From 662786889da6df46567b5e66d129e86758295af6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 3 Jun 2025 10:03:54 +0000 Subject: [PATCH] Auto-Update: 2025-06-03T10:00:19.496425+00:00 --- CVE-2024/CVE-2024-05xx/CVE-2024-0579.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1725.json | 60 +++++++++++ CVE-2025/CVE-2025-414xx/CVE-2025-41428.json | 104 ++++++++++++++++++++ CVE-2025/CVE-2025-44xx/CVE-2025-4420.json | 68 +++++++++++++ CVE-2025/CVE-2025-463xx/CVE-2025-46355.json | 104 ++++++++++++++++++++ CVE-2025/CVE-2025-51xx/CVE-2025-5103.json | 68 +++++++++++++ CVE-2025/CVE-2025-51xx/CVE-2025-5116.json | 72 ++++++++++++++ README.md | 43 +++----- _state.csv | 58 ++++++----- 9 files changed, 523 insertions(+), 60 deletions(-) create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1725.json create mode 100644 CVE-2025/CVE-2025-414xx/CVE-2025-41428.json create mode 100644 CVE-2025/CVE-2025-44xx/CVE-2025-4420.json create mode 100644 CVE-2025/CVE-2025-463xx/CVE-2025-46355.json create mode 100644 CVE-2025/CVE-2025-51xx/CVE-2025-5103.json create mode 100644 CVE-2025/CVE-2025-51xx/CVE-2025-5116.json diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json index 9a0862b6dc8..e54980549bd 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json @@ -2,13 +2,13 @@ "id": "CVE-2024-0579", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T17:15:08.280", - "lastModified": "2025-06-03T06:15:23.010", + "lastModified": "2025-06-03T09:15:21.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as critical was found in Totolink X2000R 1.0.0-B20221212.1452. Affected by this vulnerability is the function formMapDelDevice of the file /boafrm/formMapDelDevice. The manipulation of the argument macstr/devicemac1/bandstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability classified as critical was found in Totolink X2000R 1.0.0-B20221212.1452. Affected by this vulnerability is the function formMapDelDevice of the file /boafrm/formMapDelDevice. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "es", @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1725.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1725.json new file mode 100644 index 00000000000..28a1ecbb4fc --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1725.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1725", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T09:15:22.487", + "lastModified": "2025-06-03T09:15:22.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/file-manager/tags/6.6.3/backend/app/Http/Controllers/FileManagerController.php#L112", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84ddb481-f989-4ba8-9925-e8327c30de38?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-414xx/CVE-2025-41428.json b/CVE-2025/CVE-2025-414xx/CVE-2025-41428.json new file mode 100644 index 00000000000..ecc16276721 --- /dev/null +++ b/CVE-2025/CVE-2025-414xx/CVE-2025-41428.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-41428", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-06-03T08:15:19.467", + "lastModified": "2025-06-03T08:15:19.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN37075430/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.keiyo-system.co.jp/archives/11310", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4420.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4420.json new file mode 100644 index 00000000000..d389ef93ab9 --- /dev/null +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4420.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-4420", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T09:15:22.673", + "lastModified": "2025-06-03T09:15:22.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018containerWidth\u2019 parameter in all versions up to, and including, 1.3.1 due to a missing capability check on the vayu_blocks_option_panel_callback() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/admin-api.php#L6", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3303594/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/vayu-blocks/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db01bc0a-4508-4fb5-941d-3f1a52528e2b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46355.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46355.json new file mode 100644 index 00000000000..adb81e53426 --- /dev/null +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46355.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-46355", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-06-03T08:15:19.813", + "lastModified": "2025-06-03T08:15:19.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN05562338/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.keiyo-system.co.jp/archives/11305", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5103.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5103.json new file mode 100644 index 00000000000..865c92c9bb4 --- /dev/null +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5103.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-5103", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T09:15:22.840", + "lastModified": "2025-06-03T09:15:22.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ultimate Gift Cards for WooCommerce plugin for WordPress is vulnerable to boolean-based SQL Injection via the 'default_price' and 'product_id' parameters in all versions up to, and including, 3.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woo-gift-cards-lite/tags/3.1.4/admin/class-woocommerce-gift-cards-lite-admin.php#L571", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3303359/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/woo-gift-cards-lite/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e89383-a9c6-4300-970c-0b36e4d97e3d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5116.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5116.json new file mode 100644 index 00000000000..4f9d16fc1ea --- /dev/null +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5116.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-5116", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T09:15:23.007", + "lastModified": "2025-06-03T09:15:23.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP Plugin Info Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018containerid\u2019 parameter in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue is due to an incomplete patch for CVE-2025-31835." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/DLXPlugins/wp-plugin-info-card/blob/dev/php/Shortcodes.php#L893", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-plugin-info-card/trunk/php/Shortcodes.php#L929", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3303791", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/wp-plugin-info-card/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e29ea7dd-14b8-45d3-a87e-3f58de88af4c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d0abe7e215e..73ce0882ec7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-03T08:00:21.997598+00:00 +2025-06-03T10:00:19.496425+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-03T07:15:21.380000+00:00 +2025-06-03T09:15:23.007000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296291 +296297 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `6` -- [CVE-2024-53010](CVE-2024/CVE-2024-530xx/CVE-2024-53010.json) (`2025-06-03T06:15:23.887`) -- [CVE-2024-53013](CVE-2024/CVE-2024-530xx/CVE-2024-53013.json) (`2025-06-03T06:15:24.160`) -- [CVE-2024-53015](CVE-2024/CVE-2024-530xx/CVE-2024-53015.json) (`2025-06-03T06:15:24.350`) -- [CVE-2024-53016](CVE-2024/CVE-2024-530xx/CVE-2024-53016.json) (`2025-06-03T06:15:24.580`) -- [CVE-2024-53017](CVE-2024/CVE-2024-530xx/CVE-2024-53017.json) (`2025-06-03T06:15:24.793`) -- [CVE-2024-53018](CVE-2024/CVE-2024-530xx/CVE-2024-53018.json) (`2025-06-03T06:15:24.963`) -- [CVE-2024-53019](CVE-2024/CVE-2024-530xx/CVE-2024-53019.json) (`2025-06-03T06:15:25.147`) -- [CVE-2024-53020](CVE-2024/CVE-2024-530xx/CVE-2024-53020.json) (`2025-06-03T06:15:25.347`) -- [CVE-2024-53021](CVE-2024/CVE-2024-530xx/CVE-2024-53021.json) (`2025-06-03T06:15:25.560`) -- [CVE-2024-53026](CVE-2024/CVE-2024-530xx/CVE-2024-53026.json) (`2025-06-03T06:15:25.780`) -- [CVE-2025-21463](CVE-2025/CVE-2025-214xx/CVE-2025-21463.json) (`2025-06-03T06:15:25.983`) -- [CVE-2025-21479](CVE-2025/CVE-2025-214xx/CVE-2025-21479.json) (`2025-06-03T07:15:20.933`) -- [CVE-2025-21480](CVE-2025/CVE-2025-214xx/CVE-2025-21480.json) (`2025-06-03T06:15:26.190`) -- [CVE-2025-21485](CVE-2025/CVE-2025-214xx/CVE-2025-21485.json) (`2025-06-03T06:15:26.423`) -- [CVE-2025-21486](CVE-2025/CVE-2025-214xx/CVE-2025-21486.json) (`2025-06-03T06:15:26.590`) -- [CVE-2025-27029](CVE-2025/CVE-2025-270xx/CVE-2025-27029.json) (`2025-06-03T06:15:26.777`) -- [CVE-2025-27031](CVE-2025/CVE-2025-270xx/CVE-2025-27031.json) (`2025-06-03T06:15:26.960`) -- [CVE-2025-27038](CVE-2025/CVE-2025-270xx/CVE-2025-27038.json) (`2025-06-03T06:15:27.133`) -- [CVE-2025-31710](CVE-2025/CVE-2025-317xx/CVE-2025-31710.json) (`2025-06-03T06:15:27.310`) -- [CVE-2025-31711](CVE-2025/CVE-2025-317xx/CVE-2025-31711.json) (`2025-06-03T06:15:27.480`) -- [CVE-2025-31712](CVE-2025/CVE-2025-317xx/CVE-2025-31712.json) (`2025-06-03T06:15:27.613`) -- [CVE-2025-3584](CVE-2025/CVE-2025-35xx/CVE-2025-3584.json) (`2025-06-03T06:15:27.757`) -- [CVE-2025-3662](CVE-2025/CVE-2025-36xx/CVE-2025-3662.json) (`2025-06-03T06:15:27.873`) -- [CVE-2025-4567](CVE-2025/CVE-2025-45xx/CVE-2025-4567.json) (`2025-06-03T06:15:27.983`) +- [CVE-2025-1725](CVE-2025/CVE-2025-17xx/CVE-2025-1725.json) (`2025-06-03T09:15:22.487`) +- [CVE-2025-41428](CVE-2025/CVE-2025-414xx/CVE-2025-41428.json) (`2025-06-03T08:15:19.467`) +- [CVE-2025-4420](CVE-2025/CVE-2025-44xx/CVE-2025-4420.json) (`2025-06-03T09:15:22.673`) +- [CVE-2025-46355](CVE-2025/CVE-2025-463xx/CVE-2025-46355.json) (`2025-06-03T08:15:19.813`) +- [CVE-2025-5103](CVE-2025/CVE-2025-51xx/CVE-2025-5103.json) (`2025-06-03T09:15:22.840`) +- [CVE-2025-5116](CVE-2025/CVE-2025-51xx/CVE-2025-5116.json) (`2025-06-03T09:15:23.007`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -- [CVE-2024-0579](CVE-2024/CVE-2024-05xx/CVE-2024-0579.json) (`2025-06-03T06:15:23.010`) -- [CVE-2025-5086](CVE-2025/CVE-2025-50xx/CVE-2025-5086.json) (`2025-06-03T07:15:21.380`) +- [CVE-2024-0579](CVE-2024/CVE-2024-05xx/CVE-2024-0579.json) (`2025-06-03T09:15:21.340`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6e352bb0d28..f09fcd44633 100644 --- a/_state.csv +++ b/_state.csv @@ -244660,7 +244660,7 @@ CVE-2024-0575,0,0,666db6d006ad62a3798810cdf677ce8703490110d9506ea423387c568d8644 CVE-2024-0576,0,0,ad7a11f1101011fcccc639cc126df4bf996c2095ae6ccfc69cc179008012f4d5,2024-11-21T08:46:55.867000 CVE-2024-0577,0,0,6da93877f20c21635a4796302f324842a4d17e9d36ff795581ac357d18c84502,2024-11-21T08:46:56 CVE-2024-0578,0,0,ee96b899589e161f2fa6ec7b5e57230eca35c9f889dd1f0b522a3b67c1a43964,2024-11-21T08:46:56.177000 -CVE-2024-0579,0,1,677a49b7d30c7028b83fd9c36ee69752436f5bca212b4b6de64a0077657f5d02,2025-06-03T06:15:23.010000 +CVE-2024-0579,0,1,364c5be124a0fa43fcbd1d1c0c59ceb71fea47bc06c30562fd762ed415efb7a4,2025-06-03T09:15:21.340000 CVE-2024-0580,0,0,4f03021d504adea5906d25054a7bdbbeee6b07de5251752c2f6620a9f1d606c3,2024-11-21T08:46:56.453000 CVE-2024-0581,0,0,195cad63f48edfacf562edbfafcc549b51805ce4e6c8c685d59db42934309bf3,2024-11-21T08:46:56.580000 CVE-2024-0582,0,0,a162ed06c8be1ace9eb09441c3e8b77ff26337827cb8ad9e2481a1cd8134a776,2024-11-21T08:46:56.703000 @@ -275139,24 +275139,24 @@ CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a53824 CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a878,2025-01-31T08:15:08.157000 CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000 CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000 -CVE-2024-53010,1,1,05e80b9336fdc1c50cb312accd7cc89807585d871683f92e9d927a217dbf7887,2025-06-03T06:15:23.887000 +CVE-2024-53010,0,0,05e80b9336fdc1c50cb312accd7cc89807585d871683f92e9d927a217dbf7887,2025-06-03T06:15:23.887000 CVE-2024-53011,0,0,43652afa8ecc8ffd9ce037fbbd076ab2370cdb5bab16d27a9d0d522b14d90e39,2025-03-03T13:15:10.853000 CVE-2024-53012,0,0,950d19974b52359043aeababc59a313e37e644d350cda3a38725dd1bbdedcdb2,2025-03-06T17:11:00.953000 -CVE-2024-53013,1,1,cd510110b1073150526050391a1cc6ee7cb7a8a91d59ddb26d9b242f4bc413ca,2025-06-03T06:15:24.160000 +CVE-2024-53013,0,0,cd510110b1073150526050391a1cc6ee7cb7a8a91d59ddb26d9b242f4bc413ca,2025-06-03T06:15:24.160000 CVE-2024-53014,0,0,f46cf9621d7ec0ec27b269342393212a2ff98a2d1e4dee51da1f5926fb7a1566,2025-03-06T17:53:56.627000 -CVE-2024-53015,1,1,37cc064bd332577609694c254fb15fa20c85eb0fef21178639c35fcad4c55644,2025-06-03T06:15:24.350000 -CVE-2024-53016,1,1,2feac6d8cd6615ab27d3380cc5fc5d738cee42637c90303ac85dd67b8de5ef36,2025-06-03T06:15:24.580000 -CVE-2024-53017,1,1,ed87516bf5a529ee3e7953c21dddd393d04878934d335a3c0827381819c6deeb,2025-06-03T06:15:24.793000 -CVE-2024-53018,1,1,8f51d3340d23bfa24acf28d0d13a35ee07b440fdbff190fbf1470f3fa508a3ef,2025-06-03T06:15:24.963000 -CVE-2024-53019,1,1,cc65e156cbbcf29f48c46ceab6c45ab36aab7146cc34a053aba86a13d8329f2d,2025-06-03T06:15:25.147000 +CVE-2024-53015,0,0,37cc064bd332577609694c254fb15fa20c85eb0fef21178639c35fcad4c55644,2025-06-03T06:15:24.350000 +CVE-2024-53016,0,0,2feac6d8cd6615ab27d3380cc5fc5d738cee42637c90303ac85dd67b8de5ef36,2025-06-03T06:15:24.580000 +CVE-2024-53017,0,0,ed87516bf5a529ee3e7953c21dddd393d04878934d335a3c0827381819c6deeb,2025-06-03T06:15:24.793000 +CVE-2024-53018,0,0,8f51d3340d23bfa24acf28d0d13a35ee07b440fdbff190fbf1470f3fa508a3ef,2025-06-03T06:15:24.963000 +CVE-2024-53019,0,0,cc65e156cbbcf29f48c46ceab6c45ab36aab7146cc34a053aba86a13d8329f2d,2025-06-03T06:15:25.147000 CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000 -CVE-2024-53020,1,1,166bcf321332a0ed6b181b60a93edc1c75bd5b1f7c754a3ac824113e243d69ef,2025-06-03T06:15:25.347000 -CVE-2024-53021,1,1,0a13d5ba31f8db766c3eff7346ea8b93a64f92c6e12010e2ebcf350536f60eb7,2025-06-03T06:15:25.560000 +CVE-2024-53020,0,0,166bcf321332a0ed6b181b60a93edc1c75bd5b1f7c754a3ac824113e243d69ef,2025-06-03T06:15:25.347000 +CVE-2024-53021,0,0,0a13d5ba31f8db766c3eff7346ea8b93a64f92c6e12010e2ebcf350536f60eb7,2025-06-03T06:15:25.560000 CVE-2024-53022,0,0,1f7d4cb1a035457938447f797a131050573edd098327d13c971b963b504c0be0,2025-03-06T17:53:45.620000 CVE-2024-53023,0,0,4991d64b52ee6b6149a8df2b655b67d0aa27e520b393b97673b088b92b6768f3,2025-03-07T11:52:53.973000 CVE-2024-53024,0,0,b4367dee590361a0c69d79254e166f98a1f0e0486712b21d3bf0f5dc6c740df6,2025-03-06T17:53:27.780000 CVE-2024-53025,0,0,91a23b9db5f048fda78eaf5cfaceeb7484de79586a4c749acf92fcdc70bf6090,2025-03-06T17:53:18.463000 -CVE-2024-53026,1,1,1dd3ae4644770caf83541bbc335acc5aa13d4ac2a6aa0c5e7184bf76cacf491d,2025-06-03T06:15:25.780000 +CVE-2024-53026,0,0,1dd3ae4644770caf83541bbc335acc5aa13d4ac2a6aa0c5e7184bf76cacf491d,2025-06-03T06:15:25.780000 CVE-2024-53027,0,0,f2775659635233bf71c563784e7075e6cb34f960d73482bad948bc1afe444256,2025-03-06T17:53:06.633000 CVE-2024-53028,0,0,47c1f6c6de706a1a88b64062b39ad64ff81060289fa9ea75185c681384a1860c,2025-03-06T21:16:30.650000 CVE-2024-53029,0,0,9faad4c644d7cc6766182f984eb4dad5985edb2c7f1854e13bd05423a0e71bf3,2025-03-06T18:10:30.300000 @@ -283691,6 +283691,7 @@ CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000 CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000 CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000 +CVE-2025-1725,1,1,484f4f3b008cf8f410d412b639fcc32bd2e1e80b242bac0d03000edf1c5898a4,2025-06-03T09:15:22.487000 CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000 CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000 CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000 @@ -284705,18 +284706,18 @@ CVE-2025-21459,0,0,5c386ebea9ff578717babb7aa51aad849d73bca7cd137939105262b1d5b65 CVE-2025-2146,0,0,9b4f4783eb3d5c38d2a6495db29ef3bd1558c0661d5a4cf523d11e6f32aeaf66,2025-05-28T15:01:30.720000 CVE-2025-21460,0,0,389cc7be8fa099528db069375678ba8c4a64d44cb4ba042b2379ea417e3aa0f3,2025-05-09T19:09:33.447000 CVE-2025-21462,0,0,472fd520000393ead0a178585c5420674292d66900bca0ccacb3268944c15d7e,2025-05-09T19:09:19.660000 -CVE-2025-21463,1,1,eea414ba69f1a4ee5ca75c5097c270c878111730470586c60280c9221d600948,2025-06-03T06:15:25.983000 +CVE-2025-21463,0,0,eea414ba69f1a4ee5ca75c5097c270c878111730470586c60280c9221d600948,2025-06-03T06:15:25.983000 CVE-2025-21467,0,0,ee6894e4cbe2827de5e9551f2468fe4483ae3970632b17da0270579a63a0e452,2025-05-09T19:09:11.167000 CVE-2025-21468,0,0,657db3e9e3b08d3a920f7b517225c72105a802e2c6d292c94318fca052f3a5a0,2025-05-09T19:09:01.703000 CVE-2025-21469,0,0,44a98d2c7da1387889249fd5539f1241bba1748830f946c1d60c946e176d6446,2025-05-09T19:08:51.337000 CVE-2025-2147,0,0,74883129637bc3238403c8977cb3f6a890ade1afe4467a882851a126f0eb8edc,2025-03-24T14:30:40.943000 CVE-2025-21470,0,0,302140affced5624b7926ec75d432b3f98e7a2f5e5c1d9590233b858d4c47845,2025-05-09T19:08:42.713000 CVE-2025-21475,0,0,f2f32195890d4a050cc8c69ec5f14e2e026ddc3e3e1c08b511c44a38ddd17bc2,2025-05-09T19:08:32.710000 -CVE-2025-21479,1,1,329822e0d479abb3de013ec719b36bba16b84e0a5c2b4e1558a8ede6d57e9970,2025-06-03T07:15:20.933000 +CVE-2025-21479,0,0,329822e0d479abb3de013ec719b36bba16b84e0a5c2b4e1558a8ede6d57e9970,2025-06-03T07:15:20.933000 CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000 -CVE-2025-21480,1,1,2bc172d5c108adf01d1e3618c85fbd4950b8129dd6af06d0bf58a8093737dba7,2025-06-03T06:15:26.190000 -CVE-2025-21485,1,1,73010e18ec621a1a17167f907048fc66beee8b9c3599de3cddf72f09ee8387e1,2025-06-03T06:15:26.423000 -CVE-2025-21486,1,1,c5e16de3bcadc7d595ee20023571b8c6f4699e27d552dea8d1e8a4a8eed6c72d,2025-06-03T06:15:26.590000 +CVE-2025-21480,0,0,2bc172d5c108adf01d1e3618c85fbd4950b8129dd6af06d0bf58a8093737dba7,2025-06-03T06:15:26.190000 +CVE-2025-21485,0,0,73010e18ec621a1a17167f907048fc66beee8b9c3599de3cddf72f09ee8387e1,2025-06-03T06:15:26.423000 +CVE-2025-21486,0,0,c5e16de3bcadc7d595ee20023571b8c6f4699e27d552dea8d1e8a4a8eed6c72d,2025-06-03T06:15:26.590000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000 CVE-2025-21490,0,0,b59bfaf73f4a7aac7f498efe2114db1737794c6dd1c56d41aa09f498e00d23bb,2025-04-09T16:06:52.400000 @@ -288991,10 +288992,10 @@ CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d45 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 CVE-2025-27018,0,0,6f3ff57da68756a01cdeb909bf195b378373dad1a9ba319e915b2b92c4fa99b0,2025-03-25T18:15:34.683000 CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000 -CVE-2025-27029,1,1,52ac68a9cdf6220cc18c5e7cbb583d98e66fa0a9fab7cdc377fda1e06ea9860c,2025-06-03T06:15:26.777000 +CVE-2025-27029,0,0,52ac68a9cdf6220cc18c5e7cbb583d98e66fa0a9fab7cdc377fda1e06ea9860c,2025-06-03T06:15:26.777000 CVE-2025-2703,0,0,1cd2ec1071e8a854a09aaa20f8e960bae5b0d0c1a938baebd649e294b60810d4,2025-04-23T14:08:13.383000 -CVE-2025-27031,1,1,f69e1e0dba9ba78d4c6190b5ed5e711fd3643a9a1a5a7fd6ecc0a1e4b91fc55c,2025-06-03T06:15:26.960000 -CVE-2025-27038,1,1,88d4feb7f16c77fd7c2e580cd25cd9480717c650a4769b561f8c00bbba264178,2025-06-03T06:15:27.133000 +CVE-2025-27031,0,0,f69e1e0dba9ba78d4c6190b5ed5e711fd3643a9a1a5a7fd6ecc0a1e4b91fc55c,2025-06-03T06:15:26.960000 +CVE-2025-27038,0,0,88d4feb7f16c77fd7c2e580cd25cd9480717c650a4769b561f8c00bbba264178,2025-06-03T06:15:27.133000 CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000 CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000 CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000 @@ -291629,9 +291630,9 @@ CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bb CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000 CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000 CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000 -CVE-2025-31710,1,1,ecaad9481e1d57e9476d5b38acf524d11a505e34f2e33e4142c9fccd3098be3c,2025-06-03T06:15:27.310000 -CVE-2025-31711,1,1,a3fa30778e19165b85652b2f713ceade4f08eb94cab66e00be37306d99ae6972,2025-06-03T06:15:27.480000 -CVE-2025-31712,1,1,17def7a96244816b4bb76c349fdf1982790b6eed1591dfd29f74b5671fecdd0a,2025-06-03T06:15:27.613000 +CVE-2025-31710,0,0,ecaad9481e1d57e9476d5b38acf524d11a505e34f2e33e4142c9fccd3098be3c,2025-06-03T06:15:27.310000 +CVE-2025-31711,0,0,a3fa30778e19165b85652b2f713ceade4f08eb94cab66e00be37306d99ae6972,2025-06-03T06:15:27.480000 +CVE-2025-31712,0,0,17def7a96244816b4bb76c349fdf1982790b6eed1591dfd29f74b5671fecdd0a,2025-06-03T06:15:27.613000 CVE-2025-3172,0,0,7ef3d20b4569576ecc044e7634dd1d1d020ed6e5c64b90d6184f578b093246a4,2025-05-15T20:07:38.310000 CVE-2025-31720,0,0,ce62208919cdfa9fb252b714bb7365bb606e8689ef37f84aded5e8ad22c74887,2025-04-29T14:03:21.570000 CVE-2025-31721,0,0,91995a06eddb99842482cec92b823782bf8b0af6c3c204a05bb9543bd15215b4,2025-04-29T13:56:43.860000 @@ -292945,7 +292946,7 @@ CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e182 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 CVE-2025-3580,0,0,fb5209c3cd7ebcd66c15bce657f3ddb23cbe27d0c5d33814deb9407bd651e1de,2025-05-23T15:54:42.643000 CVE-2025-3583,0,0,5e828bc2ad696ee8fcb9f09a10e41d54b38effce4c0c5b61566233d5e9eb1a29,2025-05-07T16:36:47.020000 -CVE-2025-3584,1,1,8be41d09e78c501793318f42a2b4096d6ba7326c3510a3c833e1035c8e14dda0,2025-06-03T06:15:27.757000 +CVE-2025-3584,0,0,8be41d09e78c501793318f42a2b4096d6ba7326c3510a3c833e1035c8e14dda0,2025-06-03T06:15:27.757000 CVE-2025-3585,0,0,793d014b8d4f8a0338ac5bc0543e903589c1e8b4dc1d9fc37efe0dfb6e2b3b88,2025-05-21T20:01:00.620000 CVE-2025-3587,0,0,24a9d7f002b5d3dda78896e9b2347c9c9868aa706322ae2e0fbf5aeb34b2cb44,2025-04-15T18:39:27.967000 CVE-2025-3588,0,0,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000 @@ -293013,7 +293014,7 @@ CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf7 CVE-2025-36572,0,0,058b67de5ee82f1e6220c3754353a9e125a12fbf0176dd2f3a1d9ddfb79707a8,2025-05-29T14:29:50.247000 CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000 CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000 -CVE-2025-3662,1,1,fa76f3967f29876fbaa404d18bcab772f4ff9a6149e57a40dd0566d7140ddbf7,2025-06-03T06:15:27.873000 +CVE-2025-3662,0,0,fa76f3967f29876fbaa404d18bcab772f4ff9a6149e57a40dd0566d7140ddbf7,2025-06-03T06:15:27.873000 CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000 CVE-2025-3663,0,0,8e1f6f32c25b3b8d1ec3b3a3f1e13e7a7d56fd1e7c8e37fb37a5c673e5d21e5b,2025-05-12T19:50:03.073000 CVE-2025-3664,0,0,8622093c787fd6e9e1b160486bb91e2aaa36ebec298b1306944080b7ed6d8600,2025-04-22T16:53:30.190000 @@ -294016,6 +294017,7 @@ CVE-2025-41414,0,0,e15bca7d4059421d15d5cb35dc483cbefc52e8d9cd9f55b31b9d84f79a125 CVE-2025-4142,0,0,78a1ea715ae46e4bda0a693a8542472224c3dca467cf3911b9ec4f409b46b000,2025-05-12T19:39:50.053000 CVE-2025-41423,0,0,3ae1e637900a2dfc5b6bacaa494e26a0b5d8e1e48accef6073153be61f7a9347,2025-04-29T13:52:47.470000 CVE-2025-41426,0,0,43242131e19ec18f330497e91493c38832fad38a58a843ab859c1d5a86371244,2025-05-21T20:24:58.133000 +CVE-2025-41428,1,1,05da2590e70d1e08d485e3c1627cbb1dfad00722d6df324d58ae8555e7344690,2025-06-03T08:15:19.467000 CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17fbc,2025-05-19T13:35:20.460000 CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000 CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000 @@ -294398,6 +294400,7 @@ CVE-2025-4419,0,0,280ab2097f0627a87fc9bc990e1fbeb501026297486a153453a713f412e7cb CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db312359e8,2025-05-12T19:42:18.530000 CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000 CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000 +CVE-2025-4420,1,1,ce038fb29a6692be764c07fd478227cfce695047a961e4cb45ef9ab346d0ddd9,2025-06-03T09:15:22.673000 CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000 CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000 CVE-2025-4429,0,0,fe6071399e142802408b914c5bdedf40a11e5b9791557c888b05a6344723a056,2025-05-30T16:31:03.107000 @@ -294633,7 +294636,7 @@ CVE-2025-45617,0,0,45ec32c91fa8777f902c441e0ad6a5cbb4b231cb8d61355ddcbbf662a9985 CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51137,2025-05-06T04:16:18.347000 CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000 CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000 -CVE-2025-4567,1,1,fde4bb0852da315db12e889813d654bd5d7ffd6e2041581467b11e73d6501452,2025-06-03T06:15:27.983000 +CVE-2025-4567,0,0,fde4bb0852da315db12e889813d654bd5d7ffd6e2041581467b11e73d6501452,2025-06-03T06:15:27.983000 CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcfb5,2025-05-16T14:43:56.797000 CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000 CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000 @@ -294783,6 +294786,7 @@ CVE-2025-46349,0,0,1714a97271744ee922f4bd027ddde23d095fab400e525c7e78a72152293a3 CVE-2025-4635,0,0,dbd97ddcf9f06e6a17bd98831167ca852ef57632eda54b68ef8eca53b0008e92,2025-05-30T16:31:03.107000 CVE-2025-46350,0,0,e9c2d732d02d04db30379a06f4d06a3199d3f19fe29e090eebfdcec4aeb7f535,2025-05-09T13:57:36.823000 CVE-2025-46352,0,0,618391598a4bc31a1d4677ab5a474da78aeac6261ac4ae8b26099a8c01185f09,2025-05-30T16:31:03.107000 +CVE-2025-46355,1,1,1807f41563bddcc346794c010d8d1d00e0f382923616bb8bb587edc58bb97041,2025-06-03T08:15:19.813000 CVE-2025-4636,0,0,42769483161d9081ca44d7da54fb93931edabd656065d5921f77e2f9979ff65e,2025-05-30T16:31:03.107000 CVE-2025-4637,0,0,6a6f5a6b16c4a5dc9c7dfdefe827d1876d1a6cd89fb863be894c5faba3f21b65,2025-05-16T14:43:56.797000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 @@ -296049,11 +296053,12 @@ CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5 CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000 CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000 CVE-2025-5082,0,0,654b6f5ca85bdee04f191b4415361841f39b64a4d62ac7e373566ed9502c800a,2025-05-28T15:01:30.720000 -CVE-2025-5086,0,1,576e692795eaa257c180462b85151d0da8d5282543ca9b4e80084cdea5a69ddd,2025-06-03T07:15:21.380000 +CVE-2025-5086,0,0,576e692795eaa257c180462b85151d0da8d5282543ca9b4e80084cdea5a69ddd,2025-06-03T07:15:21.380000 CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000 CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000 CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000 CVE-2025-5100,0,0,a54df1e8b0bff17450a1f67dfee2545841c6f379cdcd252b360f4d2a6c61fdc9,2025-05-27T16:15:34.280000 +CVE-2025-5103,1,1,af4594b973fdd953cec06d0755700664db10b8fb67ea2802be047b4e3fd3bb5b,2025-06-03T09:15:22.840000 CVE-2025-5105,0,0,7ec1994145b2106c72a5e3c1031b0347b4a7435fd8dfdb2d41bb64c0d8abcf2a,2025-05-23T15:54:42.643000 CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68bb,2025-05-23T15:54:42.643000 CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000 @@ -296064,6 +296069,7 @@ CVE-2025-5111,0,0,ab3c47416b65781d53c047fed78dbbb335dd4bed9307ae97643de9e73c2c42 CVE-2025-5112,0,0,f0cd0b8c93be317d3a2c0e92912b455b4fb61ee919b7fe6bebacd87c921bdc33,2025-05-23T15:54:42.643000 CVE-2025-5113,0,0,0bd61b4abacfc5745f349f466d36dc6433bff2c84afe9ce5402853e11bea600a,2025-06-02T17:32:17.397000 CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000 +CVE-2025-5116,1,1,3a3248d5910bdfdea3cbcccc91a56e9fb901b18c52c8f2836052f1a9c085e6e7,2025-06-03T09:15:23.007000 CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000 CVE-2025-5119,0,0,bf969a61748b203da4a3f2f501a91ebb4932bff138f2ad55051f80ff5d8eb019,2025-05-28T14:58:52.920000 CVE-2025-5122,0,0,f0e21910b241d49227076aad0272129f233644ba6bdfb930e332b9b2297be743,2025-05-29T14:29:50.247000