e6550900d4406a77fd9c06a6948c701e759827649fddf007255,2025-03-28T19:33:14.553000 CVE-2025-26390,0,0,d486511ec0cd7e022494115d025bafe0774221a17a1b54e8ff55467ae4483ee1,2025-05-13T19:35:18.080000 CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000 -CVE-2025-26394,1,1,d187a431c7b6d346dd8faced9709a7f52930561861d903d5fb294b9ee634000d,2025-06-10T15:15:23.543000 -CVE-2025-26395,1,1,1ddfc667183206a3d9f2e26ab38d1b914ae8d36afe9bb80f7f7d584830c5b9db,2025-06-10T15:15:23.723000 +CVE-2025-26394,0,0,d187a431c7b6d346dd8faced9709a7f52930561861d903d5fb294b9ee634000d,2025-06-10T15:15:23.543000 +CVE-2025-26395,0,0,1ddfc667183206a3d9f2e26ab38d1b914ae8d36afe9bb80f7f7d584830c5b9db,2025-06-10T15:15:23.723000 CVE-2025-26396,0,0,3a6e4823811f7c53f918af9e5601b8b92ea760d35b58b90fdbdace05eb9a40f8,2025-06-02T17:32:17.397000 CVE-2025-2640,0,0,cb1c6d71f05715e40a599d54b3e503bcebd1109fe2ad2ac7ebfd5568ea675609,2025-04-02T14:26:23.040000 CVE-2025-26401,0,0,8a8a5edf8458e0cd9c5461b93aa3dd8d7a38c5486b82730ab0a36983d22db1ca,2025-04-07T14:18:15.560000 @@ -288651,7 +288672,7 @@ CVE-2025-2645,0,0,bb51f6ba23884b7e7c3767dcbb7ecf7badccba1b056823008f0ccc4a1f7f8f CVE-2025-2646,0,0,1f43af586340e9a3b657344aff21032473ef2c407815ff224af302b07a3268d0,2025-04-02T12:32:58.283000 CVE-2025-26465,0,0,ac0fdb720eaae016b7a47bcdeea42f0bc1abfe57712ef9fedbef53f01af96ede,2025-06-02T15:15:33.437000 CVE-2025-26466,0,0,1656a292c9a746d1d9c8576626629bb24a094bd9c889c8b628a2189f999ed909,2025-05-27T16:15:31.100000 -CVE-2025-26468,0,0,163e88e66617a1b6bce0df5f891a40b8ea6ed555fd047a72d2856f022ca7328b,2025-06-09T23:15:21.753000 +CVE-2025-26468,0,1,edba52d99131ab75360a32613dde6fedaada35c21cd25dd55976d4c4b7396a5c,2025-06-10T16:15:36.120000 CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000 CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000 CVE-2025-26475,0,0,bb522c072ef93dfba48b372ed229d0225844c8b3a620822d85a725743264d063,2025-05-20T18:01:18.020000 @@ -289248,6 +289269,8 @@ CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3 CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000 CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000 CVE-2025-27205,0,0,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000 +CVE-2025-27206,1,1,22f123c3c094370c66d8897e77457ff98e0b3fc3a8c584fc2922bbd227a363d0,2025-06-10T16:15:36.273000 +CVE-2025-27207,1,1,fa179500bfd16643cc28a20150c3741b024460983eff3b9096fa28bbec56b60b,2025-06-10T16:15:36.433000 CVE-2025-2721,0,0,aa8959d6414ccd78b185fee276132fe2183524f73060666b030d6ef296f0e6b0,2025-04-22T13:15:42.990000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,461867c9c6ad1aeffed9a753c37dda365d03d66745eecef158a52cad45739e4c,2025-03-05T14:08:20.493000 @@ -289482,7 +289505,7 @@ CVE-2025-27499,0,0,5f67388884f61cbdff1996d64d628e46709b8560c17359d456ecd050bc05a CVE-2025-2750,0,0,c19d6566d6ac381dc800cb326b33126bef2813593a7d245f0fa739c6c3b30888,2025-03-27T16:45:46.410000 CVE-2025-27500,0,0,86395c642c95ea913b918c9cd4b508655a7fe40b1107839113b18708952581b3,2025-03-05T20:30:38.860000 CVE-2025-27501,0,0,756f7a56a5075d786b5dd1834bf05ac5f72e578e4322539a8fec9c54c550e7fe,2025-04-23T18:45:42.070000 -CVE-2025-27505,1,1,65c408d3041df6458d3d90f3d80e16337d50eee693083889cb1968be95661b19,2025-06-10T15:15:23.903000 +CVE-2025-27505,0,0,65c408d3041df6458d3d90f3d80e16337d50eee693083889cb1968be95661b19,2025-06-10T15:15:23.903000 CVE-2025-27506,0,0,32b11c29187a961e8c53dd6e270016dcdaaf49f193aef3211b78316072c8bd71,2025-03-06T19:15:27.833000 CVE-2025-27507,0,0,f102904d74ef14427d4091398f7ee4e6c4c616cd5703ded2fd821f8eb925d7b3,2025-03-04T17:15:20.360000 CVE-2025-27508,0,0,f715817c4f100acb64f230b192c6c7e1e45a0a1b5dc8999db4503d2d4c79106a,2025-03-07T18:15:48.033000 @@ -289506,7 +289529,7 @@ CVE-2025-27525,0,0,a4b246e05aa8e9149e0a9842b4c6807efcd61fab385038ed52473da98c7e4 CVE-2025-27526,0,0,ddc528ca33e807ad7bd5971d3e294beeb24112a05eee8ee501fa1c1a70ff05da,2025-06-03T15:36:56.813000 CVE-2025-27528,0,0,737d925979e07df03f0b19543dbdef55dc6a203923452f1c2a733ea2711ffa92,2025-06-03T15:36:47.120000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 -CVE-2025-27531,0,0,9397fd6f5bb41c7c16cafe0bf6c6879d5b9498685b699b089024b73cb6d8b05e,2025-06-09T12:15:47.880000 +CVE-2025-27531,0,1,1303d3aeec575967fadd243a1ac347c266301df8b243b9df109aa6520d47fda6,2025-06-10T16:15:36.583000 CVE-2025-27532,0,0,651aa4a409c4869b141a04074791dba5e586b669772ff0617df8a664fec2b98e,2025-05-02T13:53:40.163000 CVE-2025-27533,0,0,b646a1fe0a6d11554ef785ea8ecefbb2ab2f1a88b51b3c456731090eb57b5f27,2025-05-07T14:13:20.483000 CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000 @@ -289732,9 +289755,9 @@ CVE-2025-27811,0,0,6df32dd39138756dd7fa6b11625de7738255484a05afc02ff0b73116671b1 CVE-2025-27812,0,0,490eea28d11bf4042efca85e606a63ea8705fbb9895bc0e4fb69498d1dff9f35,2025-04-11T15:39:52.920000 CVE-2025-27813,0,0,810e9a9403b82aebefac61476a9e0011d443081011347b72d18ecc06e7e5914d,2025-04-11T15:39:52.920000 CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000 -CVE-2025-27817,0,0,7dd4c0bd1a46bb395067ed1b44269b1e6f06f079144a4b41be7d2c719bd94ee0,2025-06-10T08:15:22.367000 -CVE-2025-27818,0,0,42d27206e0aa04dd785d158861e6b931e38e64a728de10e6a627883d7468c48e,2025-06-10T08:15:22.533000 -CVE-2025-27819,0,0,bbd21378e3e0969ce37ff9bf4077c7ef169d69d769b03d6976946abc183827a2,2025-06-10T08:15:22.687000 +CVE-2025-27817,0,1,5f3b1f3df6dd3abc65fc6fd2f2abad940e8ad093c52e442fff0f54b6586d6c46,2025-06-10T16:15:36.750000 +CVE-2025-27818,0,1,b76253872a776ffeff6306fc8613a21f1ec7a865a1f9aba9204071a027863825,2025-06-10T16:15:36.917000 +CVE-2025-27819,0,1,3febf2e90387fa8ff814d5b98198d518bdb46f827cd4d6d5ab06839c3c06a3d5,2025-06-10T16:15:37.083000 CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000 CVE-2025-27820,0,0,30e553492644fd74a08595ea9e898b31b3ee3235057c290c91dd23e5320f10ac,2025-05-16T23:15:20.193000 CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000 @@ -290405,6 +290428,7 @@ CVE-2025-29824,0,0,9b68de2f887d726a15573443eb9f7c45e42b83e06251b9f017efb40ea9c20 CVE-2025-29825,0,0,604130cf95a2384ccc9598b84d4398e8d3d0acabfa9301765f2a231a00f7dcca,2025-05-02T13:52:51.693000 CVE-2025-29826,0,0,b8b94b05537d00da563215a535284715880e4d6d272cc123bddc185b2bec878a,2025-05-19T18:21:12.547000 CVE-2025-29827,0,0,2e8e92f657a5b96bee5028926fee125ed4ce7d6916088606badc567f96de2634,2025-06-05T14:28:24.673000 +CVE-2025-29828,1,1,1172907f6aad92e18fd048ed3e884d4ea08d8dc8cd0c5240883232d14ea34444,2025-06-10T17:21:17.087000 CVE-2025-29829,0,0,a38180b5256e9e3e7e8116f13669c8ca21a6d857a2a5c2959b157f115e7de99b,2025-05-19T18:20:40.080000 CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f9155,2025-04-01T20:26:30.593000 CVE-2025-29830,0,0,cb46bd440f8728e7f046be292a6f910ad48c59f67a504a098c9b8b355250f838,2025-05-19T18:20:32.003000 @@ -290595,7 +290619,7 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000 CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000 CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 -CVE-2025-30145,1,1,c4f6262ca91ec00b3e849364599a20f946afa18ed53d291fd401e3e304e41105,2025-06-10T15:15:24.070000 +CVE-2025-30145,0,0,c4f6262ca91ec00b3e849364599a20f946afa18ed53d291fd401e3e304e41105,2025-06-10T15:15:24.070000 CVE-2025-30147,0,0,21b001eedc5229568faf13723668d957db05c48cdca65d5776148924a813e27d,2025-05-08T14:39:09.683000 CVE-2025-30148,0,0,29af0e59843efb2e7b8c69e1b7f2af701bb5cce0280381a18f1bffe78cdaf0a3,2025-04-11T15:39:52.920000 CVE-2025-30149,0,0,e4e4abf7c26f122ebf56947c382013766c863ede6e6d63f3e59a11447b9eeb84,2025-04-30T16:08:29.560000 @@ -290660,6 +290684,7 @@ CVE-2025-30217,0,0,255ed4a5f5d331010e4f8f80bb9c804fc57df9c07f06a9ea33aa8ab1adac0 CVE-2025-30218,0,0,0938dca1e8d47564f064f28410796b8b85eb62ded957e7109b8e0c2e3158457f,2025-04-07T14:18:34.453000 CVE-2025-30219,0,0,326f919a01c3e200686e1e77066b4ecd3788d0deb365cd59968de4fd276ff7df,2025-03-27T16:45:46.410000 CVE-2025-3022,0,0,3e5c3522912a5af9f22a50e01e2ab86007dcf43ad518eed68ffde4cec152f888,2025-04-01T20:26:30.593000 +CVE-2025-30220,1,1,37fc55eb088227c365e1c43690199011a2ece3c833218711876e13d727db40b3,2025-06-10T16:15:37.387000 CVE-2025-30221,0,0,b78962d7d374d57624c57c2bd45520ed73de256e6210780692f628d0e7b67d45,2025-03-27T16:45:12.210000 CVE-2025-30222,0,0,8181bb8e50b5d5403e3aeeed651e80d360ebd306c6c001c9fd5d8239df2af092,2025-03-27T16:45:46.410000 CVE-2025-30223,0,0,31b61b937326178d46925dc0ef3d6b549ce269034fb63371f6368418121b1ad9,2025-04-01T20:26:22.890000 @@ -290678,7 +290703,7 @@ CVE-2025-3026,0,0,e1d5f90de5cffdef16fb6ac0720c6a50512e756b166ba5e7f995a1b9b9409a CVE-2025-3027,0,0,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285f7,2025-04-01T20:26:30.593000 CVE-2025-30279,0,0,d448c979e445565b7cd2b2a1e7afd76dcee33cb92f1fa7194b593febbd34ae4e,2025-06-09T12:15:47.880000 CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000 -CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000 +CVE-2025-30280,0,1,9e649a9f23b93eda27c1f50fd0b3e90f4f0b81671b304e63c7efcfa3cfc7c59d,2025-06-10T16:15:37.550000 CVE-2025-30281,0,0,1559be2cc3af28eafdfdda2201e058111279b1728b928b15c90560429d8cd6de,2025-05-28T17:06:16.963000 CVE-2025-30282,0,0,b482189716a5f155cff967a6285e9586d359fd995d9f0381362b5ad6a67e05b8,2025-04-23T16:45:08.487000 CVE-2025-30284,0,0,162db13ccae5f50e496d74519ee047a9e12c27af2ae44b041119fe67a728a1cc,2025-04-21T18:38:24.560000 @@ -290714,10 +290739,12 @@ CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2 CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000 CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000 CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000 +CVE-2025-30317,1,1,e0fa7dd8de663abafc0f09fb14bd8536a3a22567355f6f21d8fe4fc324f102b8,2025-06-10T17:21:19.150000 CVE-2025-30318,0,0,e9585c50b60ffa8b64da830b96992e12585dd9971124ba2c8ec2d12aa9784ca0,2025-05-14T14:28:36.363000 CVE-2025-30319,0,0,eb12dac8472fdfe9992ec3368e7c4232ecf79a9fba5a19c43d0577fbd40d843d,2025-05-14T14:28:51.907000 CVE-2025-3032,0,0,f8b4ab2f73ff457fe82cca4d434a54ce5e1088aad2e6e70e30f2847b41780fdf,2025-04-07T13:31:04.710000 CVE-2025-30320,0,0,5faa500599293b831a4781f7de4dfeab3c23d52e0e4bd715e06e02481844c75b,2025-05-14T14:28:59.920000 +CVE-2025-30321,1,1,6cb627eb2ef733fd1bf016422086bd4503d4b97ce4b986baa92309f8784d1816,2025-06-10T17:21:21.627000 CVE-2025-30322,0,0,fffb143d86fda45cfaab46b7f00cb9ce6863b83ec5cc74e528f6ecd921540634,2025-05-19T17:10:08.910000 CVE-2025-30324,0,0,cc814187ea587e10cc609b1aa2e1d499f6d169893aea075eef7cd426f0fb5529,2025-05-22T18:34:10.280000 CVE-2025-30325,0,0,28ff58c7866f3c5b8b7c6c71294d9237d94bc56e945e412c9e15b3bb0632bfd8,2025-05-22T18:33:36.103000 @@ -291413,6 +291440,7 @@ CVE-2025-31099,0,0,d59b3dcd5b166c2f5332f3dbfab7e0f340d869a303bd97e0a15d998a19cc8 CVE-2025-31101,0,0,b0aa42e293ed8c0fa3de844d31c2f23b1ac4edce5e04ed55a821c3d034201c34,2025-03-28T18:11:40.180000 CVE-2025-31102,0,0,1bffcfe145f0b4c20ae0eaf0c1dfb6f986c908f84db6c88ce8a6162685f2af9a,2025-03-28T18:11:40.180000 CVE-2025-31103,0,0,7ad1bb8b035b64852d0740da256f38b8c12d0cb36f87f27770af9b070474c9b6,2025-05-13T15:15:19.237000 +CVE-2025-31104,1,1,77922eeb805aeafeac08d9aeec6be2fc374b3d03ea6a0f326c073ad68910e5cf,2025-06-10T17:21:22.873000 CVE-2025-31105,0,0,3ea420eb0f78514b1d8574d41cb07f9b0316bbcde24f1aa0f802339e7a9adf19,2025-03-27T04:15:27.447000 CVE-2025-31106,0,0,9cd943c74a3d3aeb9d7fce7b86609160c2b3b46f9adb8d4161fa966b85a9a529,2025-03-27T04:15:28.007000 CVE-2025-31107,0,0,8505daa1494574bd4bf6fc3a5ca5fa621c0917e37c7c10d9dd14774eec62a678,2025-03-27T04:15:28.073000 @@ -291443,9 +291471,9 @@ CVE-2025-3113,0,0,93a1533aa28bc362b53faa22de520bb342720cec250f2cfe8585a964488e97 CVE-2025-31130,0,0,acf3990daefd59c21fd5a299f504c7568622322ae9d561fcc713ae7aa1c998a6,2025-04-07T14:18:15.560000 CVE-2025-31131,0,0,5938448e342afcc37e78bd20633f96d125d20b3c4d2f3baca4ca3198c733c0ea,2025-05-09T14:04:06.663000 CVE-2025-31132,0,0,529f4cea3faea434883eda729fc063219493e8e091a7f2f10b391b34138f5f80,2025-04-01T20:26:11.547000 -CVE-2025-31134,0,1,2773f031652fd95c6b39926f090583c463eb26839cd44ae6b696340c166207b4,2025-06-10T15:08:24.457000 +CVE-2025-31134,0,0,2773f031652fd95c6b39926f090583c463eb26839cd44ae6b696340c166207b4,2025-06-10T15:08:24.457000 CVE-2025-31135,0,0,207e0c0576bd29325f457097be93c7a44eb5e24c5f685d26d2830ea953a650cb,2025-04-02T14:58:07.527000 -CVE-2025-31136,0,1,e56123afe28cd38ca229df762d303518a4c89d3b460426dc3d13029c75ba90b2,2025-06-10T15:08:13.370000 +CVE-2025-31136,0,0,e56123afe28cd38ca229df762d303518a4c89d3b460426dc3d13029c75ba90b2,2025-06-10T15:08:13.370000 CVE-2025-31137,0,0,68ee066855a1ed540acafdd46a9114f6082667580fb68d589f14ffae7073796c,2025-04-01T20:26:01.990000 CVE-2025-31138,0,0,082239a994f84f895f28ca91baa1d97931f8adb4927719990c0f96236ec2630c,2025-04-08T18:14:17.307000 CVE-2025-31139,0,0,4e1f766285d49f2c4e08f1555fb377b28da0878f00cfc1002dd12ef36cc0a8e6,2025-05-16T14:51:10.163000 @@ -291910,9 +291938,9 @@ CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bb CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000 CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000 CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000 -CVE-2025-31710,0,1,66b943a0cc10a097358c13445d1f5df7386c2942496f3871e72b75f2365fb784,2025-06-10T15:15:23.847000 -CVE-2025-31711,0,1,a1e429f12e9dd794426c9c92b102152b28ef2a4735f38b55311c0d017b7aca8b,2025-06-10T15:15:41.490000 -CVE-2025-31712,0,1,1d5d25aedcee6f3c481a11263afb79b35492febcf0420e960a67b0b1b19781b3,2025-06-10T15:15:48.273000 +CVE-2025-31710,0,0,66b943a0cc10a097358c13445d1f5df7386c2942496f3871e72b75f2365fb784,2025-06-10T15:15:23.847000 +CVE-2025-31711,0,0,a1e429f12e9dd794426c9c92b102152b28ef2a4735f38b55311c0d017b7aca8b,2025-06-10T15:15:41.490000 +CVE-2025-31712,0,0,1d5d25aedcee6f3c481a11263afb79b35492febcf0420e960a67b0b1b19781b3,2025-06-10T15:15:48.273000 CVE-2025-3172,0,0,7ef3d20b4569576ecc044e7634dd1d1d020ed6e5c64b90d6184f578b093246a4,2025-05-15T20:07:38.310000 CVE-2025-31720,0,0,ce62208919cdfa9fb252b714bb7365bb606e8689ef37f84aded5e8ad22c74887,2025-04-29T14:03:21.570000 CVE-2025-31721,0,0,91995a06eddb99842482cec92b823782bf8b0af6c3c204a05bb9543bd15215b4,2025-04-29T13:56:43.860000 @@ -292504,7 +292532,7 @@ CVE-2025-32442,0,0,3d727ddd988064a7ed8b991fa369d7c4d417f02766d256143d6103e1f7743 CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c84d7,2025-05-28T19:12:58.377000 CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000 CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000 -CVE-2025-32454,0,0,d112044e8ac2aa2106f1b31f5429f300a7ae216ee8a2c99529918a4b88fc6446,2025-05-13T19:35:18.080000 +CVE-2025-32454,0,1,41838fdd1c8f766a82835a1a1d3416cf916624d2755bf1651debb3d5ab7f897e,2025-06-10T16:15:37.833000 CVE-2025-32455,0,0,398807ad48b0b9265702eecdf4b7c5761bdd481fd1271c3ed3d88cf251c3e4be,2025-06-09T19:15:24.180000 CVE-2025-32456,0,0,dd16b0d6d8c5a61eeb1bbe06986290ad3a0e9314b9b9bb46891f735ce8cc6b43,2025-06-09T19:15:24.287000 CVE-2025-32457,0,0,6745c5ca44c60c9b81e4cb733e06a79088ae5467c658031286f55bd97131d35a,2025-06-09T19:15:24.393000 @@ -292764,7 +292792,20 @@ CVE-2025-32705,0,0,5d7410f59576eaefa3b54adf470ca7ad636ba053584364cdcbab166793c61 CVE-2025-32706,0,0,db50af2cfe521d05a7c486c059aaaae863796e45bb101d6939f7e4980087273c,2025-05-16T16:25:33.433000 CVE-2025-32707,0,0,0470f05f4fed72a6e68669a459995637394b48e5dcea8b21ff00bd0a5a2faa24,2025-05-19T18:25:06.003000 CVE-2025-32709,0,0,cca61055dac0e837033032ad28a6f880a090dfc86e492b563e0bcb7f31d81d17,2025-05-16T16:29:34.783000 +CVE-2025-32710,1,1,8aa4d60921f6dde1a890bc70c8e33d99b94c5d41ddcdcf72b3be6ab66adba5da,2025-06-10T17:21:45.853000 +CVE-2025-32712,1,1,c5735fcc1bb8d2d8b8ff88cf2cf7bc8cd02910bed85fb27b9d8fa93cc565de62,2025-06-10T17:21:47.883000 +CVE-2025-32713,1,1,1f55ff03a98c6f4a137fcd8cd370b450b5268acfb42631808df84938f4956e57,2025-06-10T17:21:49.897000 +CVE-2025-32714,1,1,a92f17a0e588c2a134397f8038fc20f2e3a2d4fa89569159b3cacc267d8a2399,2025-06-10T17:21:51.843000 +CVE-2025-32715,1,1,b76426f16cc9d7408f36748871976f950c295580b047b5dae8a4ef64c7bfd65f,2025-06-10T17:21:53.943000 +CVE-2025-32716,1,1,95c6a44b72e5c0078fe2b00548dc6905f2e28ff189f88cc144198adc563ee456,2025-06-10T17:21:56.087000 +CVE-2025-32718,1,1,11fd0eff0d3aba6a9d19b0e4745c23d52296caf12dfee9ad3b6ea3a205dc0f25,2025-06-10T17:21:58.097000 +CVE-2025-32719,1,1,2a8728d5df65c875966086b2c4697adeab84e47d67c617642fc2cdcb1b65270c,2025-06-10T17:22:00.110000 CVE-2025-3272,0,0,c60fd5482e862c50b349cbd37632283d483289fdec77619757f54ad2125c58ec,2025-05-08T14:39:09.683000 +CVE-2025-32720,1,1,b970fcf4d84921b0f2c50abda609b3e4239f2f60173f2b0bdfc372059bfc7c55,2025-06-10T17:22:02.053000 +CVE-2025-32721,1,1,6121ef5e59a827532490111c158392f6d6f9d5e27d3c64f2b7f787ec59f9a35d,2025-06-10T17:22:04.147000 +CVE-2025-32722,1,1,a9c7ca503ed9576c25d9efc7c86d9f4294ac18544073b50205b2a2d8b8289f10,2025-06-10T17:22:06.363000 +CVE-2025-32724,1,1,4f8efc6dd2503d4f0d4f3e7637c34c5f8b3dfe5720ca614dd26bac631b17307e,2025-06-10T17:22:08.343000 +CVE-2025-32725,1,1,3be2b3be7241dc1799c1e48606aab79eee2fb6665df2875bb4e81347c441fbc1,2025-06-10T17:22:10.373000 CVE-2025-32726,0,0,91136782c0c58a96138194cd454d47b71b0e86e3f0a06431e8d3ca26e00cb323,2025-04-15T18:39:43.697000 CVE-2025-32728,0,0,5aee560e966fe76dd9048a3df7563795abff4e2cd132941a1a731b81d94d6a0e,2025-05-22T16:51:54.890000 CVE-2025-32730,0,0,44cce1a9327b117b4904f0c237377c22ba67547a2108fe2d846b0c147958e156,2025-04-29T13:52:47.470000 @@ -292997,10 +293038,32 @@ CVE-2025-33035,0,0,9736697c5ea724fe588629b52625befad92e2383d2bd542658378a457321a CVE-2025-3304,0,0,cd001e23659b91ac09e62e7f84c563c50c19190543e934899e672b5c50fb7073,2025-05-28T21:10:23.573000 CVE-2025-33043,0,0,044f6c7834f7eed1d82fb6b8377e155f5c1ae51cb36f952b6bba03be184e28e8,2025-05-29T14:29:50.247000 CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000 +CVE-2025-33050,1,1,05e6d757b225696d2814d59d4f1c971c8d0e7d5b6ad7a1f98f3325b5ab9caf61,2025-06-10T17:22:12.643000 +CVE-2025-33052,1,1,b1993549d564c5c9981bc4b05cb64d0a2d456f60ff295f87620c17f2cd44433b,2025-06-10T17:22:16.713000 +CVE-2025-33053,1,1,ed0670e7dd9b8e605d5c510957b98bd754ffcfe8f96478464def275502bf0ae4,2025-06-10T17:22:18.853000 +CVE-2025-33055,1,1,13d9e39692b08b1b320db5a5ecccbe43815806407f2b3cc535308d642cb2e613,2025-06-10T17:22:21.100000 +CVE-2025-33056,1,1,c67dfbe06f555af10b25758d9a6160cb2f910935ced8e27cd9da40fc740b6166,2025-06-10T17:22:23.163000 +CVE-2025-33057,1,1,205438b56590147889b44322c2f014a7f7d594c5c377234a2f1d03b95a58afc8,2025-06-10T17:22:25.360000 +CVE-2025-33058,1,1,7bdfb57a48719890551cc8fe85a4a96be3892188dfdacfca9439dc8f4da5f0d1,2025-06-10T17:22:27.967000 +CVE-2025-33059,1,1,bc21038c5782e6d6e04d8081357356c5471155644ba833563262b66e727d73ab,2025-06-10T17:22:30.727000 CVE-2025-3306,0,0,116c94def1d4a2e814002f4948b93b65daa72c17537f71098e725bdf140a908b,2025-04-08T14:54:03.220000 +CVE-2025-33060,1,1,c24e0e7e4dc41b71cb7ae7a066541f8ea796bc3d07dad19cda48118faf084337,2025-06-10T17:22:33.300000 +CVE-2025-33061,1,1,efde2e5239910ccf1ee557cfba0ea132f14c10ca77baeb4611eb7bc6b26edafe,2025-06-10T17:22:35.353000 +CVE-2025-33062,1,1,bbb0600eb7461e2ee744fb5f94e430ed4c81e3a6484233c0133f49c30f7138ba,2025-06-10T17:22:37.330000 +CVE-2025-33063,1,1,bfcb165803e7b2ee00bfbd9fbd402858516f7fea723a4364329d57e87f69f361,2025-06-10T17:22:39.490000 +CVE-2025-33064,1,1,3f1c62d551d79d922c53196547fb6955ee45a24d21573a221b2f2787a89ba2c3,2025-06-10T17:22:43.050000 +CVE-2025-33065,1,1,cae32c264eba5e220b66a98114982f05a920727054a3e920cbd0df038c5503b9,2025-06-10T17:22:45.323000 +CVE-2025-33066,1,1,1d7e5fc53618012466a5645a883da0b84746990dd851784785b99377d1eeea82,2025-06-10T17:22:47.313000 +CVE-2025-33067,1,1,8262c121855884cd5a97c5bcdf8bb3590890433229729a3de09f42b0ad0f1cf3,2025-06-10T17:22:49.647000 +CVE-2025-33068,1,1,fdd48b6581c25bef0a58b747fa8ece78dc695b4066daf290d73f6897a20729b1,2025-06-10T17:22:51.657000 +CVE-2025-33069,1,1,2f8b58585d03b5cf443491677aa6c4981ff64505ced489e16909b3d25fb17260,2025-06-10T17:22:53.657000 CVE-2025-3307,0,0,764533eb55c36b857743124d26869569dc2e30546eb2b26c9f7f85b2c9a577e7,2025-04-08T14:59:43.193000 +CVE-2025-33070,1,1,69d5d5a736fe5832f23fd1d565203f4d100a9d6448d12e1efc3ce017ae0548c7,2025-06-10T17:22:55.743000 +CVE-2025-33071,1,1,9b6760649583492a98d2167f5e4cd12657c1dc8a8c1830886c4e973a946f7cff,2025-06-10T17:22:59.847000 CVE-2025-33072,0,0,da8dbb3f32bc92a4fea66cbf1913465f4b8680e98b695ceda185e1985ccda963,2025-05-21T14:52:32.977000 +CVE-2025-33073,1,1,4c993488be26b35e618871d5b68d23bb12823758e2f4299ecb6cd068c84fa7cc,2025-06-10T17:23:02.967000 CVE-2025-33074,0,0,18fcd41dcb3c6273c73253eac7fa48f9c3a067330384af16f609b96399dd2bb1,2025-05-12T19:42:26.413000 +CVE-2025-33075,1,1,bdb2c8d22f8de1cc8a52e7039a9029120ba31f0eeec6a5f3aa3f2feed2e88a58,2025-06-10T17:23:08.797000 CVE-2025-33079,0,0,1e4651240e39e7fec62de5fbc9b5c0572a8e849a3e4ceef1cd2352f3faf983e0,2025-06-09T18:49:31.260000 CVE-2025-3308,0,0,4b8d71911211f133728a91e073b25c990ecfbff65585df599965a7e80c999bcc,2025-04-08T17:38:09.607000 CVE-2025-3309,0,0,7325978445055221f9794565a82ef91ec3f38daa8638a7cf620dd6aa80f6a64b,2025-05-28T17:31:33.590000 @@ -293009,6 +293072,7 @@ CVE-2025-3310,0,0,8c16e75b092c62b9454b4e82634dd199a69b62be650163acbcd0e90e1720c9 CVE-2025-33103,0,0,a67c9195cdbad04f4496fc31d29a6e2936a1a9b1b8ef9f8a2aafc31c92782dbd,2025-06-04T20:12:06.793000 CVE-2025-33104,0,0,ce493789d7031f1aa7fdbd052662901a982b8a28c0736ec1b9c5ee4d95c43743,2025-05-16T14:43:56.797000 CVE-2025-3311,0,0,e74d5ecfc9cc851d8a2375e0e95746ca34d32a4ae1bff25c4184cdeb743a156f,2025-05-28T21:08:38.403000 +CVE-2025-33112,1,1,1df63a9179edd25c5f1d9a38c5a1afe84ceb1b7c6923d6f6a9d2d12f9148edeb,2025-06-10T17:23:11.607000 CVE-2025-3312,0,0,d314cd0e3d98597c32289b5f3f4209f174e16c52e8e6ba2862a75de1162b07d0,2025-05-07T16:45:29.103000 CVE-2025-3313,0,0,8c3e746212b0f7e34691b425d570770595ed2ddcf9c85476d8c05485bbf5b80a,2025-05-07T16:45:47.623000 CVE-2025-33136,0,0,27a78f34bfe266c2ec4d98dca65066403e26999ef14696ceea2068909ce50e9f,2025-05-30T01:19:40.167000 @@ -293257,8 +293321,8 @@ CVE-2025-3577,0,0,dfdef997e669866588ab8eb7c1ca73b6cf2cbe16fcb69f43d2b34abd27af80 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 CVE-2025-3580,0,0,fb5209c3cd7ebcd66c15bce657f3ddb23cbe27d0c5d33814deb9407bd651e1de,2025-05-23T15:54:42.643000 -CVE-2025-3581,0,0,e6a3e24e073e14719dfd448d1d5bc70a636400588bdbf078fa20cd30f4551bb8,2025-06-09T12:15:47.880000 -CVE-2025-3582,0,0,ca2c027d4e107e2dc4fa011f85cfd68a611484fa635b02d0e2f009d2486b5a42,2025-06-09T12:15:47.880000 +CVE-2025-3581,0,1,585159bafa303a244228e683b56b75ea8b63dca4d97bbffa7c9a8d73dcdb9b65,2025-06-10T16:15:38.080000 +CVE-2025-3582,0,1,8593945dee1ca3f993f25ee72604804564fd51bc00a528de5cde7823a7e87ee2,2025-06-10T16:15:38.227000 CVE-2025-3583,0,0,5e828bc2ad696ee8fcb9f09a10e41d54b38effce4c0c5b61566233d5e9eb1a29,2025-05-07T16:36:47.020000 CVE-2025-3584,0,0,59ca71c3ddec8b989ca250d68253dd4ed4793bd2db21f016ec9f563d6fba7dc2,2025-06-05T14:10:30.393000 CVE-2025-3585,0,0,793d014b8d4f8a0338ac5bc0543e903589c1e8b4dc1d9fc37efe0dfb6e2b3b88,2025-05-21T20:01:00.620000 @@ -293381,7 +293445,7 @@ CVE-2025-37094,0,0,80139cc2d7d5befc05f51667ec682f5c962f80ed8c480fa2b154914d7c800 CVE-2025-37095,0,0,548306b50795731dc5b60cc61287457cda97af8c1838c1288092ea043e39871d,2025-06-02T17:32:17.397000 CVE-2025-37096,0,0,78aa33aa6c14b79fab9fdbbfe82eac38fd3ab2a2406b66867916373e1f7d70de,2025-06-02T17:32:17.397000 CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000 -CVE-2025-37100,1,1,4d4f1fbe648eb6f78480eef9aabca21816bafbae1c975c76fb5ee1f1e465f6a7,2025-06-10T15:15:24.233000 +CVE-2025-37100,0,1,35cb7c371b89851a59cc00e751d1fc4742ab6c678c930a6214763ce161a386ef,2025-06-10T16:15:37.957000 CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000 CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000 CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000 @@ -294195,6 +294259,9 @@ CVE-2025-4055,0,0,5d03678cd5a58fca961579b579c2238433d853ac06b5f04bd8857645678056 CVE-2025-40555,0,0,d95274f7d38c5a001206bf080b14fcbae9aefea5fb98e3f749da8cb477ba352f,2025-05-13T19:35:18.080000 CVE-2025-40556,0,0,38668142c7acab4fad6491064732c2e2f89a1347fbcf577f43459944cd3007b1,2025-05-13T19:35:18.080000 CVE-2025-40566,0,0,374015d824afe870b8fabe15314483ad646829153a9af23c1199bbbf252f7c56,2025-05-13T19:35:18.080000 +CVE-2025-40567,1,1,107df38cdf852e91a3402cc586d1c238162b423ae89a602f658cb9d2b71e121a,2025-06-10T16:15:38.357000 +CVE-2025-40568,1,1,ec952d088062f0b7edb93b68063bee570779656998453c5459230442bbbbabf5,2025-06-10T16:15:38.537000 +CVE-2025-40569,1,1,9a39e91a349f694d56f5058650a930a0bd9df0766937828f451669cd271025bd,2025-06-10T16:15:38.727000 CVE-2025-4057,0,0,9c6590fa9bf494a0600a26ad246e54596c8c82001b91ef44ca85f7febf25408b,2025-05-28T15:01:30.720000 CVE-2025-40571,0,0,478dd882b8d03525213488925d016f6c922079880a3f93496f16c3354bab243c,2025-05-22T14:16:04.150000 CVE-2025-40572,0,0,0257e64a395df62fc80927bb901380e2ac5b5bf3a6620de4ddb93ce29ccc6d89,2025-06-04T16:33:04.377000 @@ -294210,7 +294277,9 @@ CVE-2025-40580,0,0,3374a0f16af4727c5151eab506ec9fc3de863dd4eed8b2805030dfef17bbe CVE-2025-40581,0,0,06bc68cbcde637c7b9d09e2f3e2a4ba4663b0e49ef9f77fe37fea58c7a655ae2,2025-06-04T16:33:41.450000 CVE-2025-40582,0,0,7bfc694f37bee448665aa6012b244216ab1ddad4829d57c68f42e07d6cf45971,2025-05-30T17:07:00.713000 CVE-2025-40583,0,0,4b49bcba4fd5129cf3344c13b358ddecba3246768b81ffa138ced46c610d3959,2025-05-30T17:06:58.513000 +CVE-2025-40585,1,1,fb22b27ff37ddeb1fd21f2d60793d6816e82c6a7b9e1966d4972ae15e67f3025,2025-06-10T16:15:38.943000 CVE-2025-4059,0,0,aaceabed3f9504437b5acc8d70c6023c40c2f0a56aba5d8e6d1c9f7eecdc635a,2025-05-15T20:45:28.467000 +CVE-2025-40591,1,1,24aa6d5647eba9bd24381abeb9e55698e85fc63d870c02dd33f64227577b51dc,2025-06-10T16:15:39.123000 CVE-2025-40595,0,0,e8883618ba87c7020b44e8c6f164b0155ef7e7a3cf9c54a337a593438f28d611,2025-05-16T14:43:56.797000 CVE-2025-4060,0,0,170985bf8f2f8cc428b363944749e5a7390ec03c3ff9ebf1391dace27bffb441,2025-05-09T19:34:16.987000 CVE-2025-4061,0,0,38d10b753ff5d559244af6fd3081a54533e11210e5e1217338182a3bb0bb72be,2025-05-09T19:34:08.123000 @@ -294619,6 +294688,7 @@ CVE-2025-43554,0,0,72f8a55aa3016b7b98602aea28c96ba8387be55ce503a81731ea16020f85c CVE-2025-43555,0,0,19d4da2bfc545b26b865091f8de87f344da2925ac800cb983df6cbdd3dd38236,2025-05-15T18:39:08.297000 CVE-2025-43556,0,0,eca516d80145b82d74e737be6b84aa271756b3ab57b5bfd3b44c5b6cb06029d1,2025-05-15T18:39:00.157000 CVE-2025-43557,0,0,46ce49a54afa407d288372144d1569006db3ee5a386d9b87264495da2521727d,2025-05-15T18:38:50.533000 +CVE-2025-43558,1,1,88b52769a444f168065df156dc70b510ddc106bbd5ce3425fbc58e9edc1353be,2025-06-10T17:23:14.190000 CVE-2025-43559,0,0,5ba3945b07996edeb9a056650b7e4cc9fac22eca84981fc7a2c7dcc1b7da159c,2025-05-19T20:31:34.550000 CVE-2025-4356,0,0,1808eaf22cb046635d44f9db8c325a9360bb6eb68204b8a94aa8ea43d160384c,2025-05-13T20:24:15.620000 CVE-2025-43560,0,0,f024c3768806730423456b31d211372c754d424eed90de6b61cf7127fc2f200a,2025-05-19T20:35:23.227000 @@ -294636,7 +294706,12 @@ CVE-2025-43570,0,0,0c8efc2d054886dd381bb66546f1a26190dc1ece1eec1ae7fb83991db60a5 CVE-2025-43571,0,0,c2bcae4b1f89ddf1d102789dbe6cd3adc50327d32e5f767a09d399069834bc12,2025-05-19T17:05:42.667000 CVE-2025-43572,0,0,327243895386af4b0dde8e2106b9c865928e6a67412132d0e25900a6625c554a,2025-05-19T17:01:49.553000 CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000 +CVE-2025-43585,1,1,caa518760101b341ab21699370bf0eda5d861b6f94c3119459b3b4ecb4840643,2025-06-10T16:15:40.043000 +CVE-2025-43586,1,1,05f19df9fc1fdd75efcef39eb188dc38e4eef1a912e0175ae70548c27249dfd2,2025-06-10T16:15:40.207000 +CVE-2025-43589,1,1,72063c8a100f13e2e3e376ad606581414549652bb619fa0619cf800b44820c2a,2025-06-10T17:23:15.613000 CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000 +CVE-2025-43590,1,1,9675455a93c53ed32d3e8a499db98fa6c9e81f476825d66f910718fb6561d071,2025-06-10T17:23:16.903000 +CVE-2025-43593,1,1,d9303cbbd5cf12a3fc914aa15c201c2b43e2f474878d410f9e293e071f7c0ea9,2025-06-10T17:23:18.123000 CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000 CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000 CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000 @@ -294648,9 +294723,9 @@ CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c1 CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000 CVE-2025-43697,0,0,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000 CVE-2025-43698,0,0,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000 -CVE-2025-43699,0,0,1d39cab8eb945db8a47c3cddf7010f12f0acd959ee68a355398abdd3563ec5f6,2025-06-10T12:15:24.357000 -CVE-2025-43700,0,0,c2cc58f0e604eee544996cc7d907ffb95b0541f1f14e0033ad5f656f887ab519,2025-06-10T12:15:24.483000 -CVE-2025-43701,0,0,fe2e34423b7eb971d6d18dd04633ff9c2283f50df1b163605e07e8bc0d13083a,2025-06-10T12:15:24.607000 +CVE-2025-43699,0,1,a2d22ee4b8d68eb026c86782bf500857da584950b48fd4e2d9625d502c59ab55,2025-06-10T16:15:40.353000 +CVE-2025-43700,0,1,f91ad89a18eacfda649ab209d4f29d9dde450c39d5a449eccc3a29c15f6e5dbd,2025-06-10T16:15:40.513000 +CVE-2025-43701,0,1,75a984ac714c135ecbf90c66a4c841f2f5525dff3c0315e5d515084f3c5ab270,2025-06-10T16:15:40.667000 CVE-2025-43703,0,0,d6625a868be77b8d7893d215165a3a98f3361eec5aed450c8d69ce3a9dfaf391,2025-04-17T20:21:48.243000 CVE-2025-43704,0,0,e4a4f68c1c515be2555ad90b5dc0fde58f5ff1d76445660f48da718ee733becf,2025-04-17T20:21:48.243000 CVE-2025-43708,0,0,d38c003beeae09584e47fb48659652128bc4a5d2c5ae13da147de319358e0588,2025-04-17T20:21:48.243000 @@ -294757,6 +294832,8 @@ CVE-2025-44024,0,0,9a6e90ca8c9fd22a614240a93227346aae4f630541c9ceee0dede71783be3 CVE-2025-4403,0,0,a597524215bcc55cf95efb619760b46f4cfae80b1fccf565ab77d2156ec46259,2025-05-12T17:32:32.760000 CVE-2025-44039,0,0,e526d2ea964b8df9e1d271dd8836298e821a1312ecb07527aee6d82ed8db4da5,2025-05-13T19:35:18.080000 CVE-2025-44040,0,0,077e2736578228f8d9129a0307a7ea1d76372d9810860dfb02a889576bfb682e,2025-05-23T15:55:02.040000 +CVE-2025-44043,1,1,3036defbb851adc12433efe80e5fc6191550dd660e310fbc4032bb52cddd3b0f,2025-06-10T16:15:40.823000 +CVE-2025-44044,1,1,6ddbbce33caea2d35f44f12ad3bd3e98b080decb5230a99e5cf8affdbe7764e7,2025-06-10T16:15:40.940000 CVE-2025-4405,0,0,a4c8d39da5071a2f65ae4b241bc012dd3778a87eb537de1f84f3ff1327d39e13,2025-05-23T15:55:02.040000 CVE-2025-44071,0,0,2772db9d2d7dc3a2f1886d3495d15be2a65239054354b12c18090ea5927d54cb,2025-05-13T20:03:39.143000 CVE-2025-44072,0,0,66cb314272334a06d99ce1609f65344916890c52ec9c458ff627cd7071565ba0,2025-05-13T20:05:16.493000 @@ -295102,17 +295179,17 @@ CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 CVE-2025-46154,0,0,28136877062a9fbae66fc92d86286e5d62e1cd8a9e62fd05c5a06eb514bf383d,2025-06-09T18:06:28.423000 -CVE-2025-46173,0,1,4405d31e0bbca77b9a85dba04df7d6cbed12d0763cfb8e942421606ded04a3cf,2025-06-10T15:12:53.720000 +CVE-2025-46173,0,0,4405d31e0bbca77b9a85dba04df7d6cbed12d0763cfb8e942421606ded04a3cf,2025-06-10T15:12:53.720000 CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000 -CVE-2025-46178,0,0,03490af67e720d043aaded16e8fab183fbdcb1738f48f0dfd5e5618fade2183c,2025-06-09T16:15:40.800000 +CVE-2025-46178,0,1,ae28962042393adceb21913d0264542fc7d27a3e8ff1a1e58275523a9d0646b0,2025-06-10T16:15:41.050000 CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000 CVE-2025-46189,0,0,deb091a7b16f83dfae0adf87dba814de45a16152802aa3583ba953e5461c909b,2025-05-22T19:01:31.820000 CVE-2025-46190,0,0,49ae57538389712e46bb1f8218d4d6fdb9fc8500296b0c348e5059e767ffc2b0,2025-05-22T18:51:35.560000 CVE-2025-46191,0,0,fbc9ea533655e0e26f4f4c6da17e48ffe3ff5c2de6b7f56de9323673ae72787b,2025-05-22T18:52:07.867000 CVE-2025-46192,0,0,1a30aaeba5d079cb7681705ff9da1042bb0e2a199d3814812fc4bc48ab6a2a7b,2025-05-22T18:47:48.530000 CVE-2025-46193,0,0,b5728a298f7e860e076276348cca2409ba95c6dfd5dcdd661df2cd3fcae8c09b,2025-05-22T18:49:22.817000 -CVE-2025-46203,0,1,be953e8984307aae070f8f20f44040a65022d6e23c76a670663628bd657edc09,2025-06-10T15:07:28.800000 -CVE-2025-46204,0,1,75ae4b5b42744427789fa14d0febcfcba5e97dc93c09cc82148b678635dca115,2025-06-10T15:07:19.043000 +CVE-2025-46203,0,0,be953e8984307aae070f8f20f44040a65022d6e23c76a670663628bd657edc09,2025-06-10T15:07:28.800000 +CVE-2025-46204,0,0,75ae4b5b42744427789fa14d0febcfcba5e97dc93c09cc82148b678635dca115,2025-06-10T15:07:19.043000 CVE-2025-46216,0,0,aeeb168de31af46b00554fe4e8c894f6f952bf91677cd58baacfa2edfa3da131,2025-04-23T03:15:22.333000 CVE-2025-46217,0,0,c0708bfcbcfb8b1f8589ac8ee7b6149158182bec9e1515e0d8ddabb4f9f96f81,2025-04-23T03:15:22.403000 CVE-2025-46218,0,0,b4d34877020ce88bfe5e738c92a5cdebc137bb9b383057afd40e6895a6e2e87c,2025-04-23T03:15:22.457000 @@ -295323,6 +295400,7 @@ CVE-2025-46526,0,0,daebdc3d70a8ded18136be79fd21da74ccf5635e26250c3a1e71ba589f9c4 CVE-2025-46527,0,0,8816489ee4d34029a8d81b2714686d8cbd04633724a27654d2c3649f5d2d6749,2025-05-23T15:54:42.643000 CVE-2025-46528,0,0,5448d12f670a5d279d2e3773cc261f8a08e5e91c241d007b505395f3cbc6a95f,2025-04-29T13:52:28.490000 CVE-2025-46529,0,0,4858e8d23a5f17e2c90006932f23b5a7f2db8949d70e351bddc8b77c2660959f,2025-04-29T13:52:28.490000 +CVE-2025-4653,1,1,0f64544c4353ee1502c025b08b26d415cce18701a5121fbce620870f44b16436,2025-06-10T16:15:42.607000 CVE-2025-46530,0,0,5400b2396ae524694540d86d6415fed225acf4442b05412b7417f68cb52d431d,2025-04-29T13:52:28.490000 CVE-2025-46531,0,0,64293c4e6f15a65b592b5f53bb6b9bffbc7b79c93a4afee8bdeb095da3c336da,2025-04-29T13:52:28.490000 CVE-2025-46532,0,0,6af40ebc229203ce3e5255116ba2f3c1767141e2c93450bad550846a3b6377a5,2025-04-29T13:52:28.490000 @@ -295385,7 +295463,7 @@ CVE-2025-46599,0,0,f3c297c657fcc4808e413ffc4a851e0a3ee55a1d48f62ec84808ef43a1b8a CVE-2025-4660,0,0,47aa6906241bb2d769039ddcd2c20f6e64e1d61cff1d884ad57154ef56ead789,2025-05-15T18:38:32.803000 CVE-2025-46610,0,0,4ef5ea3231fa4eac2642fd333881441a47f939bd8303cb3286530fbf8cc47c86,2025-05-12T22:15:26.660000 CVE-2025-46611,0,0,516776552286ca0c3defcd46a503a129bce789d2f1a0d800a6114852772e8ebc,2025-05-12T22:15:26.807000 -CVE-2025-46612,1,1,19525c59ac4bfdcb4c0fda4baacbc1f01bec80a796b41fe90399a8585672cb80,2025-06-10T15:15:25.027000 +CVE-2025-46612,0,0,19525c59ac4bfdcb4c0fda4baacbc1f01bec80a796b41fe90399a8585672cb80,2025-06-10T15:15:25.027000 CVE-2025-46613,0,0,4e69b4cc881e4a38a0c593bcf55a3a9f4be82e9fe1b8d7c10c86959cefa4a4c1,2025-04-29T13:52:28.490000 CVE-2025-46614,0,0,a1f2104588668560a01f61ff5e7e61263dcf0af77c6af3863b6b7e1062879e18,2025-04-29T13:52:10.697000 CVE-2025-46616,0,0,a3467bedc13913153241aada047204661f44b5d0ba1c446ec0cc09c7d5e149d6,2025-04-29T13:52:28.490000 @@ -295476,6 +295554,7 @@ CVE-2025-46762,0,0,b5212fa70ab6b97b0e919d84579fe79d985a5fe2c78f1a7b704ec60e1655f CVE-2025-46777,0,0,4c99b3c2cd506dc2615e6e8e33c5b9f4290116b197ae8af42d9b1d5b366de9dd,2025-06-04T15:37:37.577000 CVE-2025-46778,0,0,84fdcd667ddc60ff72e9bc53bf816d5ed8cbe6a8eb95254e6bac35e23e4c18a7,2025-04-30T03:15:19.170000 CVE-2025-46779,0,0,37c24e5b7e4a0045a4d100f0b48f14bc24b2b68a67fe538c22d10ef701f0dd5f,2025-04-30T03:15:19.250000 +CVE-2025-4678,1,1,12c86f3741d21e5852641bf126d33c26a85829d8bf9ce81bbfa7274dc93aff5c,2025-06-10T16:15:42.800000 CVE-2025-46780,0,0,5993d506455854cf118c6763aa0e87cfcb5c499499a4d09b9c1fb1cc0884d3f3,2025-04-30T03:15:19.307000 CVE-2025-46781,0,0,e7fe47a74e2ae94a42cb82d6842951a5dd9286ffd4d5d353415d63928d0e29b9,2025-04-30T03:15:19.367000 CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d46e,2025-04-30T03:15:19.430000 @@ -295528,7 +295607,12 @@ CVE-2025-4707,0,0,0c3566823c749ae08f2d7c15092e25f1178548119d9ff3e09e85b02218abe4 CVE-2025-4708,0,0,372aeaa38af4299e3c176a6f4836099c17e14900d5950df7b63983012e671715,2025-05-28T14:25:42.440000 CVE-2025-4709,0,0,780d1591f8757d666d59ef1d52d884893eef9ffb6a3dd794db8df81c60ae2aa7,2025-05-28T14:25:50.683000 CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000 +CVE-2025-47104,1,1,ad5e27d9d0015d4bac6932b15f5c621d1e70469ea346e224f770fd2fddb4cbc1,2025-06-10T17:23:19.443000 +CVE-2025-47105,1,1,06215a4d110f788cce09dd422ebaebbc53eb409aeceabf09df4b92214eddd629,2025-06-10T17:23:20.873000 +CVE-2025-47106,1,1,c77417a949f1d028c64f8a97dbbd14475f9cf7a14bcda2f0bc8cfaa82369fb5c,2025-06-10T17:23:22.100000 +CVE-2025-47108,1,1,a8210ba36b68fa518c01f7a95a7781a297853152fe3aac1730f6e970b80103df,2025-06-10T17:23:23.340000 CVE-2025-4711,0,0,21c8c473cfd0b8fb70049ba4f98b86bc8037c0e94662198ff53f909236b4a0c5,2025-05-27T14:10:06.050000 +CVE-2025-47110,1,1,bc094b4579c57ac0b748fd5fe2b39afc172f6e77433289184299d33b0d2e21ca,2025-06-10T16:15:41.210000 CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000 CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000 CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000 @@ -295537,8 +295621,24 @@ CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a CVE-2025-47153,0,0,1bca3f0c72274ce4b4c023a8e0978fd82f9f0090c23ca3f26eaede96af2bc369,2025-05-02T19:15:55.930000 CVE-2025-47154,0,0,6a55c646b5911b6b02123224674cd90dd2e3787c01df5f2ac266b60ca2d454e0,2025-05-02T13:53:40.163000 CVE-2025-4716,0,0,dada52e8c94f58b9450b0b4a9bdb43e377412a57e7caa3e8191e329a90a55c88,2025-05-27T14:11:12.623000 +CVE-2025-47160,1,1,34a10c4533a86a236847cda19c64aa858624acf8466817fea57b274a116ec369,2025-06-10T17:23:24.643000 CVE-2025-47161,0,0,c57678455db85a0578aecf2074b58b5fee35a3f62106f7b1cd95a7df17ec9499,2025-06-04T20:03:05.893000 +CVE-2025-47162,1,1,ce76aeef9d3551b89bc4f86437c0e9d64ab64f091c29daa33d6a611b78c79b74,2025-06-10T17:23:26.630000 +CVE-2025-47163,1,1,83f9c03bbf10110ae43a6ccdcdbb8b38921f702fc844a6b5e5b890c384fbefce,2025-06-10T17:23:28.840000 +CVE-2025-47164,1,1,d0b01047fdbd84c8e95811906d4f15ad3a6fadaf2ed9d25256d2bf83eaffe4b0,2025-06-10T17:23:31.333000 +CVE-2025-47165,1,1,745e04538dc0afc15e99a4d3bdb1639e2d914da9b8f02c22a3554afe57a4bd6f,2025-06-10T17:23:36.527000 +CVE-2025-47166,1,1,0d8552fca65bba22757c3105854f427da5743c327cc21f06bf2907015e3ac9f9,2025-06-10T17:23:38.753000 +CVE-2025-47167,1,1,075548d02c649ed2ca44976607edb994145d09bba1068f5e2bab2b2c69e52be1,2025-06-10T17:23:41.107000 +CVE-2025-47168,1,1,75fda5e71a8e78fe86f3ba4403bd29ec96445e4a833d01e8b422182f7ddf67ef,2025-06-10T17:23:43.307000 +CVE-2025-47169,1,1,d42234bcae6fde93fd320acf8d96b0a77bd506f01ddd8e5e112e6710217a9cff,2025-06-10T17:23:45.317000 CVE-2025-4717,0,0,8c6b554a91b9553dc985101123e9c85f09c9107cefc0850929b2446d4f2963c3,2025-05-27T19:51:44.153000 +CVE-2025-47170,1,1,a6dd633b4dfa691a9424f3fddc5542ea08fce2b79ebb2551def432a7a693bb8b,2025-06-10T17:23:47.287000 +CVE-2025-47171,1,1,152d1440bce3e2d09f692200db0f2d9128b3c6e76b86ef8a1f5e5820d1113e95,2025-06-10T17:23:49.350000 +CVE-2025-47172,1,1,37b1f918d2d8cd12a46066d1370faef412ec274022a5e7cfd297d45770e98a3e,2025-06-10T17:23:51.607000 +CVE-2025-47173,1,1,34a60018d8a0cbaea405dcaf7d0df458ec4e220258796ec21e49eeb054e44869,2025-06-10T17:23:53.543000 +CVE-2025-47174,1,1,739934298fca1373ca3a9ec768d8cb3075baece01333323786bfc1d274b763d7,2025-06-10T17:23:55.607000 +CVE-2025-47175,1,1,774f3b1bcfe86cfe94a341bd6264513635ae5c49df06414d37cdc1aa4ab8dd84,2025-06-10T17:23:57.607000 +CVE-2025-47176,1,1,bbae996cd6c42eb4a42008ed474af846c538562ccc4a95adecec227f3b9e9ea4,2025-06-10T17:23:59.800000 CVE-2025-4718,0,0,e197120a33051d36a3bdf1b0305cf7de5c5f5941a30eaf0eb2f8e25b8c33d5d8,2025-05-28T14:26:27.280000 CVE-2025-47181,0,0,aa11c9243cf9f21606fed813a8d7013ca1fc81a1699c797c7e93c8870c1ba872,2025-05-23T15:54:42.643000 CVE-2025-4719,0,0,8f45404e8c5e0b5372b6c6d3c18e425f04bef83b0b8978ee2807105e5fc3ce21,2025-05-28T14:26:35.423000 @@ -295864,16 +295964,16 @@ CVE-2025-47693,0,0,e89b1a6670330d4d22f8cc221b89668c8cd5df047d9ad3b00d816d91b773e CVE-2025-47697,0,0,7017cb143ae00e39a6be41658c8a7e8e23de50ae8206815ae5f36b7139369e22,2025-06-04T19:57:39.970000 CVE-2025-4770,0,0,5f368204f0ca7aae3eb62fd6ef282ad79cf1325c5be1729c43aaaf95e2bf0dbb,2025-06-05T19:35:54.267000 CVE-2025-47701,0,0,85bb7ccaf297c9dca91c85cb3376ebab43abe419ae7564896c8e3565de9158da,2025-05-20T17:15:49.160000 -CVE-2025-47702,0,1,a989ec3cf356a477dab297d584cb413674919d611ac0372fbeca97fe33e87bbe,2025-06-10T15:40:02.907000 -CVE-2025-47703,0,1,9b7415cec8b07e808e5a68f077b8c28608e9fa4f3f7b422fce5ed2e144155885,2025-06-10T15:39:25.567000 -CVE-2025-47704,0,1,8a91908fc0c94ff1ab81955ec33f4a7346553d022a35fd85e959604aa7fe8468,2025-06-10T15:32:53.443000 -CVE-2025-47705,0,1,3b0e1294458b02acdd63bcdb3e56084417c28c00d31b71cd2890a969131cbf6b,2025-06-10T15:30:59.653000 -CVE-2025-47706,0,1,c79c954fe432f320b3a0acc8a7ef92f4c0f44a24b44f4d8eb20934a6804b300d,2025-06-10T15:26:04.277000 -CVE-2025-47707,0,1,0c78846593c08e49bb05be49b5024045fb1d59332410efe4f8a49ed2d2651247,2025-06-10T15:25:56.740000 -CVE-2025-47708,0,1,84f05d4a302a4773233675624c12b096f71fa663eb5c771972565720cb29139c,2025-06-10T15:25:51.580000 -CVE-2025-47709,0,1,052096cd42f6144c5123d7b7b921bc47fc81175fe40fa776700da2bce1a0374e,2025-06-10T15:25:41.087000 +CVE-2025-47702,0,0,a989ec3cf356a477dab297d584cb413674919d611ac0372fbeca97fe33e87bbe,2025-06-10T15:40:02.907000 +CVE-2025-47703,0,0,9b7415cec8b07e808e5a68f077b8c28608e9fa4f3f7b422fce5ed2e144155885,2025-06-10T15:39:25.567000 +CVE-2025-47704,0,0,8a91908fc0c94ff1ab81955ec33f4a7346553d022a35fd85e959604aa7fe8468,2025-06-10T15:32:53.443000 +CVE-2025-47705,0,0,3b0e1294458b02acdd63bcdb3e56084417c28c00d31b71cd2890a969131cbf6b,2025-06-10T15:30:59.653000 +CVE-2025-47706,0,0,c79c954fe432f320b3a0acc8a7ef92f4c0f44a24b44f4d8eb20934a6804b300d,2025-06-10T15:26:04.277000 +CVE-2025-47707,0,0,0c78846593c08e49bb05be49b5024045fb1d59332410efe4f8a49ed2d2651247,2025-06-10T15:25:56.740000 +CVE-2025-47708,0,0,84f05d4a302a4773233675624c12b096f71fa663eb5c771972565720cb29139c,2025-06-10T15:25:51.580000 +CVE-2025-47709,0,0,052096cd42f6144c5123d7b7b921bc47fc81175fe40fa776700da2bce1a0374e,2025-06-10T15:25:41.087000 CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d346e,2025-05-21T14:16:02.380000 -CVE-2025-47710,0,1,efb080a2ca87d31fc53e84646807eb619dd8ffb84063c97064b1c37508c6b60a,2025-06-10T15:24:50.570000 +CVE-2025-47710,0,0,efb080a2ca87d31fc53e84646807eb619dd8ffb84063c97064b1c37508c6b60a,2025-06-10T15:24:50.570000 CVE-2025-47711,0,0,84134213c5152e1def5667fee36ba3a5b2be995d24d7708c58e002afb898ec35,2025-06-09T12:15:47.880000 CVE-2025-47712,0,0,36ab066e163c4ffc449059531315de23291a62b1378074f34cd0681da81a794c,2025-06-09T12:15:47.880000 CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000 @@ -295943,7 +296043,7 @@ CVE-2025-47815,0,0,8632f47d917ef5d0fa860991936749fefdd362e688d75c65c324061519adf CVE-2025-47816,0,0,dfc656b734ddc613569bffc853fd450ab3517aaf74cbf8b07d633a1866015974,2025-05-12T19:15:51.733000 CVE-2025-47817,0,0,a9608fe19de2055ccc53db5d916ab7446a11a0159ceb8cb3f751e656accab718,2025-05-12T17:32:32.760000 CVE-2025-4782,0,0,7ad1545eb9e016317ccf1371b442ca29cb62e72aa504ad708f7f276790913468,2025-05-23T13:04:40.253000 -CVE-2025-47827,0,1,e8e7d1db0126d69a3b1ce4ce3cd4a43b2b63ba3f83e4b78ec9433a4d6806ed2f,2025-06-10T15:15:25.270000 +CVE-2025-47827,0,0,e8e7d1db0126d69a3b1ce4ce3cd4a43b2b63ba3f83e4b78ec9433a4d6806ed2f,2025-06-10T15:15:25.270000 CVE-2025-47828,0,0,164436fe84b8d833a71f3fa8e7f3f39b64e2df889f4579512ca4cd1f99b4e769,2025-05-12T17:32:32.760000 CVE-2025-4783,0,0,bd5695c741cd6c06c07a958617e5fade1eea7d7c38bb9f2f382e0e33491cd176,2025-05-28T15:01:30.720000 CVE-2025-4785,0,0,11af03bace6c1c04331c5dddb8e99f128f61109ba1a035e35492e3dbcae57560,2025-05-21T21:00:19.110000 @@ -296008,13 +296108,22 @@ CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49 CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000 CVE-2025-47950,0,0,4b0b13462648502a1d9e9c65a1a516635c319d24d84102d181b2a27357de0e4c,2025-06-09T12:15:47.880000 CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000 +CVE-2025-47953,1,1,131908cdf03d6a1f0297bcaa8d2ae042a1bd634315ecacdc22ae44c87c6be78c,2025-06-10T17:24:01.917000 +CVE-2025-47955,1,1,083936941f207bbb0aa4851d123986ab0418fbc78f45400d3502c695151f2eae,2025-06-10T17:24:03.870000 +CVE-2025-47956,1,1,12390f50b1484535055dfde0c060f64e8f025e094107972c456c0fcbc1b5c698,2025-06-10T17:24:06.050000 +CVE-2025-47957,1,1,4e87afc88f571302db07e9a8b36a027e2b6c798134633b9ce998a943435d032a,2025-06-10T17:24:08.037000 +CVE-2025-47962,1,1,071e40af78b84788a7ff449c1eaafc2707ffefd758ea56dfa03012c68bc9119a,2025-06-10T17:24:10.140000 CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8d40,2025-06-06T14:07:28.330000 +CVE-2025-47968,1,1,4314a68d409dc7562d60e3a5f0de73add7fb3e3239cd4b56a3ee7ee04abfce03,2025-06-10T17:24:13.030000 +CVE-2025-47969,1,1,adaea1d826647359288575593192861c3dcfa58fd1235fb0f2afb4f9bbb45c64,2025-06-10T17:24:15.183000 CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000 +CVE-2025-47977,1,1,4f0da15be23d5e751f020adff860f3c3600eefecc4f18b0fdaccee2aa66bd710,2025-06-10T17:24:17.200000 CVE-2025-4800,0,0,9318c6df70d36b773d7fc889153c4ccced0bd2fc6ace455b4d54f9e1c185a4a9,2025-05-28T15:01:30.720000 -CVE-2025-48009,0,1,9bbf54dd866dd4de365cacd3cc58cc80c0cc2d2ba8fbdc821eac253715a62cf9,2025-06-10T15:29:32.900000 -CVE-2025-48010,0,1,4819d2e93ad3442257f70fb7864093e1a4200a7b0a7fba4a346e3f36d3da9e5b,2025-06-10T14:13:51.267000 -CVE-2025-48011,0,1,258b9fec7bb0d96eb7155a40013213737fe713d9c9fbe682bbd078d999f91910,2025-06-10T14:28:15.027000 -CVE-2025-48012,0,1,71d63bd70525687602bc234fe1b79ef8d4a14328f61a484c736f611a8ad14409,2025-06-10T14:28:52.893000 +CVE-2025-48009,0,0,9bbf54dd866dd4de365cacd3cc58cc80c0cc2d2ba8fbdc821eac253715a62cf9,2025-06-10T15:29:32.900000 +CVE-2025-4801,1,1,fc6ec83b7f99dbba6d1228da70489464cc23b7a30d8f01ad6791644a180c4530,2025-06-10T16:15:42.923000 +CVE-2025-48010,0,0,4819d2e93ad3442257f70fb7864093e1a4200a7b0a7fba4a346e3f36d3da9e5b,2025-06-10T14:13:51.267000 +CVE-2025-48011,0,0,258b9fec7bb0d96eb7155a40013213737fe713d9c9fbe682bbd078d999f91910,2025-06-10T14:28:15.027000 +CVE-2025-48012,0,0,71d63bd70525687602bc234fe1b79ef8d4a14328f61a484c736f611a8ad14409,2025-06-10T14:28:52.893000 CVE-2025-48014,0,0,b9d2079ba78dd708b6501c98bcfc8c530a41a6a42eec8a9e644487633db1d02d,2025-05-21T20:24:58.133000 CVE-2025-48015,0,0,97195b1375e738b78c3c892de114d387c5901e8ee163a174bd7cc7d86bb801d6,2025-05-21T20:24:58.133000 CVE-2025-48016,0,0,7f338d05ff0bf5457b003e53823b639de05c7abe792c9baaaefb3f53dc116634,2025-05-21T20:24:58.133000 @@ -296042,6 +296151,7 @@ CVE-2025-48062,0,0,9131da3ef4cd7079fab1ec4e6e8b4b54f8684972666b68dcb7ee239675dd1 CVE-2025-48063,0,0,30768bd0b996f4003af001e4f1f93e88434b229ec5305143caf606aa28b95eff,2025-05-21T20:24:58.133000 CVE-2025-48064,0,0,f30f6abfc706c8ec009b8e1646b8ce7a94ad294f1fc91f47ca51b619773ad0e0,2025-05-21T20:24:58.133000 CVE-2025-48066,0,0,faea31f6567e989a0ef973c3f26a498ca723f84a2b80d40e0205222fbd185beb,2025-05-30T01:18:41.410000 +CVE-2025-48067,1,1,0ecf1338b4676ed251213c111dbde3cbbe6a96de07e52d1afd355f0212e47ced,2025-06-10T16:15:41.357000 CVE-2025-48068,0,0,8829e4d02604079a80fe777b2b1440ff57426176316d262891eaefe3a9476157,2025-05-30T16:31:03.107000 CVE-2025-48069,0,0,d201b903e106fd4e8e9a5c16c5ee97dd49fc9c17d0474c4fa89382c7bdd7010c,2025-05-21T20:24:58.133000 CVE-2025-4807,0,0,38e0deb05d9d726281158918611fe40bc8b500e3135a018beac99acf23d735d4,2025-05-28T13:38:25.170000 @@ -296231,13 +296341,13 @@ CVE-2025-48425,0,0,5375b1213c661d9c8e265e6ccb918fa737a0a97c61c46c0979c4669ee5fa8 CVE-2025-48426,0,0,4a81f9becf3c9368a66d400667b54c85edc5dcfa7efc6202bcbc6fb457650122,2025-05-21T06:16:28.347000 CVE-2025-48427,0,0,7b7d0b24d905cbea3b50146b37b4cf62666de442b9ee6475e1cabe343e0aa3f7,2025-05-21T06:16:28.427000 CVE-2025-4843,0,0,5890e4c47a5552e18a9be038fa9194d6f64cc12e48ceed25f7f3e1b0ba45bf6f,2025-06-04T20:11:36.947000 -CVE-2025-48432,0,0,f47438cf846a9f72ce4523102d0f3d5fb838d8a2856797b0ec746b44c36fee21,2025-06-05T20:12:23.777000 +CVE-2025-48432,0,1,dc50f56d1c01c4dd2b111e1573276d79112ae018514cddd1e357a2dcae655822,2025-06-10T17:24:19.100000 CVE-2025-4844,0,0,c912eb5a20c5346c9f6d6c3e57f91f3a367b50a9f461c9f08439baff48bc8fef,2025-06-04T20:11:19.110000 CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000 CVE-2025-4846,0,0,4dd97835f28bce0c2a0646c496f88035dc9f48717c734fc8fd3222164cab7575,2025-05-19T13:35:20.460000 CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000 -CVE-2025-48471,0,1,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000 -CVE-2025-48472,0,1,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000 +CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000 +CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000 CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000 CVE-2025-48474,0,0,1b5617c927a4f3203821f0dae9b4591ef13d03a77e55a9eff2602e8bb0d7cb05,2025-05-30T16:31:03.107000 CVE-2025-48475,0,0,cc221468e2c81c464bbeb608aef3bd329a5e19afcff977fed2ff2390befd44f5,2025-05-30T16:31:03.107000 @@ -296355,6 +296465,7 @@ CVE-2025-48873,0,0,4451418e69b9683e4c8577758088c5d2ce92d15138757f995580cbaa635d8 CVE-2025-48874,0,0,38c8a7a9f9e4de254c475a3cc2adb8109dfa7e2eed584004a3cf9ab32d38ade6,2025-05-30T20:15:43.450000 CVE-2025-48875,0,0,029be7ab6273a4455b3ac7b9bf6f732c1f5c1649e6f1271a40adecc61bf80bab,2025-06-04T19:54:12.937000 CVE-2025-48877,0,0,3d171f46299c208fb03451f172d8304bf1ced3034004c6c504e2f6bc88072c45,2025-06-09T13:15:23.500000 +CVE-2025-48879,1,1,4856649e1fb6455ee0e8c9049496dd6f4502b5a241d4c52fe1ef1077ffc03165,2025-06-10T16:15:41.513000 CVE-2025-4888,0,0,6310b8fff197a575079561816e1f76f1ad70f7608de3ca85411d4b87b2143843,2025-05-28T15:27:22.353000 CVE-2025-48880,0,0,e3f8b2cdd2d7e01ae05621a292349f1663c3a39c76f38840987aaac340e5533a,2025-06-04T18:32:36.090000 CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe5e0,2025-06-04T21:15:40.263000 @@ -296390,6 +296501,7 @@ CVE-2025-48931,0,0,9a24a64e0ef76c1e8795f67a812a3665cb8357f39db23fd805f099443712b CVE-2025-48934,0,0,da09fe1de5165be7f58b28c1117d7179188883881184896933b151cc78fe9312,2025-06-05T20:12:23.777000 CVE-2025-48935,0,0,290e64ec3bef597e0aaf785c3f2a47773257f90fb9ee8de652ea401ad9b16be1,2025-06-05T20:12:23.777000 CVE-2025-48936,0,0,466cc85edbb9de09c6e53990c33f4edba165b1227854443bbecd0e6313d71310,2025-06-04T18:31:41.773000 +CVE-2025-48937,1,1,38a27eb1ceeb1a835ecd49892d44d8f36230a42b91ddb6ae551b3e900adcaa29,2025-06-10T16:15:41.670000 CVE-2025-48938,0,0,69a6b3e527c71a70d204c408cd7b6de2f9d11cdc8bb56708cb8a375fccb4e065,2025-06-02T17:32:17.397000 CVE-2025-4894,0,0,e203d4bd91eb3e3cb92f624dec258fe2ede19a69c9e41059892032f4ff18f560,2025-06-05T19:39:01.520000 CVE-2025-48940,0,0,e926be5dfd68a2ca8f22b1d6590ba6a2e87ec22f343f0f3f40e3fab5d3cf0df6,2025-06-02T17:32:17.397000 @@ -296463,13 +296575,15 @@ CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655 CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000 CVE-2025-49130,0,0,101994697265c4124b21893e7018192e4caf4f2ec31625a5dfcbe146cdb28e2a,2025-06-09T13:15:23.977000 CVE-2025-49131,0,0,cb5b50180e5eaa5b85e2d41a2bea84c06691db09851c0931186c9857c00a2951,2025-06-09T13:15:24.120000 -CVE-2025-49136,0,1,f17c65c3fffc31c312f66268030c86b49b3a7486baa9ae080bc38b145e145f89,2025-06-10T14:15:30.510000 -CVE-2025-49137,0,0,4a9bc70d2fa871bf4605433ea43fb5042c491536b67aeba8f2381a10a42a4d8a,2025-06-09T21:15:46.890000 -CVE-2025-49138,0,0,afec9b8853bb09177fbd685c5c96dfab6c791e5562e74f32f9c30e5ddd13eaf3,2025-06-09T21:15:47.047000 -CVE-2025-49139,0,0,298d2b55fe3f58702c8a8336073404abfb72895885d946c55a5eec2f31d44687,2025-06-09T21:15:47.203000 +CVE-2025-49136,0,0,f17c65c3fffc31c312f66268030c86b49b3a7486baa9ae080bc38b145e145f89,2025-06-10T14:15:30.510000 +CVE-2025-49137,0,1,4ab0141317e92d7cc36a79e8d8b73bb39053a0d4d0cd444a2cb1522c3d9d7b0b,2025-06-10T16:15:41.880000 +CVE-2025-49138,0,1,cf1ec877b517e9c0d5bc9ca79299af68ec9d1ed097304a7b91ea5fe7bfadcf7c,2025-06-10T16:15:41.983000 +CVE-2025-49139,0,1,00c5854979f62af134906c6aeedb7ab7aed46f15b6405acdde74451c71bd405f,2025-06-10T16:15:42.090000 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 CVE-2025-49140,0,0,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c97d,2025-06-09T22:15:22.153000 -CVE-2025-49141,0,0,de0e15852e3a7a9695ab23fa0f5963a9591d4cd2c49227521c6a4df241d53639,2025-06-09T21:15:47.360000 +CVE-2025-49141,0,1,c27a5db8847ba6463beeffc0f33ecced17eb646ef426e9c77fae0b5a96f645b7,2025-06-10T16:15:42.193000 +CVE-2025-49142,1,1,b6552c867dcdae934f4510e82e6caaa381511e720ec6623ff0ffb45ff0c083a8,2025-06-10T16:15:42.293000 +CVE-2025-49143,1,1,9d062967241f50913064a334ed49b074edc4a399d0d32df3945192529f45fc06,2025-06-10T16:15:42.450000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa7c1,2025-06-04T14:54:33.783000 @@ -296800,13 +296914,13 @@ CVE-2025-5222,0,0,f80b4651006f76581a0f11e89a1589708b41e90d125505313b9f47c7110032 CVE-2025-5223,0,0,eedcac5c929aac409f34f81cc2ec2de352a7f5b73ed89921b6a7fb323152d259,2025-06-07T23:15:22.067000 CVE-2025-5224,0,0,fe1dde8170826294eeb006cd262e5a7be588d2b4007cd87274f687b8957160b1,2025-05-28T20:46:50.577000 CVE-2025-5225,0,0,e0f7a8aba15fff895101b090456eaee855f3c175e14c6b8dc2047e796322aa04,2025-05-28T20:38:39.167000 -CVE-2025-5226,0,1,3f035f3ce096bd756bac1d05f7e172c640275b7f8d3eabff140993a51318bbdb,2025-06-10T15:43:41.087000 -CVE-2025-5227,0,1,bd9288f69602569aaf5c7c343359a30334456bbbf73bb80e888779abc798953e,2025-06-10T15:43:19.837000 +CVE-2025-5226,0,0,3f035f3ce096bd756bac1d05f7e172c640275b7f8d3eabff140993a51318bbdb,2025-06-10T15:43:41.087000 +CVE-2025-5227,0,0,bd9288f69602569aaf5c7c343359a30334456bbbf73bb80e888779abc798953e,2025-06-10T15:43:19.837000 CVE-2025-5228,0,0,3a0e12218f95d959eba2cefb6ecb66602ccc213d47caf3fc54f472a731c4f49e,2025-05-28T15:01:30.720000 CVE-2025-5229,0,0,1288da6b330c7645f72b24c3f896b277f2be20982fe0d52f419898332e513b8d,2025-05-28T20:38:08.080000 -CVE-2025-5230,0,1,9fadea541076e74f479fb5b5289a700110bb92230bc9a76add28f6c782b2ab5a,2025-06-10T15:11:44.053000 -CVE-2025-5231,0,1,933bca2cb9baedec07e689266f247371c054ab08b67bfc89de515eda8b6db129,2025-06-10T15:11:56.957000 -CVE-2025-5232,0,1,1b45026e75247a7322427bb058f27ed5717a2e44e9ed2a15532ca07a8f6c71a6,2025-06-10T15:12:09.197000 +CVE-2025-5230,0,0,9fadea541076e74f479fb5b5289a700110bb92230bc9a76add28f6c782b2ab5a,2025-06-10T15:11:44.053000 +CVE-2025-5231,0,0,933bca2cb9baedec07e689266f247371c054ab08b67bfc89de515eda8b6db129,2025-06-10T15:11:56.957000 +CVE-2025-5232,0,0,1b45026e75247a7322427bb058f27ed5717a2e44e9ed2a15532ca07a8f6c71a6,2025-06-10T15:12:09.197000 CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000 CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000 CVE-2025-5239,0,0,7898c1e396cfbf8baf8b107169103de7dd241d1dc63468b7841c136fc0bb5fc9,2025-06-06T14:06:58.193000 @@ -296815,10 +296929,10 @@ CVE-2025-5244,0,0,f16a7ad73436a8b188ea427e076cb6d66c3866f0d06770cfebf2ea7a2f86cb CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000 CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e82,2025-05-28T20:38:00.033000 CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000 -CVE-2025-5248,0,1,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000 +CVE-2025-5248,0,0,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000 CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b76,2025-05-28T15:01:30.720000 -CVE-2025-5250,0,1,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 -CVE-2025-5251,0,1,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000 +CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 +CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000 CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000 CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000 CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 @@ -296850,7 +296964,7 @@ CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b CVE-2025-5295,0,0,86992e97da5db3e66123dc758ac5a1f83b74ab998ea61bbd2f95d3d081833d3f,2025-05-28T15:01:30.720000 CVE-2025-5297,0,0,87f5c2ea55786c8b81963baa725b45d00523179cb7524fec69b00cb83e8c752e,2025-05-28T15:01:30.720000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 -CVE-2025-5299,0,1,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 +CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000 CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000 @@ -296859,20 +296973,20 @@ CVE-2025-5323,0,0,b0785ba87cd1215b18904af4ecc0dec4461f38599fcb91263ef5f63563e48a CVE-2025-5324,0,0,78e349d2bd14065297b1365314e2e0d4a2b731776a4275b89f97d27f39ee4fa3,2025-05-30T16:31:03.107000 CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a2d,2025-05-30T16:31:03.107000 CVE-2025-5326,0,0,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000 -CVE-2025-5327,0,1,a8b880c32053a31de283f5a9cad582c296c544f77211624787db5b92e0d637e7,2025-06-10T15:13:37.533000 -CVE-2025-5328,0,1,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b70669005,2025-06-10T15:14:10.110000 +CVE-2025-5327,0,0,a8b880c32053a31de283f5a9cad582c296c544f77211624787db5b92e0d637e7,2025-06-10T15:13:37.533000 +CVE-2025-5328,0,0,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b70669005,2025-06-10T15:14:10.110000 CVE-2025-5330,0,0,d834ad4ad61a847f16cff13c2e41a3edc0634ba2b8cfe9a60897f96120871dc7,2025-05-30T16:31:03.107000 CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065a6,2025-05-30T16:31:03.107000 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5334,0,0,6cefdf4a8a5fef2de01d101edb206c6f9ee44bc60680712426fe5d51666584f6,2025-06-09T18:15:27.170000 -CVE-2025-5335,1,1,e16a76200b950d2b5a9c6bf9a18e3f4a54d41ee72e847fe3e679465b4988f67d,2025-06-10T15:15:25.703000 +CVE-2025-5335,0,0,e16a76200b950d2b5a9c6bf9a18e3f4a54d41ee72e847fe3e679465b4988f67d,2025-06-10T15:15:25.703000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 -CVE-2025-5353,1,1,57b899ca5d1a7adbac2d3ccae7c49e4694f41d8501e61d00875f34fa068c589c,2025-06-10T15:15:25.883000 +CVE-2025-5353,0,0,57b899ca5d1a7adbac2d3ccae7c49e4694f41d8501e61d00875f34fa068c589c,2025-06-10T15:15:25.883000 CVE-2025-5356,0,0,d2223801ca567247b6cb0c5b7ef4a510c84f7151648945f3dcaaa1c30308362b,2025-06-02T17:32:17.397000 CVE-2025-5357,0,0,5ffac87c68c3d58819140208e19f32acf2a5d2446a9a83bf211e7c826fa75a53,2025-06-02T17:32:17.397000 -CVE-2025-5358,0,1,8d1b1a598434ecad4f0ae411fcaa51446d90f020f8729fd93cc9901ead4d16c2,2025-06-10T15:14:21.980000 -CVE-2025-5359,0,1,fbaee83932976cabc2c375b7182ecd49a378426f554e3965400f3dd72ff93c16,2025-06-10T15:14:30.460000 +CVE-2025-5358,0,0,8d1b1a598434ecad4f0ae411fcaa51446d90f020f8729fd93cc9901ead4d16c2,2025-06-10T15:14:21.980000 +CVE-2025-5359,0,0,fbaee83932976cabc2c375b7182ecd49a378426f554e3965400f3dd72ff93c16,2025-06-10T15:14:30.460000 CVE-2025-5360,0,0,f6f6f0a68bcc88f729faa5e7b6e62c265dbe0f87de895580450e0ebfdb395bd6,2025-06-03T15:35:19.237000 CVE-2025-5361,0,0,63ed55da0a8819c3072e9ae5cbf20f6ad96bd8fa3415071144a15d946aef0cb0,2025-06-03T15:35:09.950000 CVE-2025-5362,0,0,33b74730f9e7ac14985e93de797c2da60e582983293fbae692e330f50a44162c,2025-06-03T15:34:57.473000 @@ -296940,9 +297054,9 @@ CVE-2025-5439,0,0,3cf41ec943c23293f4dda106c2a9c964060d68097fffb17e42ce95be089b72 CVE-2025-5440,0,0,9fb3ee8b902bf4c82a55ea9cc309a96a9f5bc9b647e9bb2e28aea5dae7d84f37,2025-06-02T17:32:17.397000 CVE-2025-5441,0,0,ac74c7cc0f531f603ebba9c2bca9d48918e26d19fe5966f70f4992ef7f9dc14a,2025-06-02T17:32:17.397000 CVE-2025-5442,0,0,aff4e7dbcf6e16c07e1755fc79189c8c906002caae35c81216b58555f7942402,2025-06-02T17:32:17.397000 -CVE-2025-5443,0,1,c979fc559b9753e7b8f3cea4a3591b3d21b403fd87a023a9ecde01c1efbe3d0f,2025-06-10T15:14:40.057000 -CVE-2025-5444,0,1,2bdd03d16168890a76d628b7e1ae67a954e89be452c722e478e2135aa0988d5e,2025-06-10T15:14:50.777000 -CVE-2025-5445,0,1,48ecb9ed962bffb0d51cf3a0f453cb2062332faabc3f4707bcde0f91fbc8a125,2025-06-10T15:15:02.610000 +CVE-2025-5443,0,0,c979fc559b9753e7b8f3cea4a3591b3d21b403fd87a023a9ecde01c1efbe3d0f,2025-06-10T15:14:40.057000 +CVE-2025-5444,0,0,2bdd03d16168890a76d628b7e1ae67a954e89be452c722e478e2135aa0988d5e,2025-06-10T15:14:50.777000 +CVE-2025-5445,0,0,48ecb9ed962bffb0d51cf3a0f453cb2062332faabc3f4707bcde0f91fbc8a125,2025-06-10T15:15:02.610000 CVE-2025-5446,0,0,35d85a6b109786f1b24f687919ca0a0a29c0ef8c307735f4c4f3239f7042c652,2025-06-02T17:32:17.397000 CVE-2025-5447,0,0,3f0e18d04d97ed4b37df377d5a284b98bec607376a89ae1ee717f001b4c6401a,2025-06-02T17:32:17.397000 CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000 @@ -296992,30 +297106,30 @@ CVE-2025-5542,0,0,3ecc2ef85a02a09c9be7e6dbf30040d86ff640f6ba754495a5d8dbf30a0806 CVE-2025-5543,0,0,1ff545b0787bdb2f415332be5f3786ca673df4cb409c2ec190778560a2d9b13a,2025-06-06T18:47:47.150000 CVE-2025-5544,0,0,020a516e79a3f89efe59dfb651e1ec3f5e799cf4a3d54ccd47ef877829750c60,2025-06-04T14:54:33.783000 CVE-2025-5545,0,0,55d8baf56abe80fa22bd39010fb1f2dbeb1a08ed8d27592cbb4a9f836725943d,2025-06-09T15:04:45.830000 -CVE-2025-5546,0,1,912de4b43dff5d841c903f41c5d0728817acd0fa07ff252e93bd502efe24d6d0,2025-06-10T15:15:55.460000 +CVE-2025-5546,0,0,912de4b43dff5d841c903f41c5d0728817acd0fa07ff252e93bd502efe24d6d0,2025-06-10T15:15:55.460000 CVE-2025-5547,0,0,ad624e392a872fc040477ed96757114cbc2f98e534b38b49cf7cf171901251a1,2025-06-04T14:54:33.783000 CVE-2025-5548,0,0,590c16f8c57c95c6b0fc54003176d2c57cd3a4ed604f2d3d418aed1b64c7d579,2025-06-04T14:54:33.783000 CVE-2025-5549,0,0,4a87195804f85532846e2070b675494ebb2dc114b1e03afb9dda2a13b1a91926,2025-06-04T14:54:33.783000 CVE-2025-5550,0,0,9f0963c1f449efb521dbc7cafbe3062160aa7a84498a39a10845a57f133b036a,2025-06-04T14:54:33.783000 CVE-2025-5551,0,0,d4340840da64ad8e437c324f4c7e2e891a0f347f31a6bc79663bc7b670bf3136,2025-06-04T14:54:33.783000 CVE-2025-5552,0,0,abba3e275efaa9b5b15cd58a4bc700d0b47553fee7bf598a342bbbb38eb89632,2025-06-04T14:54:33.783000 -CVE-2025-5553,0,1,fe4c614ffbe08afefea4288d466eb90eee97d4e2f16090dab1d687305d5627f3,2025-06-10T15:16:07.670000 -CVE-2025-5554,0,1,bb973700fe34126bf117ec751e38d204eccbaefe0d39d643366a25cffb57f45d,2025-06-10T15:16:16.877000 -CVE-2025-5556,0,1,1f63a7f5a7a91cd0b5f15f9dd5246b4bb97c1dcec71534f8a57046e817922924,2025-06-10T15:16:25.960000 -CVE-2025-5557,0,1,fd128465c0bc90cacbb5b3b2d601b7eb1c9da01523b98b89dfee1d497f1d2b1a,2025-06-10T15:16:34.460000 -CVE-2025-5558,0,1,8898e8aec84c9da1e1a971bfb5f9893e56cc9688fb9183de0f88cf551a2dfd4a,2025-06-10T15:16:47.660000 -CVE-2025-5560,0,1,21018256a4a41226bbfdbee889a1ff65b3ac04e2a1b78f1fe7522235e9af56b5,2025-06-10T15:10:58.590000 -CVE-2025-5561,0,1,37d583178eab41cfcaf572a9f55ac9ee56d529a81129a4bd0f0e52ba8e1b98bf,2025-06-10T15:10:51.040000 -CVE-2025-5562,0,1,6240bc0a7dbaa1de6ee01e8085c281ab501398cc54d049e3ba52ef12d9151257,2025-06-10T15:10:36.680000 +CVE-2025-5553,0,0,fe4c614ffbe08afefea4288d466eb90eee97d4e2f16090dab1d687305d5627f3,2025-06-10T15:16:07.670000 +CVE-2025-5554,0,0,bb973700fe34126bf117ec751e38d204eccbaefe0d39d643366a25cffb57f45d,2025-06-10T15:16:16.877000 +CVE-2025-5556,0,0,1f63a7f5a7a91cd0b5f15f9dd5246b4bb97c1dcec71534f8a57046e817922924,2025-06-10T15:16:25.960000 +CVE-2025-5557,0,0,fd128465c0bc90cacbb5b3b2d601b7eb1c9da01523b98b89dfee1d497f1d2b1a,2025-06-10T15:16:34.460000 +CVE-2025-5558,0,0,8898e8aec84c9da1e1a971bfb5f9893e56cc9688fb9183de0f88cf551a2dfd4a,2025-06-10T15:16:47.660000 +CVE-2025-5560,0,0,21018256a4a41226bbfdbee889a1ff65b3ac04e2a1b78f1fe7522235e9af56b5,2025-06-10T15:10:58.590000 +CVE-2025-5561,0,0,37d583178eab41cfcaf572a9f55ac9ee56d529a81129a4bd0f0e52ba8e1b98bf,2025-06-10T15:10:51.040000 +CVE-2025-5562,0,0,6240bc0a7dbaa1de6ee01e8085c281ab501398cc54d049e3ba52ef12d9151257,2025-06-10T15:10:36.680000 CVE-2025-5563,0,0,abd05332a66da82c0a84bbcebb55ce866c616ee358de4033b1bc944eee92c5bd,2025-06-06T14:07:28.330000 CVE-2025-5565,0,0,69057d9fcda3a9d391a6fdd2d36028e43e46d962e75d2a96d0e0e06e8f6deb95,2025-06-06T14:07:28.330000 -CVE-2025-5566,0,1,779c860a161eb64dc6f40dd7f0ca399f4546b6e4ee22bf38748c51ae144c439c,2025-06-10T15:10:27.370000 +CVE-2025-5566,0,0,779c860a161eb64dc6f40dd7f0ca399f4546b6e4ee22bf38748c51ae144c439c,2025-06-10T15:10:27.370000 CVE-2025-5568,0,0,3985b2b3c56041cfacfc47ea29b5076a771839690445a0941918b66a37c31945,2025-06-09T12:15:47.880000 CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000 CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000 CVE-2025-5572,0,0,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000 CVE-2025-5573,0,0,6e69e3f6614bb634486e032f3753cb8f537723c56a38d21eec74aa1f5111ea31,2025-06-06T18:48:46.463000 -CVE-2025-5574,0,1,7e7be3831b0299a7ae36546924c9d0572447f6adceed9e353cc4fce0d37f2ba9,2025-06-10T15:10:15.753000 +CVE-2025-5574,0,0,7e7be3831b0299a7ae36546924c9d0572447f6adceed9e353cc4fce0d37f2ba9,2025-06-10T15:10:15.753000 CVE-2025-5575,0,0,81a126dfb6ccad488366b77c36606cd2156f744efbd821f36b71a3dcd92de139,2025-06-05T14:07:21.913000 CVE-2025-5576,0,0,9f8e91355100a3b7dd53af7604f262c00a18d00760bd7db63f9844a1c4222ed2,2025-06-04T18:28:36.393000 CVE-2025-5577,0,0,862bbaad6dfd6bc3941b913aa0d44c2f574c2a1c00c138cbc3600dc62caa3a63,2025-06-04T18:28:13.103000 @@ -297025,7 +297139,7 @@ CVE-2025-5580,0,0,5420af4803342beed15a14e9e13364c54154082896c2011e3016de8bff3b15 CVE-2025-5581,0,0,c54747d4f47de2d53a0450ac3d2803f6b1ce7f3a8f3dd0d32c7ea29ca0ea8be0,2025-06-04T17:44:44.413000 CVE-2025-5582,0,0,d2f1baa22f55fc38a8f865d0e99938121f7ce9bfb4e6584060e61c164943f9d6,2025-06-04T17:44:37.780000 CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991ad,2025-06-04T17:44:26.393000 -CVE-2025-5584,0,1,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000 +CVE-2025-5584,0,0,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000 CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000 CVE-2025-5592,0,0,36c388f33c323490a93ebd79d5f124d5f4fdc10d946cc1144d6e587fb6694158,2025-06-09T15:02:45.030000 CVE-2025-5593,0,0,2fc870a522f11936dac0dea9ff39b04ab227f9c952baf080bcd9f5e32f30e2b0,2025-06-05T20:12:23.777000 @@ -297035,12 +297149,12 @@ CVE-2025-5596,0,0,82e23e549f21aaf09e5e1c4b088111b178830006f56637c5b165470eaca69f CVE-2025-5597,0,0,c6542e113819d36b9ca3595ae5f78250394d8b05f7ccd0ada2c6c9bddae0ce68,2025-06-04T14:54:33.783000 CVE-2025-5598,0,0,3e6053accb2ad1c62c474f119bb1ce64d7f1c5c7b880697e1b74f6ef86954e5b,2025-06-04T14:54:33.783000 CVE-2025-5599,0,0,a4690079a0136127df1bfec40ffa5cfbb791410519d82ad4cd23949e81f77301,2025-06-09T15:00:57.223000 -CVE-2025-5600,0,1,3624845bae8df5209c219f36d31448c60cec30dc60b6c9062ba78f3967c5b2b1,2025-06-10T15:09:46.277000 +CVE-2025-5600,0,0,3624845bae8df5209c219f36d31448c60cec30dc60b6c9062ba78f3967c5b2b1,2025-06-10T15:09:46.277000 CVE-2025-5601,0,0,d110cb5e0e987f41c84d932ca577eb76fded00997009129ff3930d50ad06c883,2025-06-04T14:54:33.783000 -CVE-2025-5602,0,1,3b8e9fc3388759de747bb6bfe4645b24fa3f3dca6ebc49155b5fdf413e9b2781,2025-06-10T15:09:24.977000 -CVE-2025-5603,0,1,1ab3f9f1479cb59d22cc62b837b1e7a8cd1045a224053a34977c02df77d60d78,2025-06-10T15:09:11.080000 -CVE-2025-5604,0,1,b768114dbc74930cd913741feb177933cff26ecc0ccef0e633058f9d872da1ef,2025-06-10T15:08:53.860000 -CVE-2025-5606,0,1,f1b344f05593638f56ae97bd4a3ae2344d8c49f42a7e4146ae2f0ceba51d7ee8,2025-06-10T15:08:33.920000 +CVE-2025-5602,0,0,3b8e9fc3388759de747bb6bfe4645b24fa3f3dca6ebc49155b5fdf413e9b2781,2025-06-10T15:09:24.977000 +CVE-2025-5603,0,0,1ab3f9f1479cb59d22cc62b837b1e7a8cd1045a224053a34977c02df77d60d78,2025-06-10T15:09:11.080000 +CVE-2025-5604,0,0,b768114dbc74930cd913741feb177933cff26ecc0ccef0e633058f9d872da1ef,2025-06-10T15:08:53.860000 +CVE-2025-5606,0,0,f1b344f05593638f56ae97bd4a3ae2344d8c49f42a7e4146ae2f0ceba51d7ee8,2025-06-10T15:08:33.920000 CVE-2025-5607,0,0,9aacf7995f1e37d05e7f946c5a74b9cfa42ed1291e7d764cf1df8b98f4f8d919,2025-06-05T20:12:23.777000 CVE-2025-5608,0,0,a6fd4cf6a853c5b50d2adbc58badc00e78a4b15d719a0e262c3536cf7eb022e8,2025-06-05T20:12:23.777000 CVE-2025-5609,0,0,b393dc7d8eae58f3971e224e8813e7a1af64a0d88824f5f24af71e1ad3003ad7,2025-06-05T20:12:23.777000 @@ -297048,8 +297162,8 @@ CVE-2025-5610,0,0,082c2155c58bea98ca846c2b918c7a815670e7b62b90ea6043b1d833da38d9 CVE-2025-5611,0,0,504aec8c7f7af0281d744d783555468820a69c0d4453a0a1b4a3056c98992d92,2025-06-05T20:12:23.777000 CVE-2025-5612,0,0,3eb307a0a0cbaaa44e441a689cece0ed028d19cededc42a6e5128a2337fecf4d,2025-06-06T20:10:20.870000 CVE-2025-5613,0,0,5c852f790ee9450ec50beb9319d4075e185a01ce6ef26c1472484f137c74d219,2025-06-06T20:10:33.297000 -CVE-2025-5614,0,1,8e0c0aa8d2812f5636529729017d80dc0e08b2225a3c38054accfc9540442377,2025-06-10T15:07:07.150000 -CVE-2025-5615,0,1,080a966a50aed58357dc4477fa8a1a1b759ccdf759ebc0bd9799539e94488994,2025-06-10T15:06:57.433000 +CVE-2025-5614,0,0,8e0c0aa8d2812f5636529729017d80dc0e08b2225a3c38054accfc9540442377,2025-06-10T15:07:07.150000 +CVE-2025-5615,0,0,080a966a50aed58357dc4477fa8a1a1b759ccdf759ebc0bd9799539e94488994,2025-06-10T15:06:57.433000 CVE-2025-5616,0,0,bf665cc2d4d0a9f55a5dff0ef813aa4161535bf8ce07edeeec7e155263ff2ea4,2025-06-06T20:10:46.310000 CVE-2025-5617,0,0,9f49b3e5e465fa33b1a86264ece1f53de099c2ac8d84fd6abe55ccad00567710,2025-06-06T20:11:01.317000 CVE-2025-5618,0,0,dcda7ecbbd75b3aa7002c5dfea5bf8be5e01d44363a79aabe62f48ac2ecb882f,2025-06-06T20:11:48.340000 @@ -297065,9 +297179,9 @@ CVE-2025-5627,0,0,230727c373183a4548524000ad073fbb07ab9578e0b58e40e109af9720fe26 CVE-2025-5628,0,0,289ff0d0945b0397ab81c7390bb889742f4cd84bdef6d26ce6122dcbaa2d4c23,2025-06-06T15:20:23.697000 CVE-2025-5629,0,0,9bb41f96cfd049115e8fe7fb1b8f28e1ed189cfd4130e2ac263680cffaade3a3,2025-06-06T15:15:34.450000 CVE-2025-5630,0,0,c76d2d5d4cdbbcf3f1953926d8043d43083021367f405c5e508bb3be08905c5a,2025-06-06T15:15:04.173000 -CVE-2025-5631,0,1,9520f1da612f67ba3cacb4f45328d86005130fcd40654c95da630bdfedd60c11,2025-06-10T15:06:48.390000 -CVE-2025-5632,0,1,8ad0fef869c4049544d603c15d429bacfd075475604feb92364d909438688e36,2025-06-10T15:06:36.483000 -CVE-2025-5633,0,1,3b0a21d83cf61d5b5f29a4ba5acd674d201048bb203557b600a037d42bc1f0dc,2025-06-10T15:06:27.257000 +CVE-2025-5631,0,0,9520f1da612f67ba3cacb4f45328d86005130fcd40654c95da630bdfedd60c11,2025-06-10T15:06:48.390000 +CVE-2025-5632,0,0,8ad0fef869c4049544d603c15d429bacfd075475604feb92364d909438688e36,2025-06-10T15:06:36.483000 +CVE-2025-5633,0,0,3b0a21d83cf61d5b5f29a4ba5acd674d201048bb203557b600a037d42bc1f0dc,2025-06-10T15:06:27.257000 CVE-2025-5634,0,0,a8f7bce93769ae41367845b9305add4ff45e373670edfef278c3de8f80f971f4,2025-06-05T20:12:23.777000 CVE-2025-5635,0,0,d11431d595bac231f6760894b7a3d37b8c650b0446c79aadf9e50e72d833c28a,2025-06-05T20:12:23.777000 CVE-2025-5636,0,0,efbe4c23ccc8d989a2bf492b0f76a752acd7bc391b50e1f464d6882b7fb1548b,2025-06-05T20:12:23.777000 @@ -297083,19 +297197,19 @@ CVE-2025-5645,0,0,4709827fc4187848d80e03985eac7eeca7940fd2f1746e8979029ff17abfa1 CVE-2025-5646,0,0,2fff89e5f69774bf0290e16798e92cb561fb097e337cf23ea1fef978bc71b88a,2025-06-05T20:12:23.777000 CVE-2025-5647,0,0,04c0fa928fcb1a5c135d2ada655645cde50c394ce2a4307fd438db3c37aeef0e,2025-06-05T20:12:23.777000 CVE-2025-5648,0,0,96e93640f610667c70c48957a0d4bd5fc792d47f1dcc9dfd76ceecd1e0d80957,2025-06-05T20:12:23.777000 -CVE-2025-5649,0,1,8d1f3267e39f86a1983625a80d2b4086de30c2bb535ef4e2d4852137479dd55a,2025-06-10T15:05:56.120000 -CVE-2025-5650,0,1,c41210387d1002531a8860804a9f5e98813d1f3f1969221163975f35d5b4da41,2025-06-10T15:05:23.553000 -CVE-2025-5651,0,1,8e2ba335e9f679e1e13ecfad2970cda4293dff1df4ddceda19e1edcaba8ca630,2025-06-10T15:05:12.920000 +CVE-2025-5649,0,0,8d1f3267e39f86a1983625a80d2b4086de30c2bb535ef4e2d4852137479dd55a,2025-06-10T15:05:56.120000 +CVE-2025-5650,0,0,c41210387d1002531a8860804a9f5e98813d1f3f1969221163975f35d5b4da41,2025-06-10T15:05:23.553000 +CVE-2025-5651,0,0,8e2ba335e9f679e1e13ecfad2970cda4293dff1df4ddceda19e1edcaba8ca630,2025-06-10T15:05:12.920000 CVE-2025-5652,0,0,0724d88b1f9ce21bc0e0832801cf9e7e7f74020843d83266b3b7dd809f5e6ba7,2025-06-06T18:31:53.513000 -CVE-2025-5653,0,1,da755ba8339a98f5c3056c961e1098d96885507356387524c7f4efd0d31177f8,2025-06-10T15:05:01.687000 -CVE-2025-5654,0,1,aad7b406341fca3d2be283c7d4299523b9fa233ab63b2831170e20e228761ade,2025-06-10T15:04:45.870000 -CVE-2025-5655,0,1,131fe07f8fa27963687df1fc758ddb8b8d91c8d717ac28a37f70ed3c2fc60910,2025-06-10T15:02:37.133000 -CVE-2025-5656,0,1,3276fc083aa98f37e9b6a378e4791813d4ee484c57e5ac0c182774deb34fdd3b,2025-06-10T15:02:24.890000 -CVE-2025-5657,0,1,9a8b4caa2f505a19f56e020f35264a9f6906930cb113489e09f861441ab57f5f,2025-06-10T15:02:14.293000 -CVE-2025-5658,0,1,34516b29cf10eeba1bcf5853f6a1ed2cecd0392d82eb87eea008132056b82722,2025-06-10T15:02:02.407000 +CVE-2025-5653,0,0,da755ba8339a98f5c3056c961e1098d96885507356387524c7f4efd0d31177f8,2025-06-10T15:05:01.687000 +CVE-2025-5654,0,0,aad7b406341fca3d2be283c7d4299523b9fa233ab63b2831170e20e228761ade,2025-06-10T15:04:45.870000 +CVE-2025-5655,0,0,131fe07f8fa27963687df1fc758ddb8b8d91c8d717ac28a37f70ed3c2fc60910,2025-06-10T15:02:37.133000 +CVE-2025-5656,0,0,3276fc083aa98f37e9b6a378e4791813d4ee484c57e5ac0c182774deb34fdd3b,2025-06-10T15:02:24.890000 +CVE-2025-5657,0,0,9a8b4caa2f505a19f56e020f35264a9f6906930cb113489e09f861441ab57f5f,2025-06-10T15:02:14.293000 +CVE-2025-5658,0,0,34516b29cf10eeba1bcf5853f6a1ed2cecd0392d82eb87eea008132056b82722,2025-06-10T15:02:02.407000 CVE-2025-5659,0,0,2e9f4a0e418de16bd3132ecd2481fb9b9879d63feb5400e7c03179d6af45fcfd,2025-06-06T18:42:31.650000 CVE-2025-5660,0,0,d49a54f32a97bad23440ace013a3dd27ada7eeb7c7e0a58f71ba52213e92aef2,2025-06-06T18:42:59.143000 -CVE-2025-5661,0,1,7e502153d7a836b77d682dac6d289f32a14d88d9c5aeae7159e1d1ad3f0abe74,2025-06-10T15:01:52.660000 +CVE-2025-5661,0,0,7e502153d7a836b77d682dac6d289f32a14d88d9c5aeae7159e1d1ad3f0abe74,2025-06-10T15:01:52.660000 CVE-2025-5663,0,0,8c93d873d2b9bcbc305e1d9b46e20f6f681f336f769ee36ddc277777629edd2b,2025-06-06T18:43:14.380000 CVE-2025-5664,0,0,30931b2c13042b11b7b60910daf38207426745862a59590cdb56b739bd04f24b,2025-06-05T20:12:23.777000 CVE-2025-5665,0,0,4af9267cc3c4d7515d0da96e1aabaa9d1714f2d5d087787bb7acb55bd95581eb,2025-06-05T20:12:23.777000 @@ -297113,12 +297227,12 @@ CVE-2025-5677,0,0,e1fd2dd1f7c92e781313ec950251f1d358d151486fbb0cb8bc3c7bf097d9eb CVE-2025-5679,0,0,39a76065dd3011f556df8ecc5c1607529488c249cbea269aa42dbb97296654d5,2025-06-05T20:12:23.777000 CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000 CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000 -CVE-2025-5685,0,1,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000 +CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000 CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000 CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000 CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000 -CVE-2025-5693,0,1,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000 -CVE-2025-5694,0,1,903ae591483b4ac578a133192ea3d236171a92fe2d64e5248fd0b8468b1bbb6b,2025-06-10T15:01:17.830000 +CVE-2025-5693,0,0,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000 +CVE-2025-5694,0,0,903ae591483b4ac578a133192ea3d236171a92fe2d64e5248fd0b8468b1bbb6b,2025-06-10T15:01:17.830000 CVE-2025-5695,0,0,7094b4120ee2ce6d44d7f2cafe37e005429014ebc9c4db1ea27e4df48b79768f,2025-06-06T14:07:28.330000 CVE-2025-5696,0,0,b4091ee0fb4fa532c5f66065f45fdcbfe956ac564f6752fbce6c2f5c6e7f4f40,2025-06-06T14:07:28.330000 CVE-2025-5697,0,0,e16a3d80fb06f7ce0327380d6c48a4da47ce2498c4d874e03daa95c5a77d2485,2025-06-06T14:07:28.330000 @@ -297127,30 +297241,30 @@ CVE-2025-5699,0,0,0a1565e1ee571962b106c0d60bfe684a5661c8b79bdbf83ccaf5e242dffe56 CVE-2025-5701,0,0,873890d0d7ee46e4c64243a1f1cf0740948dafdadf78be33a983ccdb225e9602,2025-06-05T20:12:23.777000 CVE-2025-5702,0,0,f4b41a5876bf80125fd2f1b602bb755c8f57b5d1f34dfd56969670098c786271,2025-06-05T21:15:22.873000 CVE-2025-5703,0,0,94709a108b8c052e235b42f888b0029894770c90f72ee62feea2d3d3af8ba023,2025-06-06T14:07:28.330000 -CVE-2025-5704,0,1,61fe4f717ffdd3e0bc072a12abde42d2539cecd476b9e983237a0d42ed39dc33,2025-06-10T15:01:10.223000 -CVE-2025-5705,0,1,8ff08853967923c427f10758ae4c72d50f3b210b4cfdb6cdf6fbd9f63adb1180,2025-06-10T15:00:58.353000 -CVE-2025-5706,0,1,9d7f0141a03d4502cbb4d4252bbc40c9de34ec797701479b234eabd5e8f45719,2025-06-10T15:00:39.853000 -CVE-2025-5707,0,1,03768732beb04d3dc090bc4628ded395b001fd130d28c1cae9e85e78d6c565e8,2025-06-10T15:00:28.237000 -CVE-2025-5708,0,1,285708e0c4c2d406128211f3ff463fc512ae1852a2098261d0842fc5090a27ba,2025-06-10T15:00:17.787000 -CVE-2025-5709,0,1,c194837df8957976fdf65b0a79b8ad4ab8ba025b71104af1ea83e4fe3936ff0d,2025-06-10T15:00:06.023000 -CVE-2025-5710,0,1,22d317274e29d58e8d0f080c3cbfb50424283196345fb5d5b671f6ecde0eba5b,2025-06-10T14:59:55.803000 -CVE-2025-5711,0,1,4e07d34f832c4a98bdc02eca84c69019cff401001befb4bad883e986f4062c5b,2025-06-10T14:59:46.313000 -CVE-2025-5712,0,1,cc03dc4f81a3344fe3967f9bdb8ddbd63656043638502f28d99f01c002367d7d,2025-06-10T15:46:43.267000 +CVE-2025-5704,0,0,61fe4f717ffdd3e0bc072a12abde42d2539cecd476b9e983237a0d42ed39dc33,2025-06-10T15:01:10.223000 +CVE-2025-5705,0,0,8ff08853967923c427f10758ae4c72d50f3b210b4cfdb6cdf6fbd9f63adb1180,2025-06-10T15:00:58.353000 +CVE-2025-5706,0,0,9d7f0141a03d4502cbb4d4252bbc40c9de34ec797701479b234eabd5e8f45719,2025-06-10T15:00:39.853000 +CVE-2025-5707,0,0,03768732beb04d3dc090bc4628ded395b001fd130d28c1cae9e85e78d6c565e8,2025-06-10T15:00:28.237000 +CVE-2025-5708,0,0,285708e0c4c2d406128211f3ff463fc512ae1852a2098261d0842fc5090a27ba,2025-06-10T15:00:17.787000 +CVE-2025-5709,0,0,c194837df8957976fdf65b0a79b8ad4ab8ba025b71104af1ea83e4fe3936ff0d,2025-06-10T15:00:06.023000 +CVE-2025-5710,0,0,22d317274e29d58e8d0f080c3cbfb50424283196345fb5d5b671f6ecde0eba5b,2025-06-10T14:59:55.803000 +CVE-2025-5711,0,0,4e07d34f832c4a98bdc02eca84c69019cff401001befb4bad883e986f4062c5b,2025-06-10T14:59:46.313000 +CVE-2025-5712,0,0,cc03dc4f81a3344fe3967f9bdb8ddbd63656043638502f28d99f01c002367d7d,2025-06-10T15:46:43.267000 CVE-2025-5713,0,0,c84c8e527e1e1ce551be7423c38700a2e4568d28a15333ae5f635f2da6f31b6e,2025-06-09T14:15:24.137000 CVE-2025-5714,0,0,ff52588f054097f6df772f82bd45720edb355d0a72aec85dab4d3d114fcbcde3,2025-06-09T14:15:24.267000 CVE-2025-5715,0,0,7324db0938d9f10031910e863ebb33dc85accdfa4870fba818e50640ef364409,2025-06-09T14:15:24.393000 -CVE-2025-5716,0,1,6a5127e87ccd7451fa359eddd1f1ca976ee41f17387602fe9c45af694962a531,2025-06-10T15:46:32.377000 +CVE-2025-5716,0,0,6a5127e87ccd7451fa359eddd1f1ca976ee41f17387602fe9c45af694962a531,2025-06-10T15:46:32.377000 CVE-2025-5719,0,0,d3af06b820cdad24cc8d7026b71cb63ac7f0ce0ec68aa1331bcfd408efaf53ba,2025-06-06T14:07:28.330000 -CVE-2025-5721,0,1,4ddda3f968a454880e1d4d2d60023785a79773dd304728c3bc99e6ee61607aec,2025-06-10T15:47:37.680000 -CVE-2025-5722,0,1,a7964efdc18e4bc1beb90ac824e1664e0c0a375d14ff32bc06365c8e32501d90,2025-06-10T14:59:17.903000 -CVE-2025-5723,0,1,11184ab3f208a19ce9c996ab3c00255c3f0c3b34e98627e17f79e3e19d7339cc,2025-06-10T14:59:02.027000 -CVE-2025-5724,0,1,b93d22dab9afa1f68385eee755304a67801f5b23d8977eabf56f075a28484c02,2025-06-10T14:58:46.713000 -CVE-2025-5725,0,1,50b90d1f6262d6199a4112ec7f62ca2f6a6af71fa34d8c551ddb2ea5f71b3cf8,2025-06-10T14:58:33.113000 +CVE-2025-5721,0,0,4ddda3f968a454880e1d4d2d60023785a79773dd304728c3bc99e6ee61607aec,2025-06-10T15:47:37.680000 +CVE-2025-5722,0,0,a7964efdc18e4bc1beb90ac824e1664e0c0a375d14ff32bc06365c8e32501d90,2025-06-10T14:59:17.903000 +CVE-2025-5723,0,0,11184ab3f208a19ce9c996ab3c00255c3f0c3b34e98627e17f79e3e19d7339cc,2025-06-10T14:59:02.027000 +CVE-2025-5724,0,0,b93d22dab9afa1f68385eee755304a67801f5b23d8977eabf56f075a28484c02,2025-06-10T14:58:46.713000 +CVE-2025-5725,0,0,50b90d1f6262d6199a4112ec7f62ca2f6a6af71fa34d8c551ddb2ea5f71b3cf8,2025-06-10T14:58:33.113000 CVE-2025-5726,0,0,617aad9a8853ccfe2921b474109c58f51a6c761fa5a93e6ced4980b6cc6fd3ae,2025-06-06T14:07:28.330000 CVE-2025-5727,0,0,eabd3f4195be577c366171af27add08fb1cbf3b0847e8c043b4505610ec7187e,2025-06-06T14:07:28.330000 -CVE-2025-5728,0,1,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000 +CVE-2025-5728,0,0,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000 CVE-2025-5729,0,0,e4496e2ef853aa19924d8ea59da09547edb389972468d1750a85a5b387d74db8,2025-06-09T13:15:24.277000 -CVE-2025-5732,0,1,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000 +CVE-2025-5732,0,0,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000 CVE-2025-5733,0,0,f9414f378c72883d276dec17aff75405246e3e34329518fe5887772f8c216d63,2025-06-06T14:07:28.330000 CVE-2025-5734,0,0,81db6ecaa2a330086e45d900f736563966e5de0eb1d315c7daba46bc2cd74caa,2025-06-06T14:07:28.330000 CVE-2025-5735,0,0,8d0103ffa8acdd7bdc427c0ade475eb00f65ea47ec4c25b162f49ca576d312ab,2025-06-06T14:07:28.330000 @@ -297168,26 +297282,26 @@ CVE-2025-5748,0,0,b761ade174b0cc8fcfa37b7bf22c809e0fbc46ef538ca5441f6bcf38746a2c CVE-2025-5749,0,0,2acdc5934ddc07f2fae85bef8a4374f26ddda9b56d85fb729428cb8631784aa0,2025-06-09T12:15:47.880000 CVE-2025-5750,0,0,646c631d9c514f468fff0f4160ac8169075fcfbd4ea661785f21ee9043cdb606,2025-06-09T12:15:47.880000 CVE-2025-5751,0,0,23d09c43fb68d6574ce1c145de5cc00dbd740af4044f3203a46a17e73c0d72a6,2025-06-09T12:15:47.880000 -CVE-2025-5755,0,1,683d03a310dee20dfc4c0c492307fcdf50f379083e65a890885b5d7593fe9e0c,2025-06-10T15:46:20.973000 +CVE-2025-5755,0,0,683d03a310dee20dfc4c0c492307fcdf50f379083e65a890885b5d7593fe9e0c,2025-06-10T15:46:20.973000 CVE-2025-5756,0,0,983cab85761c36f1e1ac2363ae99121e28a102ce2360578e9cd88c0e790262ab,2025-06-06T14:07:28.330000 CVE-2025-5757,0,0,135c18e20d949031e9ce20b6a79d8818b9e53edc58f52d0f7788e7c2403d1718,2025-06-06T14:07:28.330000 -CVE-2025-5758,0,1,bce5afb4f21a287bf92575e93baec895e704f60501a807e104b04218775a5539,2025-06-10T15:46:05.007000 -CVE-2025-5759,0,1,dd26a21c310951f8c8cb21cdb2671617f7b1d86adbd58fa9e740fe83e3e4b93b,2025-06-10T14:57:42.917000 +CVE-2025-5758,0,0,bce5afb4f21a287bf92575e93baec895e704f60501a807e104b04218775a5539,2025-06-10T15:46:05.007000 +CVE-2025-5759,0,0,dd26a21c310951f8c8cb21cdb2671617f7b1d86adbd58fa9e740fe83e3e4b93b,2025-06-10T14:57:42.917000 CVE-2025-5760,0,0,264b625ff0aed0d36bd2f34c00b500f47e8637a884732813c7f4bc5752a68537,2025-06-06T14:06:58.193000 -CVE-2025-5761,0,1,6b08df0b4cbd80fdbb3f973140f0a6f8c80c4fba2be5f89a23b8b1009035568d,2025-06-10T14:57:30.623000 -CVE-2025-5762,0,1,98845990a3f86d908111d51ee73a3e155d48f6275d2246a68a11e0b27e9aa30f,2025-06-10T14:57:14.800000 -CVE-2025-5763,0,1,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648add5,2025-06-10T14:55:49.067000 +CVE-2025-5761,0,0,6b08df0b4cbd80fdbb3f973140f0a6f8c80c4fba2be5f89a23b8b1009035568d,2025-06-10T14:57:30.623000 +CVE-2025-5762,0,0,98845990a3f86d908111d51ee73a3e155d48f6275d2246a68a11e0b27e9aa30f,2025-06-10T14:57:14.800000 +CVE-2025-5763,0,0,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648add5,2025-06-10T14:55:49.067000 CVE-2025-5764,0,0,4f2c6876d92b5bb3c9e709af486cd2fb98e24b69cec52614390a76a0be759650,2025-06-06T14:06:58.193000 CVE-2025-5765,0,0,cc7be56634c2f62cd8fdc8fbbfe917fe4b28ac465d14d0ac5a2db8b97fa56654,2025-06-06T14:06:58.193000 CVE-2025-5766,0,0,3f1ef799b1969b022c2537aba595576f00ea36d744373bc3641b8077757e92ee,2025-06-06T14:06:58.193000 CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000 CVE-2025-5779,0,0,9f50a78d552e33c5e0febe1891ee20155e9d5a17d0263584475829dac430dfc4,2025-06-09T12:15:47.880000 CVE-2025-5780,0,0,49469915e6c1514d41c901b198058eedaf34c45323a42d8f18373908581b8627,2025-06-09T13:15:25.197000 -CVE-2025-5782,0,1,6972da12d61c944fe4bbea6f93b44a377d32b8a94e64404a2e1a04e310f27128,2025-06-10T15:42:31.557000 -CVE-2025-5783,0,1,ad3b4fbba1e09b73bf21fedfd9854dfacbc53263d6cf28fde257534a31faeedc,2025-06-10T15:42:17.287000 -CVE-2025-5784,0,1,e09538ed3fb443c9b7bf4475803950b33e688b0670f3753325c659e87e3e11ff,2025-06-10T14:56:59.937000 -CVE-2025-5785,0,1,bed468c76f00e36e796a823df55cc8ba5b8001ab8cd4a0bc3ebd1b409037ea2f,2025-06-10T14:56:41.397000 -CVE-2025-5786,0,1,cba78e3d1605d0575de2eda7ef0114839aba755a1d173d5fef8167822e753f46,2025-06-10T14:56:32.553000 +CVE-2025-5782,0,0,6972da12d61c944fe4bbea6f93b44a377d32b8a94e64404a2e1a04e310f27128,2025-06-10T15:42:31.557000 +CVE-2025-5783,0,0,ad3b4fbba1e09b73bf21fedfd9854dfacbc53263d6cf28fde257534a31faeedc,2025-06-10T15:42:17.287000 +CVE-2025-5784,0,0,e09538ed3fb443c9b7bf4475803950b33e688b0670f3753325c659e87e3e11ff,2025-06-10T14:56:59.937000 +CVE-2025-5785,0,0,bed468c76f00e36e796a823df55cc8ba5b8001ab8cd4a0bc3ebd1b409037ea2f,2025-06-10T14:56:41.397000 +CVE-2025-5786,0,0,cba78e3d1605d0575de2eda7ef0114839aba755a1d173d5fef8167822e753f46,2025-06-10T14:56:32.553000 CVE-2025-5787,0,0,33fdb7d532b54bc886ec0cf9d76d17f2a503e91b7267fc08e8c1631a963666fb,2025-06-09T19:08:58.440000 CVE-2025-5788,0,0,5c9d545164898c3673eb6f06204dd5f33e9abe63ac09e547a32bdcf2699ef525,2025-06-09T19:08:51.570000 CVE-2025-5789,0,0,8b809b671f8113715e0d2812467dae263d8678ce3a42e39c50772fb525e79544,2025-06-09T19:08:42.200000 @@ -297205,9 +297319,9 @@ CVE-2025-5806,0,0,eced74af9a3bd847a96fe591b592713a189dcd85d66bd43936ab31bd4aa88a CVE-2025-5814,0,0,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000 CVE-2025-5836,0,0,d80bb6457241c6112de58f50d5f8d524854cb0ce4d9b0e26a6df5eac567f78ac,2025-06-09T19:07:49.417000 CVE-2025-5837,0,0,85c1936a3a1142d6d72d779afcb63f2a00a18b124b5cff42b89badcdc2313d9c,2025-06-09T19:07:41.590000 -CVE-2025-5838,0,1,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b08,2025-06-10T14:56:21.530000 +CVE-2025-5838,0,0,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b08,2025-06-10T14:56:21.530000 CVE-2025-5839,0,0,af2c1c6da3fb5a22931f1ffebd67420dd5150792d38533d6eb8686e18f591276,2025-06-09T19:07:34.470000 -CVE-2025-5840,0,1,a1906b279632ca933a71469d14d9b22734a373c8dc4ebaee1a55c4351d13760a,2025-06-10T15:45:31.043000 +CVE-2025-5840,0,0,a1906b279632ca933a71469d14d9b22734a373c8dc4ebaee1a55c4351d13760a,2025-06-10T15:45:31.043000 CVE-2025-5847,0,0,72a670a977f930c072e82981d9be0647255328c3124df63dafd15061a72168a9,2025-06-09T19:04:55.580000 CVE-2025-5848,0,0,97a77699d44911bbc0f7dbb24d5b37ad7d0974431c5e2858413f0642987e5a7c,2025-06-09T19:04:50.113000 CVE-2025-5849,0,0,0056fe9cb36cc640911c965de99076fd3871906072eb39fce82181a9d0f80791,2025-06-09T19:04:44.777000 @@ -297217,9 +297331,9 @@ CVE-2025-5852,0,0,0a2fdf4da0a01421d9fa71dc34f0132d5d6b40cb14bb02ddc73b60a3b1b65d CVE-2025-5853,0,0,3b7a3b76340110cb86de73e9a462cb084a25b4297584faeeda4076711dabaebd,2025-06-09T19:04:03.967000 CVE-2025-5854,0,0,273befbf12797584cc9facbf57feeb0f4f9cdcb1cb1ee1a8d5b09d5c3ad6a192,2025-06-09T19:03:46.770000 CVE-2025-5855,0,0,d5282fd79c1cadea7a65690d1ae6cb55cd80e999a15b0f7f5d35aa82bc524845,2025-06-09T19:03:39.630000 -CVE-2025-5856,0,1,31b9f2d310454a1662adf314e490057e70c37b8d17c82c3f26fd322fd7e55f86,2025-06-10T14:56:12.723000 +CVE-2025-5856,0,0,31b9f2d310454a1662adf314e490057e70c37b8d17c82c3f26fd322fd7e55f86,2025-06-10T14:56:12.723000 CVE-2025-5857,0,0,cfeb535dbe9bc7d8d6ebf4be16cdf2e4637ec03ad9f0cb2fa366af4a9836b331,2025-06-09T12:15:47.880000 -CVE-2025-5858,0,1,3d6c23279016328dc507c63b7ac19e83b3b1b7a1766f7e389a1fd50c4b486a61,2025-06-10T14:55:58.620000 +CVE-2025-5858,0,0,3d6c23279016328dc507c63b7ac19e83b3b1b7a1766f7e389a1fd50c4b486a61,2025-06-10T14:55:58.620000 CVE-2025-5859,0,0,3424c8609b984051738702bad682f63bb4a253c66b33631b1110b9ea5c523815,2025-06-09T19:03:29.737000 CVE-2025-5860,0,0,98b6d02b7a56e80747f95a140e65963ddf24738288c1bbe6bf1fa28b310dece5,2025-06-09T19:03:16.047000 CVE-2025-5861,0,0,1431f1040bf1b34a1b2d7e2cdf36e30a25b9488675016843791967883e0eef12,2025-06-09T19:03:01.067000 @@ -297244,7 +297358,7 @@ CVE-2025-5880,0,0,391ef7c96b0d70d3c1236374a2bb4d81a37bc1b637881945e5debe7ba99a2f CVE-2025-5881,0,0,5eb4bf7442e35d74dc490267704b35dfdada119b0d68aea9f4cd8d5d2f28ed28,2025-06-09T14:15:27.503000 CVE-2025-5884,0,0,59f697ab8d23b519d31c72c30457b66f068a4c6df1e63f817cac6e20faedb5ca,2025-06-09T15:15:33.173000 CVE-2025-5885,0,0,bca2d2871b63dd6eccf4504f84b7c81750e56a52a9d6586fb746c58736eec613,2025-06-09T15:15:33.397000 -CVE-2025-5886,0,1,57f3fe000a27ba71a3c9ab8b5a9188dfe28750cdcdddec173aef81c271bb4a71,2025-06-10T14:15:31.160000 +CVE-2025-5886,0,0,57f3fe000a27ba71a3c9ab8b5a9188dfe28750cdcdddec173aef81c271bb4a71,2025-06-10T14:15:31.160000 CVE-2025-5887,0,0,5136919542c2b0d6efd89daa4797cf9dc684ce484d0bee313edcf2d161ac9cfb,2025-06-09T20:15:25.013000 CVE-2025-5888,0,0,8ae86dc91bfbb19db8069a50148c81b6ef6ab94e58e8b25cf50a4393802ed91e,2025-06-09T18:15:27.873000 CVE-2025-5889,0,0,12866cc0cd082a7151f1e5bf29dd88d934d59269df384abc8b0144c010419bd3,2025-06-09T19:15:25.460000 @@ -297253,26 +297367,26 @@ CVE-2025-5891,0,0,d1b139b281160bbb253ff7821b55cbfd2c048c282b2fd4ee6f3798db59ba46 CVE-2025-5892,0,0,ef651ac9f964b6d5d0e2d2ef95a783ff216013027d6f33862f90d2f4c4f6bc6f,2025-06-09T20:15:25.377000 CVE-2025-5893,0,0,9044103ccb721af522b7b387bafda018ab5a7cc573ffd5677a8174274eea2d77,2025-06-09T12:15:47.880000 CVE-2025-5894,0,0,654242cace97981f86dd5829ceaa9ac008f0c3374b73eef1c99cc2c32cf2e65d,2025-06-09T12:15:47.880000 -CVE-2025-5895,0,0,c6e4185df93ec71c290d1297e23624cb6c7281ee8d109da1434f874f78f613b2,2025-06-09T20:15:25.890000 -CVE-2025-5896,0,0,60e8b583acf869ca7196943fa8b43ab76054382ca45e05f2e85ddaeb58922466,2025-06-09T21:15:47.517000 -CVE-2025-5897,0,0,6ba518894d0e57a77d37b1420811a6c6aed816ec1e63b75c7cfbf61d80aa051f,2025-06-09T21:15:47.707000 -CVE-2025-5898,0,0,cce039980166689a3acddc08d6acf70174a79615ac9d44ba32eeb021665ac413,2025-06-09T22:15:22.327000 -CVE-2025-5899,0,0,6fc7e077ed900ce38ad161acad8813d50033b2c9b5fa8abbaa53775be2e7228c,2025-06-09T22:15:22.557000 -CVE-2025-5900,0,0,930444d7eeb3b1ddd8b8ac3981a77be2d0faef64341ce026a26222e796099745,2025-06-09T22:15:22.790000 -CVE-2025-5901,0,0,82dbf68b7853fd88172f4ff0ab8f21b89e4d8a17877df01445ce4727961959d0,2025-06-09T23:15:22.433000 -CVE-2025-5902,0,0,9babf0453954c075cf5597a7430a1c71b03244df31f2828e4e3b0b0c3cc0dc9b,2025-06-09T23:15:22.617000 -CVE-2025-5903,0,0,f0e66e1274fe9208f52179ff8e87a1b9dffe6bdbd486c2e3eb77086bd9a74b46,2025-06-10T00:15:22.243000 -CVE-2025-5904,0,0,32aad757bab1a3ced172091134f849188d9b452ade8ed80bcf453849be87415c,2025-06-10T00:15:22.453000 -CVE-2025-5905,0,0,4640c69ee55ba9dd6382404c2da278693c59fedc07931752dc25ae9a7fc40a6d,2025-06-10T00:15:22.653000 -CVE-2025-5906,0,0,aa989b7dcccb5c034fc1eea8eff37f01bc4327bb2f6ad2c0f749ad5ccfddb4ac,2025-06-10T01:15:23.720000 -CVE-2025-5907,0,0,5d329676c8670997ed9bbd9ec920c44010fa9710ac335febffe90162e564e157,2025-06-10T01:15:23.963000 -CVE-2025-5908,0,0,37a781f179b1660861001bee4d6c7fb2b67dae046e6af7975b6ededfbac21b41,2025-06-10T01:15:24.167000 -CVE-2025-5909,0,0,ab669f12f4fae3bd2f0735d7b1e7ccb7a4a13f9471f08d5428635b990107078e,2025-06-10T02:15:21.007000 -CVE-2025-5910,0,0,715eda73591903f377a983344c94f5b98f27bef425aa0c6a6a65f0932e6208e0,2025-06-10T03:15:38.583000 -CVE-2025-5911,0,1,4ba655ae4b29dcb3761f35ad70f52e4de8492ae7a7e0f3e3df2623f260a76756,2025-06-10T14:15:31.300000 +CVE-2025-5895,0,1,2805ee26fcea15e949ea0f6a32545f6a203a5f785f130074e6cf9e3e65e8b69f,2025-06-10T16:15:43.003000 +CVE-2025-5896,0,1,44e34bbdd2cad1b17011984eb11e2a95afecf2a2cd6a5d6d6548f63f4c287f9a,2025-06-10T16:15:43.133000 +CVE-2025-5897,0,1,d835e648084cef9db3ca9776ce36479baef7994ae9177f21d4d13287f5e7f84d,2025-06-10T16:15:43.257000 +CVE-2025-5898,0,1,56f60c65c1c4945806389ad0e3d3592c0a9202036d155785d30893c3ab9271a3,2025-06-10T16:15:43.380000 +CVE-2025-5899,0,1,2549164c7c43ee1b418f146d69edbe121056202dea562aafe21bdbc01b92797c,2025-06-10T16:15:43.510000 +CVE-2025-5900,0,1,09ea241a96c3dce6c16bee581e957dd2fba694505b79b795ecba56a96a40a471,2025-06-10T16:15:43.627000 +CVE-2025-5901,0,1,d26af478bef278aaebc37df503f9d55e5d3f4b4668cdb464d7afbee61209d792,2025-06-10T16:15:43.753000 +CVE-2025-5902,0,1,3e6a22193a70317e1e44f3c4243614ff0d17590b47f7a7d88bd1811b9a20f7eb,2025-06-10T16:15:43.877000 +CVE-2025-5903,0,1,20f9d9a1400b0c746f19b3f6f591cfe6114c8f26a47506fa8a933eeb2d4442ab,2025-06-10T16:15:44 +CVE-2025-5904,0,1,e6e7a91639974a635ff9db654b49c61b0710e7a53fb18c3a5d4b8b93d37f27ee,2025-06-10T16:15:44.140000 +CVE-2025-5905,0,1,4cde8d92c78bd16b67cdb1593c9380ee1eefebba87fefba832d4967aec1d03ac,2025-06-10T16:15:44.870000 +CVE-2025-5906,0,1,21b5328edc9b9293128d3fca7eaac7c020e8098b43f0e687bc00cbfe6d6f04dc,2025-06-10T16:15:44.993000 +CVE-2025-5907,0,1,7f545a6b62ff0b8f2808d954da6d49032a7cffcab32e45d6f011c277f76adc6a,2025-06-10T16:15:45.127000 +CVE-2025-5908,0,1,c14a9a97cee85aae6ce478ee762b492b286b4dd8ee97409417cd5dcc1155335a,2025-06-10T16:15:45.247000 +CVE-2025-5909,0,1,8527f37a449e957be8b65446fd47135cc06dac87540a0ed061b4c4a057d4fa27,2025-06-10T16:15:45.370000 +CVE-2025-5910,0,1,5326464b440b7208487e555dd26da94e8b66d8b83ebb7ec538c23f88b0ef6b74,2025-06-10T16:15:45.490000 +CVE-2025-5911,0,0,4ba655ae4b29dcb3761f35ad70f52e4de8492ae7a7e0f3e3df2623f260a76756,2025-06-10T14:15:31.300000 CVE-2025-5912,0,0,fc829098fb36c572f42bd3ad43b84104ffd43f9edbc3a07bb8f8f65b641b7584,2025-06-10T13:15:24.117000 CVE-2025-5913,0,0,f23d22995ace860f4eedc70184b3f124f503628f51322e84608328c1fe143107,2025-06-10T13:15:24.380000 -CVE-2025-5914,0,0,ca2950efdb51e21bbb1b52a25d765df8575e0ffa29446d96c03c3ef2bb78c27f,2025-06-09T20:15:26.123000 +CVE-2025-5914,0,1,58fc778a65b9bedfe4ef0457de66d3468023427fed59a7d0b47b0613b352c955,2025-06-10T16:15:45.610000 CVE-2025-5915,0,0,0e67ccac333c7a11c03869b01cbfabaf1cb283cb5a64338a4f2ca5aab164415e,2025-06-09T20:15:26.317000 CVE-2025-5916,0,0,de33dac47619c4e1d912727e7eb0e9fccd9c7c67167013ac3aa335bd776c0a9e,2025-06-09T20:15:27.170000 CVE-2025-5917,0,0,479e3dcc90af3e8467020be4388f622f5adbb9e240dc38ecb4cf9119d478c05a,2025-06-09T20:15:27.330000 @@ -297281,4 +297395,6 @@ CVE-2025-5925,0,0,573daaf55ea018a58bf2bd7e92cad13cf577779f7064f5ad7d1f8de96931b7 CVE-2025-5934,0,0,6e6b56247e88c88b3883e91849581fe9fb4286ffb99dfd632c90d49eafeb498f,2025-06-10T13:15:24.570000 CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2cd,2025-06-10T05:15:22.780000 CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 -CVE-2025-5952,0,0,f3a4e649f505b0fd93baf65191971ffe21485a7c802124ab53f303aeb8bcf467,2025-06-10T05:15:23.023000 +CVE-2025-5952,0,1,89b97adc3e12e17ca18b9484f2cc0cbac7f8ea34e27cce81e859e2ad09b23e1a,2025-06-10T16:15:45.717000 +CVE-2025-5969,1,1,0cb5f1eef226658325ae1059818aba7cb4928688bc7acca6d60e3f96dc260577,2025-06-10T17:25:20.293000 +CVE-2025-5970,1,1,d7c94f11149aa2d1fa422037b5710258375a5e88a21be20512abe255cca0c035,2025-06-10T17:25:24.033000