diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13087.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13087.json index 5653df13229..84e29d432a1 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13087.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13087.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13087", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:22.573", - "lastModified": "2025-06-06T16:15:22.573", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later" + }, + { + "lang": "es", + "value": "Se ha reportado una vulnerabilidad de inyecci\u00f3n de comandos que afecta a QHora. Si un atacante obtiene acceso a la red local y tambi\u00e9n ha obtenido una cuenta de administrador, puede explotar la vulnerabilidad para ejecutar comandos arbitrarios. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: QuRouter 2.4.6.028 y posteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13088.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13088.json index dfcf383b93b..b5977718ecc 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13088.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13088.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13088", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:23.323", - "lastModified": "2025-06-06T16:15:23.323", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.5.0.140 and later" + }, + { + "lang": "es", + "value": "Se ha reportado una vulnerabilidad de autenticaci\u00f3n incorrecta que afecta a QHora. Si un atacante obtiene acceso a la red local, puede explotar la vulnerabilidad para comprometer la seguridad del sistema. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: QuRouter 2.5.0.140 y posteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42367.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42367.json index d9c52a7b7c4..7523114cb7d 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42367.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42367.json @@ -2,13 +2,13 @@ "id": "CVE-2024-42367", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T13:38:34.240", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2025-06-09T13:15:21.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue." + "value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50406.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50406.json index 6a3886ef1cf..a291de07744 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50406.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50406.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50406", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:23.500", - "lastModified": "2025-06-06T16:15:23.500", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability has been reported to affect License Center. If exploited, the vulnerability could allow remote attackers who have gained user access to bypass security mechanisms or read application data.\n\nWe have already fixed the vulnerability in the following version:\nLicense Center 1.9.49 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de Cross Site Scripting (XSS) que afecta a License Center. Si se explota, esta vulnerabilidad podr\u00eda permitir a atacantes remotos con acceso de usuario eludir mecanismos de seguridad o leer datos de la aplicaci\u00f3n. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: License Center 1.9.49 y posteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json index 6ee57859851..feadce8416c 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json @@ -2,13 +2,17 @@ "id": "CVE-2024-55585", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-07T19:15:22.333", - "lastModified": "2025-06-07T20:15:23.417", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the moPS App through 1.8.618, all users can access administrative API endpoints without additional authentication, resulting in unrestricted read and write access, as demonstrated by /api/v1/users/resetpassword." + }, + { + "lang": "es", + "value": "En moPS App hasta la versi\u00f3n 1.8.618, todos los usuarios pueden acceder a los endpoints de la API administrativa sin autenticaci\u00f3n adicional, lo que da como resultado un acceso de lectura y escritura sin restricciones, como lo demuestra /api/v1/users/resetpassword." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56805.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56805.json index d8e73087625..6d1a684314e 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56805.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56805.json @@ -2,13 +2,17 @@ "id": "CVE-2024-56805", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:23.660", - "lastModified": "2025-06-06T16:15:23.660", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.4.3079 build 20250321 and later\nQuTS hero h5.2.4.3079 build 20250321 and later" + }, + { + "lang": "es", + "value": "Se ha reportado una vulnerabilidad de desbordamiento de b\u00fafer que afecta a varias versiones del sistema operativo QNAP. Si se explota, esta vulnerabilidad podr\u00eda permitir a atacantes remotos con acceso de usuario modificar la memoria o bloquear procesos. Ya hemos corregido la vulnerabilidad en las siguientes versiones: QTS 5.2.4.3079, compilaci\u00f3n 20250321 y posteriores; QuTS hero h5.2.4.3079, compilaci\u00f3n 20250321 y posteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9993.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9993.json index 82f18a6f4a3..dd3fe3499e4 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9993.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9993.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9993", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-07T12:15:21.360", - "lastModified": "2025-06-07T12:15:21.360", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the eael_event_details_text parameter of Event Calendar Widget in all versions up to, and including, 6.1.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro eael_event_details_text del widget Calendario de eventos en todas las versiones hasta la 6.1.12 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a la p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9994.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9994.json index 425eef29dad..14989300145 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9994.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9994.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9994", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-07T12:15:22.963", - "lastModified": "2025-06-07T12:15:22.963", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the eael_pricing_item_tooltip_content parameter of the Pricing Table Widget in all versions up to, and including, 6.1.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro eael_pricing_item_tooltip_content del widget Tabla de precios en todas las versiones hasta la 6.1.12 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder a ellas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0620.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0620.json index 04367c7ce07..178c8805fa8 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0620.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0620.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0620", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-06T14:15:21.247", - "lastModified": "2025-06-06T14:15:21.247", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en Samba. El demonio de servicio smbd no detecta los cambios en la membres\u00eda de grupo al volver a autenticar una sesi\u00f3n SMB expirada. Este problema puede exponer los recursos compartidos de archivos hasta que los clientes se desconecten y se vuelvan a conectar." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json index e931b220f5f..1f778ac49b9 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20063.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20063", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:20.493", - "lastModified": "2025-06-08T12:15:20.493", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json index 13dcd37e1db..e0285db0f9f 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21082.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21082", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.433", - "lastModified": "2025-06-08T12:15:21.433", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22481.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22481.json index 6dd18401afe..3d2ba7d9c1f 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22481.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22481.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22481", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:23.877", - "lastModified": "2025-06-06T16:15:23.877", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.4.3079 build 20250321 and later\nQuTS hero h5.2.4.3079 build 20250321 and later" + }, + { + "lang": "es", + "value": "Se ha reportado una vulnerabilidad de inyecci\u00f3n de comandos que afecta a varias versiones del sistema operativo QNAP. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario ejecuten comandos arbitrarios. Ya hemos corregido la vulnerabilidad en las siguientes versiones: QTS 5.2.4.3079, compilaci\u00f3n 20250321 y posteriores; QuTS hero h5.2.4.3079, compilaci\u00f3n 20250321 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22482.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22482.json index 0cfde01b7d3..969c4328ccd 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22482.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22482.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22482", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:24.023", - "lastModified": "2025-06-06T16:15:24.023", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 4.5.0.6 ( 2025/03/20 ) and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad relacionada con el uso de cadenas de formato controladas externamente que afecta a Qsync Central. Si se explota, esta vulnerabilidad podr\u00eda permitir a atacantes remotos con acceso de usuario obtener datos secretos o modificar la memoria. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: Qsync Central 4.5.0.6 (20/03/2025) y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22484.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22484.json index 46b6fe38fbb..4689e5d83f3 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22484.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22484.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22484", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:24.187", - "lastModified": "2025-06-06T16:15:24.187", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites o de limitaci\u00f3n que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para impedir que otros sistemas, aplicaciones o procesos accedan al mismo tipo de recurso. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22486.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22486.json index d05878f43ef..342efac7cd6 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22486.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22486.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22486", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:24.330", - "lastModified": "2025-06-06T16:15:24.330", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22490.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22490.json index 548bbe5ce69..34253f1c4e3 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22490.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22490.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22490", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:24.487", - "lastModified": "2025-06-06T16:15:24.487", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json index 86f67c8ce56..c6bf781fda1 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23235.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23235", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.590", - "lastModified": "2025-06-08T12:15:21.590", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json index 46d3446b5e6..57222a9ff96 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24493.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24493", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.763", - "lastModified": "2025-06-08T12:15:21.763", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25207.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25207.json index d1fb784942c..90ad4d2b594 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25207.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25207.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25207", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-09T06:15:24.413", - "lastModified": "2025-06-09T06:15:24.413", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25208.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25208.json index 2ae2e368ecd..bc126781fcb 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25208.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25208.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25208", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-09T06:15:24.667", - "lastModified": "2025-06-09T06:15:24.667", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25209.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25209.json index 103d98c29bb..ffc1d3fe9ff 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25209.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25209.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25209", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-09T06:15:24.853", - "lastModified": "2025-06-09T06:15:24.853", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json index 8f159cc414e..b241df0aa8e 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25217.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25217", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:21.933", - "lastModified": "2025-06-08T12:15:21.933", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json index ed87bb6c39a..b95b3d0cbae 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26691.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26691", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.093", - "lastModified": "2025-06-08T12:15:22.093", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json index d2753b7212b..03458518893 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26693.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26693", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.260", - "lastModified": "2025-06-08T12:15:22.260", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json index 7d8db939fbb..c58ed0d6bc8 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27131.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27131", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.423", - "lastModified": "2025-06-08T12:15:22.423", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json index 7afc25e5f83..4ba4ba95a3f 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27242.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27242", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.583", - "lastModified": "2025-06-08T12:15:22.583", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json index 3dd2a9557ee..685a615986b 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27247.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27247", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.733", - "lastModified": "2025-06-08T12:15:22.733", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json index f72dfb6baec..b48ae1b5e01 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27531", "sourceIdentifier": "security@apache.org", "published": "2025-06-06T15:15:23.883", - "lastModified": "2025-06-06T15:15:23.883", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Apache InLong.\u00a0\n\nThis issue affects Apache InLong: from 1.13.0 before 2.1.0, \n\nthis issue would allow an authenticated attacker to read arbitrary files\u00a0by double writing the param.\n\n\n\n\n\nUsers are recommended to upgrade to version 2.1.0, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache InLong. Este problema afecta a Apache InLong: desde la versi\u00f3n 1.13.0 hasta la 2.1.0, este problema permit\u00eda a un atacante autenticado leer archivos arbitrarios mediante la escritura duplicada del par\u00e1metro. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.1.0, que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json index 5035ed05206..b903c73cd4a 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27563.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27563", "sourceIdentifier": "scy@openharmony.io", "published": "2025-06-08T12:15:22.917", - "lastModified": "2025-06-08T12:15:22.917", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27709.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27709.json index 22daf011813..36cd1d75ec4 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27709.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27709.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27709", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2025-06-09T11:15:20.807", - "lastModified": "2025-06-09T11:15:20.807", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2766.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2766.json index 0d9a9829f82..793d325ea6d 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2766.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2766.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2766", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T19:15:26.930", - "lastModified": "2025-06-06T19:15:26.930", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "70mai A510 Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the default configuration of user accounts. The configuration contains default password. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. Was ZDI-CAN-24996." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n por contrase\u00f1a predeterminada en 70mai A510. Esta vulnerabilidad permite a atacantes adyacentes a la red omitir la autenticaci\u00f3n en las instalaciones afectadas de 70mai A510. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la configuraci\u00f3n predeterminada de las cuentas de usuario. Esta configuraci\u00f3n contiene la contrase\u00f1a predeterminada. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticaci\u00f3n y ejecutar c\u00f3digo arbitrario en el contexto de la ra\u00edz. Era ZDI-CAN-24996." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29871.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29871.json index 1fe2e1edfb0..d7ad47c8bc2 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29871.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29871.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29871", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:24.637", - "lastModified": "2025-06-06T16:15:24.637", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de lectura fuera de los l\u00edmites que afecta a File Station 5. Si un atacante local obtiene una cuenta de administrador, puede explotar la vulnerabilidad para obtener datos confidenciales. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29872.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29872.json index 42a20ecf892..a1ee3dcbfc6 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29872.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29872.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29872", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:24.803", - "lastModified": "2025-06-06T16:15:24.803", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites o de limitaci\u00f3n que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para impedir que otros sistemas, aplicaciones o procesos accedan al mismo tipo de recurso. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29873.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29873.json index d821c45baa5..a5735c96e06 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29873.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29873.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29873", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:24.950", - "lastModified": "2025-06-06T16:15:24.950", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29876.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29876.json index aebdddf510c..bc63ff381df 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29876.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29876.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29876", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:25.090", - "lastModified": "2025-06-06T16:15:25.090", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29877.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29877.json index 25fcbea068d..9889e1071ca 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29877.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29877.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29877", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:25.230", - "lastModified": "2025-06-06T16:15:25.230", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de desreferencia de puntero nulo que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para lanzar un ataque de denegaci\u00f3n de servicio (DoS). Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29883.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29883.json index 0289815be5a..9d7fdf54e53 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29883.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29883.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29883", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:25.370", - "lastModified": "2025-06-06T16:15:25.370", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29884.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29884.json index acd23205263..49a4fb5c741 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29884.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29884.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29884", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:25.510", - "lastModified": "2025-06-06T16:15:25.510", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29885.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29885.json index f7ccdac99bd..630cda00643 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29885.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29885.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29885", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:25.643", - "lastModified": "2025-06-06T16:15:25.643", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4791 and later\n and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario comprometan la seguridad del sistema. Ya hemos corregido la vulnerabilidad en las siguientes versiones: File Station 5 5.5.6.4791 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29892.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29892.json index d0a70ce9cb8..234dcc37a4d 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29892.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29892.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29892", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:25.783", - "lastModified": "2025-06-06T16:15:25.783", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An SQL injection vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to execute unauthorized code or commands.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 4.5.0.6 ( 2025/03/20 ) and later" + }, + { + "lang": "es", + "value": "Se ha reportado una vulnerabilidad de inyecci\u00f3n SQL que afecta a Qsync Central. Si se explota, esta vulnerabilidad podr\u00eda permitir que atacantes remotos con acceso de usuario ejecuten c\u00f3digo o comandos no autorizados. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: Qsync Central 4.5.0.6 (20/03/2025) y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30279.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30279.json index efe049b3018..1c67f439339 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30279.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30279.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30279", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:26.030", - "lastModified": "2025-06-06T16:15:26.030", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para comprometer la seguridad del sistema. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json index 176ee8ed322..70236762d74 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32455.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32455", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:30.993", - "lastModified": "2025-06-08T21:15:30.993", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json index 68c4a5a0d67..ef119096da8 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32456.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32456", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.267", - "lastModified": "2025-06-08T21:15:31.267", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json index e918bc4d718..34269c0727a 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32457.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32457", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.403", - "lastModified": "2025-06-08T21:15:31.403", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json index 454a343018a..05d5eddfca3 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32458.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32458", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.537", - "lastModified": "2025-06-08T21:15:31.537", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json index 5197d71dd21..dad803a9618 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32459.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32459", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.673", - "lastModified": "2025-06-08T21:15:31.673", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33031.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33031.json index 04448e5d314..5e22e6e906f 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33031.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33031.json @@ -2,13 +2,17 @@ "id": "CVE-2025-33031", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:28.203", - "lastModified": "2025-06-06T16:15:28.203", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper certificate validation vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de validaci\u00f3n incorrecta de certificados que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para comprometer la seguridad del sistema. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33035.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33035.json index fa81b22f327..25bd76da367 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33035.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33035.json @@ -2,13 +2,17 @@ "id": "CVE-2025-33035", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2025-06-06T16:15:28.353", - "lastModified": "2025-06-06T16:15:28.353", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4847 and later" + }, + { + "lang": "es", + "value": "Se ha informado de una vulnerabilidad de path traversal que afecta a File Station 5. Si un atacante remoto obtiene una cuenta de usuario, puede explotar la vulnerabilidad para leer el contenido de archivos o datos del sistema inesperados. Ya hemos corregido la vulnerabilidad en la siguiente versi\u00f3n: File Station 5 5.5.6.4847 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json index 74bdd0cb1fc..47b3bb08422 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3459.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3459", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.770", - "lastModified": "2025-06-08T21:15:32.770", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json index 6b2e814935d..ec44ad79b13 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3460.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3460", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.900", - "lastModified": "2025-06-08T21:15:32.900", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json index c5c7361cbfd..6b8755df676 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3461.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3461", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:33.030", - "lastModified": "2025-06-08T21:15:33.030", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3485.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3485.json index 0085f5511c5..eb67481233f 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3485.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3485.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3485", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T19:15:27.140", - "lastModified": "2025-06-06T19:15:27.140", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the extractFileFromZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26524." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Directory Traversal en Allegra extractFileFromZip. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Allegra. Se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo extractFileFromZip. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-26524." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35004.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35004.json index ae80608b50d..6b00ec4d81e 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35004.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35004.json @@ -2,8 +2,8 @@ "id": "CVE-2025-35004", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.807", - "lastModified": "2025-06-08T21:15:31.807", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35005.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35005.json index bedc63a5314..8a224ad9245 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35005.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35005.json @@ -2,8 +2,8 @@ "id": "CVE-2025-35005", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:31.947", - "lastModified": "2025-06-08T21:15:31.947", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35006.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35006.json index e60f70ec214..2af97923999 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35006.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35006.json @@ -2,8 +2,8 @@ "id": "CVE-2025-35006", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.087", - "lastModified": "2025-06-08T21:15:32.087", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35007.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35007.json index 15135752f50..20e009c424e 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35007.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35007.json @@ -2,8 +2,8 @@ "id": "CVE-2025-35007", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.227", - "lastModified": "2025-06-08T21:15:32.227", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35008.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35008.json index b2a9512e3a6..78af521466b 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35008.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35008.json @@ -2,8 +2,8 @@ "id": "CVE-2025-35008", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.363", - "lastModified": "2025-06-08T21:15:32.363", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35009.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35009.json index f8820db690d..9b02f7186e2 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35009.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35009.json @@ -2,8 +2,8 @@ "id": "CVE-2025-35009", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.500", - "lastModified": "2025-06-08T21:15:32.500", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35010.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35010.json index 25294e15e56..749b97c8118 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35010.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35010.json @@ -2,8 +2,8 @@ "id": "CVE-2025-35010", "sourceIdentifier": "cve@takeonme.org", "published": "2025-06-08T21:15:32.633", - "lastModified": "2025-06-08T21:15:32.633", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3501.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3501.json index e1da39e98f8..f4e9dbd4429 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3501.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3501.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3501", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-29T21:15:51.523", - "lastModified": "2025-05-02T13:53:40.163", + "lastModified": "2025-06-09T13:15:22.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,6 +60,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:4336", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:8672", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-3501", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json index 3ad972eda28..f320e224c33 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3581.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3581", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-09T06:15:25.067", - "lastModified": "2025-06-09T06:15:25.067", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json index 3747982aa9a..f4507d4fc46 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3582.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3582", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-09T06:15:25.200", - "lastModified": "2025-06-09T06:15:25.200", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36528.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36528.json index e3cafb9cc3d..5410a1502ab 100644 --- a/CVE-2025/CVE-2025-365xx/CVE-2025-36528.json +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36528.json @@ -2,8 +2,8 @@ "id": "CVE-2025-36528", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2025-06-09T11:15:21.773", - "lastModified": "2025-06-09T11:15:21.773", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-380xx/CVE-2025-38001.json b/CVE-2025/CVE-2025-380xx/CVE-2025-38001.json index c1ed0669270..6eef415f674 100644 --- a/CVE-2025/CVE-2025-380xx/CVE-2025-38001.json +++ b/CVE-2025/CVE-2025-380xx/CVE-2025-38001.json @@ -2,13 +2,17 @@ "id": "CVE-2025-38001", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-06-06T14:15:22.183", - "lastModified": "2025-06-06T14:15:22.183", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\n\nSavino says:\n \"We are writing to report that this recent patch\n (141d34391abbb315d68556b7c67ad97885407547) [1]\n can be bypassed, and a UAF can still occur when HFSC is utilized with\n NETEM.\n\n The patch only checks the cl->cl_nactive field to determine whether\n it is the first insertion or not [2], but this field is only\n incremented by init_vf [3].\n\n By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\n check and insert the class twice in the eltree.\n Under normal conditions, this would lead to an infinite loop in\n hfsc_dequeue for the reasons we already explained in this report [5].\n\n However, if TBF is added as root qdisc and it is configured with a\n very low rate,\n it can be utilized to prevent packets from being dequeued.\n This behavior can be exploited to perform subsequent insertions in the\n HFSC eltree and cause a UAF.\"\n\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: hfsc: Direcci\u00f3n de cola reentrante que a\u00f1ade clase a eltree dos veces. Savino afirma: \"Les escribimos para informarles que este parche reciente (141d34391abbb315d68556b7c67ad97885407547) [1] se puede omitir, y a\u00fan puede producirse una UAF cuando se utiliza HFSC con NETEM. El parche solo comprueba el campo cl->cl_nactive para determinar si es la primera inserci\u00f3n o no [2], pero este campo solo se incrementa con init_vf [3]. Al usar HFSC_RSC (que utiliza init_ed) [4], es posible omitir la comprobaci\u00f3n e insertar la clase dos veces en eltree. En condiciones normales, esto provocar\u00eda un bucle infinito en hfsc_dequeue por las razones que ya explicamos en este informe [5]. Sin embargo, si TBF se a\u00f1ade como qdisc ra\u00edz y es Configurado con una tasa muy baja, puede utilizarse para evitar que los paquetes se desencolan. Este comportamiento puede aprovecharse para realizar inserciones posteriores en el eltree de HFSC y provocar un UAF. Para solucionar tanto el UAF como el bucle infinito, con netem como elemento secundario de hfsc, compruebe expl\u00edcitamente en hfsc_enqueue si la clase ya est\u00e1 en el eltree cuando se activa el indicador HFSC_RSC. [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547 [2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572 [3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677 [4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574 [5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-380xx/CVE-2025-38002.json b/CVE-2025/CVE-2025-380xx/CVE-2025-38002.json index efa04a2735e..fe3c7b241cb 100644 --- a/CVE-2025/CVE-2025-380xx/CVE-2025-38002.json +++ b/CVE-2025/CVE-2025-380xx/CVE-2025-38002.json @@ -2,13 +2,17 @@ "id": "CVE-2025-38002", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-06-06T14:15:22.313", - "lastModified": "2025-06-06T14:15:22.313", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/fdinfo: grab ctx->uring_lock around io_uring_show_fdinfo()\n\nNot everything requires locking in there, which is why the 'has_lock'\nvariable exists. But enough does that it's a bit unwieldy to manage.\nWrap the whole thing in a ->uring_lock trylock, and just return\nwith no output if we fail to grab it. The existing trylock() will\nalready have greatly diminished utility/output for the failure case.\n\nThis fixes an issue with reading the SQE fields, if the ring is being\nactively resized at the same time." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/fdinfo: captura ctx->uring_lock en torno a io_uring_show_fdinfo(). No todo requiere bloqueo, raz\u00f3n por la cual existe la variable 'has_lock'. Sin embargo, suficientes requieren bloqueo como para que sea un poco dif\u00edcil de manejar. Envuelva todo en un trylock `->uring_lock` y simplemente devuelva sin salida si no logramos capturarlo. El trylock() existente ya tendr\u00e1 una utilidad/salida considerablemente reducida en caso de fallo. Esto soluciona un problema con la lectura de los campos SQE si el anillo se est\u00e1 redimensionando activamente al mismo tiempo." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-380xx/CVE-2025-38003.json b/CVE-2025/CVE-2025-380xx/CVE-2025-38003.json index df1a01aa7a3..15071e77f84 100644 --- a/CVE-2025/CVE-2025-380xx/CVE-2025-38003.json +++ b/CVE-2025/CVE-2025-380xx/CVE-2025-38003.json @@ -2,13 +2,17 @@ "id": "CVE-2025-38003", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-06-08T11:15:20.990", - "lastModified": "2025-06-08T11:15:20.990", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add missing rcu read protection for procfs content\n\nWhen the procfs content is generated for a bcm_op which is in the process\nto be removed the procfs output might show unreliable data (UAF).\n\nAs the removal of bcm_op's is already implemented with rcu handling this\npatch adds the missing rcu_read_lock() and makes sure the list entries\nare properly removed under rcu protection." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: a\u00f1adir protecci\u00f3n de lectura rcu faltante para el contenido de procfs. Cuando se genera el contenido de procfs para un bcm_op que se va a eliminar, la salida de procfs podr\u00eda mostrar datos no fiables (UAF). Dado que la eliminaci\u00f3n de bcm_op ya est\u00e1 implementada con la gesti\u00f3n de rcu, este parche a\u00f1ade el rcu_read_lock() faltante y garantiza que las entradas de la lista se eliminen correctamente bajo la protecci\u00f3n de rcu." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-380xx/CVE-2025-38004.json b/CVE-2025/CVE-2025-380xx/CVE-2025-38004.json index e6c1d3507b6..dc28ccedd09 100644 --- a/CVE-2025/CVE-2025-380xx/CVE-2025-38004.json +++ b/CVE-2025/CVE-2025-380xx/CVE-2025-38004.json @@ -2,13 +2,17 @@ "id": "CVE-2025-38004", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-06-08T11:15:22.210", - "lastModified": "2025-06-08T11:15:22.210", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add locking for bcm_op runtime updates\n\nThe CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via\nhrtimer. The content and also the length of the sequence can be changed\nresp reduced at runtime where the 'currframe' counter is then set to zero.\n\nAlthough this appeared to be a safe operation the updates of 'currframe'\ncan be triggered from user space and hrtimer context in bcm_can_tx().\nAnderson Nascimento created a proof of concept that triggered a KASAN\nslab-out-of-bounds read access which can be prevented with a spin_lock_bh.\n\nAt the rework of bcm_can_tx() the 'count' variable has been moved into\nthe protected section as this variable can be modified from both contexts\ntoo." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: a\u00f1adir bloqueo para actualizaciones en tiempo de ejecuci\u00f3n de bcm_op El gestor de difusi\u00f3n CAN (CAN BCM) puede enviar una secuencia de tramas CAN a trav\u00e9s de hrtimer. El contenido y tambi\u00e9n la longitud de la secuencia se pueden cambiar o reducir en tiempo de ejecuci\u00f3n, donde el contador 'currframe' se establece entonces en cero. Aunque esto parec\u00eda ser una operaci\u00f3n segura, las actualizaciones de 'currframe' se pueden activar desde el espacio de usuario y el contexto de hrtimer en bcm_can_tx(). Anderson Nascimento cre\u00f3 una prueba de concepto que activ\u00f3 un acceso de lectura fuera de los l\u00edmites de KASAN slab que se puede prevenir con un spin_lock_bh. En la reelaboraci\u00f3n de bcm_can_tx() la variable 'count' se ha movido a la secci\u00f3n protegida ya que esta variable tambi\u00e9n se puede modificar desde ambos contextos." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3835.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3835.json index 55743375b74..eb58927d6bc 100644 --- a/CVE-2025/CVE-2025-38xx/CVE-2025-3835.json +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3835.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3835", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2025-06-09T11:15:21.913", - "lastModified": "2025-06-09T11:15:21.913", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39472.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39472.json index 6b0ff51744d..c0ec2a471ca 100644 --- a/CVE-2025/CVE-2025-394xx/CVE-2025-39472.json +++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39472.json @@ -2,13 +2,13 @@ "id": "CVE-2025-39472", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-16T18:16:19.610", - "lastModified": "2025-04-17T20:21:48.243", + "lastModified": "2025-06-09T13:15:22.357", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPWeb WooCommerce Social Login allows Cross Site Request Forgery.This issue affects WooCommerce Social Login: from n/a through 2.8.2." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPWeb WooCommerce Social Login allows Cross Site Request Forgery.This issue affects WooCommerce Social Login: from n/a before 2.8.3." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40668.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40668.json new file mode 100644 index 00000000000..138baa1dfbc --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40668.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40668", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-09T13:15:22.633", + "lastModified": "2025-06-09T13:15:22.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an attacker, with low privilege level, to change the password of other users through a POST request using the parameters idUser, PasswordActual, PasswordNew and PasswordNewRepeat in /PC/WebService.aspx/validateChangePassword%C3%B1a. To exploit the vulnerability the PasswordActual parameter must be empty." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-1", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40669.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40669.json new file mode 100644 index 00000000000..cfcf4eb90e2 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40669.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40669", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-09T13:15:22.803", + "lastModified": "2025-06-09T13:15:22.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an unprivileged attacker to modify the permissions held by each of the application's users, including the user himself by sending a POST request to /PC/Options.aspx?Command=2&Page=-1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-1", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40670.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40670.json new file mode 100644 index 00000000000..e7cc64337ea --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40670.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40670", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-09T13:15:22.963", + "lastModified": "2025-06-09T13:15:22.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an unprivileged attacker to create a user and assign it many privileges by sending a POST request to /PC/frmGestionUser.aspx/updateUser." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-1", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40675.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40675.json index 4e23a4c19b3..c3228326b34 100644 --- a/CVE-2025/CVE-2025-406xx/CVE-2025-40675.json +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40675.json @@ -2,8 +2,8 @@ "id": "CVE-2025-40675", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-06-09T10:15:25.190", - "lastModified": "2025-06-09T10:15:25.190", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-414xx/CVE-2025-41437.json b/CVE-2025/CVE-2025-414xx/CVE-2025-41437.json index bb994f0c880..5c822d8acac 100644 --- a/CVE-2025/CVE-2025-414xx/CVE-2025-41437.json +++ b/CVE-2025/CVE-2025-414xx/CVE-2025-41437.json @@ -2,8 +2,8 @@ "id": "CVE-2025-41437", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2025-06-09T11:15:22.053", - "lastModified": "2025-06-09T11:15:22.053", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-414xx/CVE-2025-41444.json b/CVE-2025/CVE-2025-414xx/CVE-2025-41444.json new file mode 100644 index 00000000000..8e00757f228 --- /dev/null +++ b/CVE-2025/CVE-2025-414xx/CVE-2025-41444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-41444", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2025-06-09T12:15:21.240", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the alerts module." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-41444.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41646.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41646.json index a2bf4603cbf..2842995c3bc 100644 --- a/CVE-2025/CVE-2025-416xx/CVE-2025-41646.json +++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41646.json @@ -2,13 +2,17 @@ "id": "CVE-2025-41646", "sourceIdentifier": "info@cert.vde.com", "published": "2025-06-06T15:15:26.183", - "lastModified": "2025-06-06T15:15:26.183", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device" + }, + { + "lang": "es", + "value": "Un atacante remoto no autorizado puede eludir la autenticaci\u00f3n del paquete de software afectado mediante el uso indebido de una conversi\u00f3n de tipo incorrecta. Esto conlleva la vulnerabilidad total del dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4652.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4652.json index eb0eeccbc3e..beeb114dde2 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4652.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4652.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4652", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-09T06:15:25.740", - "lastModified": "2025-06-09T06:15:25.740", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-476xx/CVE-2025-47601.json b/CVE-2025/CVE-2025-476xx/CVE-2025-47601.json index 93e601a6cbb..f1aafb61ae6 100644 --- a/CVE-2025/CVE-2025-476xx/CVE-2025-47601.json +++ b/CVE-2025/CVE-2025-476xx/CVE-2025-47601.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47601", "sourceIdentifier": "audit@patchstack.com", "published": "2025-06-07T05:15:24.213", - "lastModified": "2025-06-07T05:15:24.213", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Christiaan Pieterse MaxiBlocks allows Privilege Escalation.This issue affects MaxiBlocks: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Christiaan Pieterse MaxiBlocks permite la escalada de privilegios. Este problema afecta a MaxiBlocks: desde n/a hasta 2.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47711.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47711.json index f6284c5e27b..2c271f9ed0c 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47711.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47711.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47711", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-09T06:15:25.320", - "lastModified": "2025-06-09T06:15:25.320", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47712.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47712.json index 19522305696..e413b506aa1 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47712.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47712.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47712", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-09T06:15:25.537", - "lastModified": "2025-06-09T06:15:25.537", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47950.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47950.json index 4cf6e2b5eb6..35bc168a474 100644 --- a/CVE-2025/CVE-2025-479xx/CVE-2025-47950.json +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47950.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47950", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-06T18:15:35.330", - "lastModified": "2025-06-06T22:15:23.207", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CoreDNS is a DNS server that chains plugins. In versions prior to 1.12.2, a Denial of Service (DoS) vulnerability exists in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC stream without imposing any limits on the number of concurrent streams or goroutines. A remote, unauthenticated attacker could open a large number of streams, leading to uncontrolled memory consumption and eventually causing an Out Of Memory (OOM) crash \u2014 especially in containerized or memory-constrained environments. The patch in version 1.12.2 introduces two key mitigation mechanisms: `max_streams`, which caps the number of concurrent QUIC streams per connection with a default value of `256`; and `worker_pool_size`, which Introduces a server-wide, bounded worker pool to process incoming streams with a default value of `1024`. This eliminates the 1:1 stream-to-goroutine model and ensures that CoreDNS remains resilient under high concurrency. Some workarounds are available for those who are unable to upgrade. Disable QUIC support by removing or commenting out the `quic://` block in the Corefile, use container runtime resource limits to detect and isolate excessive memory usage, and/or monitor QUIC connection patterns and alert on anomalies." + }, + { + "lang": "es", + "value": "CoreDNS es un servidor DNS que encadena complementos. En versiones anteriores a la 1.12.2, exist\u00eda una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la implementaci\u00f3n del servidor DNS sobre QUIC (DoQ) de CoreDNS. Anteriormente, el servidor creaba una nueva goroutine para cada flujo QUIC entrante sin imponer ning\u00fan l\u00edmite en el n\u00famero de flujos o goroutines simult\u00e1neos. Un atacante remoto no autenticado podr\u00eda abrir un gran n\u00famero de flujos, lo que provocar\u00eda un consumo de memoria descontrolado y, eventualmente, un fallo por falta de memoria (OOM), especialmente en entornos contenedorizados o con memoria limitada. El parche de la versi\u00f3n 1.12.2 introduce dos mecanismos clave de mitigaci\u00f3n: `max_streams`, que limita el n\u00famero de flujos QUIC simult\u00e1neos por conexi\u00f3n con un valor predeterminado de `256`; y `worker_pool_size`, que introduce un grupo de trabajadores limitado a nivel de servidor para procesar los flujos entrantes con un valor predeterminado de `1024`. Esto elimina el modelo 1:1 de flujo a go-rutina y garantiza la resiliencia de CoreDNS en condiciones de alta concurrencia. Existen soluciones alternativas para quienes no puedan actualizar. Desactive la compatibilidad con QUIC eliminando o comentando el bloque `quic://` en el Corefile, utilice los l\u00edmites de recursos del contenedor en tiempo de ejecuci\u00f3n para detectar y aislar el uso excesivo de memoria, o monitoree los patrones de conexi\u00f3n de QUIC y alerte sobre anomal\u00edas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48053.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48053.json new file mode 100644 index 00000000000..da000926784 --- /dev/null +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48053.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-48053", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T13:15:23.163", + "lastModified": "2025-06-09T13:15:23.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, sending a malicious URL in a PM to a bot user can cause a reduced the availability of a Discourse instance. This issue is patched in version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/discourse/discourse/security/advisories/GHSA-3q5q-qmrm-rvwx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48062.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48062.json new file mode 100644 index 00000000000..1d987194d8e --- /dev/null +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48062.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-48062", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T13:15:23.320", + "lastModified": "2025-06-09T13:15:23.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, certain invites via email may result in HTML injection in the email body if the topic title includes HTML. This includes inviting someone (without an account) to a PM and inviting someone (without an account) to a topic with a custom message. This issue is patched in version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch. This can be worked around if the relevant templates are overridden without `{topic_title}`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/discourse/discourse/security/advisories/GHSA-x8mp-chx3-6x2p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48877.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48877.json new file mode 100644 index 00000000000..b0f65403109 --- /dev/null +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48877.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-48877", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T13:15:23.500", + "lastModified": "2025-06-09T13:15:23.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, Codepen is present in the default `allowed_iframes` site setting, and it can potentially auto-run arbitrary JS in the iframe scope, which is unintended. This issue is patched in version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch. As a workaround, the Codepen prefix can be removed from a site's `allowed_iframes`." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1038" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/discourse/discourse/security/advisories/GHSA-cm93-6m2m-cjcv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49006.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49006.json new file mode 100644 index 00000000000..60a0f003a6c --- /dev/null +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49006.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-49006", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T13:15:23.650", + "lastModified": "2025-06-09T13:15:23.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Wasp (Web Application Specification) is a Rails-like framework for React, Node.js, and Prisma. Prior to version 0.16.6, Wasp authentication has a vulnerability in the OAuth authentication implementation (affecting only Keycloak with a specific config). Wasp currently lowercases OAuth user IDs before storing / fetching them. This behavior violates OAuth and OpenID Connect specifications and can result in user impersonation, account collisions, and privilege escalation. In practice, out of the OAuth providers that Wasp auth supports, only Keycloak is affected. Keycloak uses a lowercase UUID by default, but users can configure it to be case sensitive, making it affected. Google, GitHub, and Discord use numerical IDs, making them not affected. Users should update their Wasp version to `0.16.6` which has a fix for the problematic behavior. Users using Keycloak can work around the issue by not using a case sensitive user ID in their realm configuration." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wasp-lang/wasp/commit/433b9b7f491c172db656fb94cc85e5bd7d614b74", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/wasp-lang/wasp/security/advisories/GHSA-qvjc-6xv7-6v5f", + "source": "security-advisories@github.com" + }, + { + "url": "https://wasp-lang.notion.site/PUB-Case-insensitive-OAuth-ID-vulnerability-20018a74854c8064a2bfebe4eaf5fceb", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49011.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49011.json index 58f120b025e..e9648245f71 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49011.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49011.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49011", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-06T18:15:35.497", - "lastModified": "2025-06-06T18:15:35.497", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SpiceDB is an open source database for storing and querying fine-grained authorization data. Prior to version 1.44.2, on schemas involving arrows with caveats on the arrow\u2019ed relation, when the path to resolve a CheckPermission request involves the evaluation of multiple caveated branches, requests may return a negative response when a positive response is expected. Version 1.44.2 fixes the issue. As a workaround, do not use caveats in the schema over an arrow\u2019ed relation." + }, + { + "lang": "es", + "value": "SpiceDB es una base de datos de c\u00f3digo abierto para almacenar y consultar datos de autorizaci\u00f3n detallados. Antes de la versi\u00f3n 1.44.2, en esquemas con flechas y advertencias en la relaci\u00f3n con flechas, cuando la ruta para resolver una solicitud CheckPermission implica la evaluaci\u00f3n de varias ramas con advertencias, las solicitudes pod\u00edan devolver una respuesta negativa cuando se esperaba una positiva. La versi\u00f3n 1.44.2 soluciona este problema. Como soluci\u00f3n alternativa, no utilice advertencias en el esquema sobre una relaci\u00f3n con flechas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49013.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49013.json new file mode 100644 index 00000000000..dbf4611137a --- /dev/null +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49013.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2025-49013", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T13:15:23.803", + "lastModified": "2025-06-09T13:15:23.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WilderForge is a Wildermyth coremodding API. A critical vulnerability has been identified in multiple projects across the WilderForge organization. The issue arises from unsafe usage of `${{ github.event.review.body }}` and other user controlled variables directly inside shell script contexts in GitHub Actions workflows. This introduces a code injection vulnerability: a malicious actor submitting a crafted pull request review containing shell metacharacters or commands could execute arbitrary shell code on the GitHub Actions runner. This can lead to arbitrary command execution with the permissions of the workflow, potentially compromising CI infrastructure, secrets, and build outputs. Developers who maintain or contribute to the repos WilderForge/WilderForge, WilderForge/ExampleMod, WilderForge/WilderWorkspace, WilderForge/WildermythGameProvider, WilderForge/AutoSplitter, WilderForge/SpASM, WilderForge/thrixlvault, WilderForge/MassHash, and/or WilderForge/DLC_Disabler; as well as users who fork any of the above repositories and reuse affected GitHub Actions workflows, are affected. End users of any the above software and users who only install pre-built releases or artifacts are not affected. This vulnerability does not impact runtime behavior of the software or compiled outputs unless those outputs were produced during exploitation of this vulnerability. A current workaround is to disable GitHub Actions in affected repositories, or remove the affected workflows." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-95" + }, + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://codeql.github.com/codeql-query-help/javascript/js-actions-command-injection", + "source": "security-advisories@github.com" + }, + { + "url": "https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#preventing-script-injection", + "source": "security-advisories@github.com" + }, + { + "url": "https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#understanding-the-risk-of-script-injection", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/WilderForge/WilderForge/security/advisories/GHSA-m6r3-c73x-8fw5", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/research/github-actions-untrusted-input", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49127.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49127.json index a37689025ed..0746a2d9005 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49127.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49127.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49127", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-06T21:15:23.137", - "lastModified": "2025-06-06T21:15:23.137", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kafbat UI is a web user interface for managing Apache Kafka clusters. An unsafe deserialization vulnerability in version 1.0.0 allows any unauthenticated user to execute arbitrary code on the server. Version 1.1.0 fixes the issue." + }, + { + "lang": "es", + "value": "Kafbat UI es una interfaz de usuario web para administrar cl\u00fasteres de Apache Kafka. Una vulnerabilidad de deserializaci\u00f3n insegura en la versi\u00f3n 1.0.0 permite que cualquier usuario no autenticado ejecute c\u00f3digo arbitrario en el servidor. La versi\u00f3n 1.1.0 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49128.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49128.json index 0e63347814f..0121f555f69 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49128.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49128.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49128", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-06T22:15:23.427", - "lastModified": "2025-06-06T22:15:23.427", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. Starting in version 2.0.0 and prior to version 2.13.0, a flaw in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via PR #652. All users should upgrade to version 2.13.0 or later. If upgrading is not immediately possible, applications can mitigate the issue by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage." + }, + { + "lang": "es", + "value": "Jackson-core contiene abstracciones de analizador y generador incrementales (\"streaming\") de bajo nivel que utiliza Jackson Data Processor. A partir de la versi\u00f3n 2.0.0 y anteriores a la 2.13.0, una falla en el m\u00e9todo `JsonLocation._appendSourceDesc` de jackson-core permite incluir hasta 500 bytes de contenido de memoria no deseado en los mensajes de excepci\u00f3n. Al analizar JSON desde una matriz de bytes con un desplazamiento y una longitud, el mensaje de excepci\u00f3n lee incorrectamente desde el principio de la matriz en lugar del inicio l\u00f3gico del payload. Esto puede provocar la divulgaci\u00f3n de informaci\u00f3n en sistemas que utilizan b\u00faferes agrupados o reutilizados, como Netty o Vert.x. Este problema se solucion\u00f3 de forma silenciosa en la versi\u00f3n 2.13.0 de jackson-core, publicada el 30 de septiembre de 2021, mediante la solicitud de registro n.\u00b0 652. Todos los usuarios deben actualizar a la versi\u00f3n 2.13.0 o posterior. Si la actualizaci\u00f3n no es posible de inmediato, las aplicaciones pueden mitigar el problema deshabilitando la exposici\u00f3n de mensajes de excepci\u00f3n a los clientes para evitar devolver mensajes de excepci\u00f3n de an\u00e1lisis en respuestas HTTP y/o deshabilitando la inclusi\u00f3n de fuente en excepciones para evitar que Jackson incorpore cualquier contenido de fuente en los mensajes de excepci\u00f3n, evitando fugas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49130.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49130.json new file mode 100644 index 00000000000..432ac05c731 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49130.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-49130", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T13:15:23.977", + "lastModified": "2025-06-09T13:15:23.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Laravel Translation Manager is a package to manage Laravel translation files. Prior to version 0.6.8, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities. Only authenticated users with access to the translation manager are impacted. The issue is fixed in version 0.6.8." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/barryvdh/laravel-translation-manager/commit/527446ed419f90f2319675fc5211cb8f851d7a1f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/barryvdh/laravel-translation-manager/pull/475", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/barryvdh/laravel-translation-manager/releases/tag/v0.6.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-j226-63j7-qrqh", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49131.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49131.json new file mode 100644 index 00000000000..677aeb6c6e9 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49131.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-49131", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-09T13:15:24.120", + "lastModified": "2025-06-09T13:15:24.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/labring/FastGPT/commit/bb810a43a1c70683fab7f5fe993771e930a94426", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/labring/FastGPT/pkgs/container/fastgpt-sandbox", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/labring/FastGPT/pull/4958", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/labring/FastGPT/releases/tag/v4.9.11", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/labring/FastGPT/security/advisories/GHSA-f3pf-r3g7-g895", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49599.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49599.json index e0cdb234169..0ceab4a2f5a 100644 --- a/CVE-2025/CVE-2025-495xx/CVE-2025-49599.json +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49599.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49599", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-06T17:15:36.147", - "lastModified": "2025-06-06T17:15:36.147", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei EG8141A5 devices through V5R019C00S100, EG8145V5 devices through V5R019C00S100, and EG8145V5-V2 devices through V5R021C00S184 allow the Epuser account to disable ONT firewall functionality, e.g., to remove the default blocking of the SSH and TELNET TCP ports, aka HWNO-56Q3." + }, + { + "lang": "es", + "value": "Los dispositivos Huawei EG8141A5 a trav\u00e9s de V5R019C00S100, los dispositivos EG8145V5 a trav\u00e9s de V5R019C00S100 y los dispositivos EG8145V5-V2 a trav\u00e9s de V5R021C00S184 permiten que la cuenta Epuser deshabilite la funcionalidad del firewall ONT, por ejemplo, para eliminar el bloqueo predeterminado de los puertos TCP SSH y TELNET, tambi\u00e9n conocido como HWNO-56Q3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49619.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49619.json index 7bb647f1ae1..99c390d8124 100644 --- a/CVE-2025/CVE-2025-496xx/CVE-2025-49619.json +++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49619.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49619", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-07T14:15:21.573", - "lastModified": "2025-06-07T21:15:21.887", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Skyvern through 0.1.85 has a Jinja runtime leak in sdk/workflow/models/block.py." + }, + { + "lang": "es", + "value": "Skyvern hasta la versi\u00f3n 0.1.85 tiene una fuga de tiempo de ejecuci\u00f3n de Jinja en sdk/workflow/models/block.py." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5303.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5303.json index 906904a4d5a..b2fabc2ee66 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5303.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5303.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5303", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-07T09:15:22.007", - "lastModified": "2025-06-07T09:15:22.007", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LTL Freight Quotes \u2013 Freightview Edition, LTL Freight Quotes \u2013 Daylight Edition and LTL Freight Quotes \u2013 Day & Ross Edition plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the expiry_date parameter in all versions up to, and including, 1.0.11, 2.2.6 and 2.1.10 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos LTL Freight Quotes \u2013 Freightview Edition, LTL Freight Quotes \u2013 Daylight Edition and LTL Freight Quotes \u2013 Day & Ross Edition para WordPress son vulnerables a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro expiry_date en todas las versiones (hasta la 1.0.11, 2.2.6 y 2.1.10 incluida, respectivamente), debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5399.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5399.json index 60b748f8c2d..e748e547461 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5399.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5399.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5399", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2025-06-07T08:15:20.687", - "lastModified": "2025-06-07T08:15:20.687", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to a mistake in libcurl's WebSocket code, a malicious server can send a\nparticularly crafted packet which makes libcurl get trapped in an endless\nbusy-loop.\n\nThere is no other way for the application to escape or exit this loop other\nthan killing the thread/process.\n\nThis might be used to DoS libcurl-using application." + }, + { + "lang": "es", + "value": "Debido a un error en el c\u00f3digo WebSocket de libcurl, un servidor malicioso puede enviar un paquete especialmente manipulado que atrapa a libcurl en un bucle de actividad sin fin. La aplicaci\u00f3n no tiene otra forma de escapar de este bucle que cerrar el hilo/proceso. Esto podr\u00eda usarse para atacar a la aplicaci\u00f3n que usa libcurl." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5473.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5473.json index bd1589b278c..d4a0710a58d 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5473.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5473.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5473", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T19:15:27.463", - "lastModified": "2025-06-06T19:15:27.463", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26752." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de enteros en el an\u00e1lisis de archivos ICO de GIMP. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de GIMP. Para explotar esta vulnerabilidad, se requiere la interacci\u00f3n del usuario, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica se encuentra en el an\u00e1lisis de archivos ICO. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar un desbordamiento de enteros antes de escribir en memoria. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-26752." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5474.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5474.json index 65478eef918..49ddae7c1f1 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5474.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5474.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5474", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T19:15:27.613", - "lastModified": "2025-06-06T19:15:27.613", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "2BrightSparks SyncBackFree Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of 2BrightSparks SyncBackFree. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. User interaction on the part of an administrator is also required.\n\nThe specific flaw exists within the Mirror functionality. By creating a junction, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26962." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios locales tras enlaces en 2BrightSparks SyncBackFree. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de 2BrightSparks SyncBackFree. Para explotar esta vulnerabilidad, un atacante debe ejecutar c\u00f3digo con pocos privilegios en el sistema objetivo. Tambi\u00e9n se requiere la interacci\u00f3n del administrador. La falla espec\u00edfica se encuentra en la funcionalidad Mirror. Al crear una uni\u00f3n, un atacante puede abusar del servicio para eliminar archivos arbitrarios. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto del SYSTEM. Anteriormente, se denominaba ZDI-CAN-26962." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5480.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5480.json index 05c47528299..1b3d4e2da70 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5480.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5480.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5480", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T19:15:27.757", - "lastModified": "2025-06-06T19:15:27.757", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios locales en el elemento de ruta de b\u00fasqueda no controlada de Action1. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de Action1. Para explotar esta vulnerabilidad, un atacante debe primero ejecutar c\u00f3digo con pocos privilegios en el sistema objetivo. La falla espec\u00edfica se encuentra en la configuraci\u00f3n de OpenSSL. El producto carga un archivo de configuraci\u00f3n de OpenSSL desde una ubicaci\u00f3n no segura. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Anteriormente, se denominaba ZDI-CAN-26767." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5481.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5481.json index 5d014c888af..2ab9d3c58d7 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5481.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5481.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5481", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T19:15:27.903", - "lastModified": "2025-06-06T19:15:27.903", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26168." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por escritura fuera de los l\u00edmites en el an\u00e1lisis de archivos DCM de Sante DICOM Viewer Pro. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Sante DICOM Viewer Pro. Para explotar esta vulnerabilidad, se requiere la interacci\u00f3n del usuario, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica se encuentra en el an\u00e1lisis de archivos DCM. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura posterior al final de un objeto asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Anteriormente, se denomin\u00f3 ZDI-CAN-26168." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5528.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5528.json index a02b2b82d21..638bc312491 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5528.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5528.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5528", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-07T12:15:23.157", - "lastModified": "2025-06-07T12:15:23.157", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Sharing Plugin \u2013 Sassy Social Share plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the heateor_mastodon_share parameter in all versions up to, and including, 3.3.75 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action, such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Social Sharing Plugin \u2013 Sassy Social Share para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro heater_mastodon_share en todas las versiones hasta la 3.3.75 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5568.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5568.json index 5021f2363e8..42348b46373 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5568.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5568.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5568", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-07T12:15:23.370", - "lastModified": "2025-06-07T12:15:23.370", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WpEvently plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 4.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WpEvently para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de m\u00faltiples par\u00e1metros en todas las versiones hasta la 4.4.2 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5729.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5729.json index c2a0579ab3a..6e00ecf8e5e 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5729.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5729.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5729", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T07:15:31.133", - "lastModified": "2025-06-06T14:07:28.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T13:15:24.277", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -111,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +144,10 @@ { "url": "https://vuldb.com/?submit.590590", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Thiasap/HCPMS_PHP_vulns/blob/main/sql%20injection%20in%20birthing_record.php.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json index cded9509f86..32bcacc3b4d 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5732", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T08:15:21.467", - "lastModified": "2025-06-06T14:07:28.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T13:15:24.430", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in code-projects Traffic Offense Reporting System 1.0. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en code-projects Traffic Offense Reporting System 1.0. Esta afecta a una parte desconocida. La manipulaci\u00f3n provoca cross-site request forgery. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.590598", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/tuooo/CVE/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5747.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5747.json index c9247658574..561b184d0f6 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5747.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5747.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5747", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T16:15:29.803", - "lastModified": "2025-06-06T16:15:29.803", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installatons of WOLFBOX Level 2 EV Charger devices. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of command frames received by the MCU. When parsing frames, the process does not properly detect the start of a frame, which can lead to misinterpretation of input. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26501." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo al analizar comandos de la MCU del cargador de VE de nivel 2 de WOLFBOX. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de cargadores de VE de nivel 2 de WOLFBOX. Se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en el procesamiento de las tramas de comando recibidas por la MCU. Al analizar las tramas, el proceso no detecta correctamente el inicio de una trama, lo que puede provocar una interpretaci\u00f3n err\u00f3nea de la entrada. Un atacante puede aprovechar esto, junto con otras vulnerabilidades, para ejecutar c\u00f3digo arbitrario en el contexto del dispositivo. Anteriormente, se denominaba ZDI-CAN-26501." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5748.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5748.json index 8ad02fd629b..e9993f053e9 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5748.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5748.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5748", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T16:15:29.973", - "lastModified": "2025-06-06T16:15:29.973", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WOLFBOX Level 2 EV Charger LAN OTA Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the Tuya communications module software. The issue results from the exposure of a method allowing the upload of crafted software images to the module. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26349." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por m\u00e9todo peligroso expuesta en la LAN del cargador de veh\u00edculos el\u00e9ctricos WOLFBOX Nivel 2. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas del cargador de veh\u00edculos el\u00e9ctricos WOLFBOX Nivel 2. Si bien se requiere autenticaci\u00f3n para explotar esta vulnerabilidad, el mecanismo de autenticaci\u00f3n existente puede eludirse. La falla espec\u00edfica se encuentra en el software del m\u00f3dulo de comunicaciones Tuya. El problema se debe a la exposici\u00f3n de un m\u00e9todo que permite la carga de im\u00e1genes de software manipuladas al m\u00f3dulo. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. La vulnerabilidad era ZDI-CAN-26349." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5749.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5749.json index f82e4c53e89..842fdb7da29 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5749.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5749.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5749", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T16:15:30.120", - "lastModified": "2025-06-06T16:15:30.120", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de variables no inicializadas en las claves de cifrado del cargador de veh\u00edculos el\u00e9ctricos WOLFBOX Nivel 2 BLE. Esta vulnerabilidad permite a atacantes adyacentes a la red omitir la autenticaci\u00f3n en las instalaciones afectadas de cargadores de veh\u00edculos el\u00e9ctricos WOLFBOX Nivel 2. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en el manejo de las claves criptogr\u00e1ficas utilizadas en las comunicaciones cifradas espec\u00edficas del proveedor. El problema se debe a la falta de inicializaci\u00f3n correcta de una variable antes de acceder a ella. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticaci\u00f3n en el sistema. Anteriormente, se denomin\u00f3 ZDI-CAN-26295." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5750.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5750.json index 514e4f578b0..b954af7e413 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5750.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5750.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5750", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T16:15:30.273", - "lastModified": "2025-06-06T16:15:30.273", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WOLFBOX Level 2 EV Charger tuya_svc_devos_activate_result_parse Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the secKey, localKey, stdTimeZone and devId parameters. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26294." + }, + { + "lang": "es", + "value": "Cargador WOLFBOX EV Nivel 2 tuya_svc_devos_activate_result_parse Vulnerabilidad de Ejecuci\u00f3n Remota de C\u00f3digo por Desbordamiento de B\u00fafer en Heap. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas del Cargador WOLFBOX EV Nivel 2. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en el manejo de los par\u00e1metros secKey, localKey, stdTimeZone y devId. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer de heap de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Anteriormente, se describi\u00f3 como ZDI-CAN-26294." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5751.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5751.json index b8becf4ab9d..cb84522979f 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5751.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5751.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5751", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-06T16:15:30.413", - "lastModified": "2025-06-06T16:15:30.413", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of management cards. The issue results from the lack of personalization of management cards. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26292." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de credenciales codificadas de forma r\u00edgida en la tarjeta de administraci\u00f3n del cargador de veh\u00edculos el\u00e9ctricos WOLFBOX Nivel 2. Esta vulnerabilidad permite a atacantes presentes f\u00edsicamente omitir la autenticaci\u00f3n en las instalaciones afectadas del cargador de veh\u00edculos el\u00e9ctricos WOLFBOX Nivel 2. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en el manejo de las tarjetas de administraci\u00f3n. El problema se debe a la falta de personalizaci\u00f3n de estas. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticaci\u00f3n en el sistema. Se denomin\u00f3 ZDI-CAN-26292." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json index f7d69eca70e..d80f15b8962 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5762", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T12:15:25.737", - "lastModified": "2025-06-06T14:06:58.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T13:15:24.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Patient Record Management System 1.0. Affected is an unknown function of the file view_hematology.php. The manipulation of the argument itr_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Patient Record Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo view_hematology.php. La manipulaci\u00f3n del argumento itr_no provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.590749", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_5.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json index a25a07e2d6b..df19841c907 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5763", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T12:15:25.927", - "lastModified": "2025-06-06T14:06:58.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-09T13:15:25.010", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Tenda CP3 11.10.00.2311090948 and classified as critical. Affected by this vulnerability is the function sub_F3C8C of the file apollo. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Tenda CP3 11.10.00.2311090948, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n sub_F3C8C del archivo apollo. La manipulaci\u00f3n provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +148,10 @@ { "url": "https://www.tenda.com.cn/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/k3vg3n/researches/blob/main/RCE_in_Tenda_CP3_camera.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5778.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5778.json index dd312dc6c0c..0db27e3a414 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5778.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5778.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5778", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T14:15:22.940", - "lastModified": "2025-06-06T14:15:22.940", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in 1000 Projects ABC Courier Management System 1.0. Affected is an unknown function of the file /adminSQL. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects ABC Courier Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /adminSQL. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5779.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5779.json index 74b229e7c31..e93f9e0aca9 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5779.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5779.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5779", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T15:15:27.177", - "lastModified": "2025-06-06T15:15:27.177", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Patient Record Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /birthing.php. The manipulation of the argument itr_no/comp_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Patient Record Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /birthing.php. La manipulaci\u00f3n del argumento itr_no/comp_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5780.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5780.json index d079177d63b..3d730d68195 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5780.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5780.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5780", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T15:15:27.377", - "lastModified": "2025-06-06T15:15:27.377", - "vulnStatus": "Received", + "lastModified": "2025-06-09T13:15:25.197", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /view_dental.php. The manipulation of the argument itr_no leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Patient Record Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /view_dental.php. La manipulaci\u00f3n del argumento itr_no provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.591128", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Thiasap/HCPMS_PHP_vulns/blob/main/sql%20injection%20in%20view_dental.php.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json index c5657728897..35886f2dddd 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5782", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T15:15:27.557", - "lastModified": "2025-06-06T15:15:27.557", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Employee Record Management System 1.3. Affected by this issue is some unknown functionality of the file /resetpassword.php. The manipulation of the argument newpassword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Employee Record Management System 1.3. Este problema afecta a una funcionalidad desconocida del archivo /resetpassword.php. La manipulaci\u00f3n del argumento newpassword provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json index c51d6b29b19..41d1dec6b9c 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5783", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T16:15:30.960", - "lastModified": "2025-06-06T16:15:30.960", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Employee Record Management System 1.3. This affects an unknown part of the file /editmyexp.php. The manipulation of the argument emp3workduration leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Employee Record Management System 1.3. Esta afecta a una parte desconocida del archivo /editmyexp.php. La manipulaci\u00f3n del argumento emp3workduration provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json index d1858588ec0..69ef78c48d4 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5784", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T16:15:31.180", - "lastModified": "2025-06-06T16:15:31.180", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. This vulnerability affects unknown code of the file /myexp.php. The manipulation of the argument emp3ctc leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Employee Record Management System 1.3, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /myexp.php. La manipulaci\u00f3n del argumento emp3ctc provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json index d92a0c94791..e431bb97f51 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5785", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T16:15:31.370", - "lastModified": "2025-06-06T16:15:31.370", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as critical. This issue affects some unknown processing of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK X15 1.0.0-B20230714.1105, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /boafrm/formWirelessTbl del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento submit-url provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json index 56ec2c968a1..3097b48d88c 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5786", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T17:15:39.037", - "lastModified": "2025-06-06T17:15:39.037", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been classified as critical. Affected is an unknown function of the file /boafrm/formDMZ of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK X15 1.0.0-B20230714.1105. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /boafrm/formDMZ del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento submit-url provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json index a6af1088e47..90014b0c7dd 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5787.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5787", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T17:15:40.630", - "lastModified": "2025-06-06T17:15:40.630", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK X15 1.0.0-B20230714.1105. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /boafrm/formWsc del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento \"submit-url\" provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json index 9cd55dfc802..7bb667f6976 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5788.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5788", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T17:15:41.797", - "lastModified": "2025-06-06T17:15:41.797", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK X15 1.0.0-B20230714.1105. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /boafrm/formReflashClientTbl del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento \"submit-url\" provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json index 6393d0cd698..e212d48e430 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5789.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5789", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T18:15:35.650", - "lastModified": "2025-06-06T18:15:35.650", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.1105. This affects an unknown part of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en TOTOLINK X15 1.0.0-B20230714.1105. Esta vulnerabilidad afecta a una parte desconocida del archivo /boafrm/formPortFw del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento service_type provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json index d0ceb1ac68b..485fc911aa4 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5790.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5790", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T18:15:35.840", - "lastModified": "2025-06-06T18:15:35.840", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in TOTOLINK X15 1.0.0-B20230714.1105. This vulnerability affects unknown code of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK X15 1.0.0-B20230714.1105. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /boafrm/formIpQoS del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento \"mac\" provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5791.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5791.json index 1bcc70dc4e4..2954c5db68c 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5791.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5791.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5791", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-06T14:15:23.137", - "lastModified": "2025-06-06T14:15:23.137", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the user's crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en el crate del usuario para Rust. Esta vulnerabilidad permite la escalada de privilegios mediante una lista de grupos incorrecta cuando un usuario o proceso tiene menos de exactamente 1024 grupos, lo que provoca la inclusi\u00f3n err\u00f3nea del grupo ra\u00edz en la lista de acceso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5792.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5792.json index 16d39b5bb75..8e5c5b84330 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5792.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5792.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5792", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T18:15:36.030", - "lastModified": "2025-06-06T18:15:36.030", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Este problema afecta a un procesamiento desconocido del archivo /boafrm/formWlanRedirect del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento redirect-url provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5793.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5793.json index 3586d2522a4..3e775fd60f0 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5793.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5793.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5793", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T18:15:36.227", - "lastModified": "2025-06-06T18:15:36.227", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Se ve afectada una funci\u00f3n desconocida del archivo /boafrm/formPortFw del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento service_type provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json index b1c53fc3acc..ed2e6095547 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5794.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5794", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T19:15:28.393", - "lastModified": "2025-06-06T19:15:28.393", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Tenda AC5 15.03.06.47. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC5 15.03.06.47. Este problema afecta a la funci\u00f3n formSetPPTPUserList del archivo /goform/setPptpUserList. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json index 3ea0ead8d10..24035fc2b6f 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5795.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5795", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T19:15:28.617", - "lastModified": "2025-06-06T19:15:28.617", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Tenda AC5 1.0/15.03.06.47. Esta afecta la funci\u00f3n fromadvsetlanip del archivo /goform/AdvSetLanip. La manipulaci\u00f3n del argumento lanMask provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5796.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5796.json index c46b3299c04..a0800df7edd 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5796.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5796.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5796", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T19:15:28.817", - "lastModified": "2025-06-06T19:15:28.817", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Laundry System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /data/edit_type.php. The manipulation of the argument Type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Laundry System 1.0, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /data/edit_type.php. La manipulaci\u00f3n del argumento \"Type\" provoca ataques de Cross Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5797.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5797.json index 0fd4e2200dd..bad06997ded 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5797.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5797.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5797", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T19:15:29.020", - "lastModified": "2025-06-06T21:15:23.293", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Laundry System 1.0 and classified as problematic. This issue affects some unknown processing of the file /data/insert_type.php. The manipulation of the argument Type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Laundry System 1.0, clasificada como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /data/insert_type.php. La manipulaci\u00f3n del argumento \"Type\" provoca ataques de Cross Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json index dc33e492890..50d2d320f8a 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5798.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5798", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T20:15:23.577", - "lastModified": "2025-06-06T20:15:23.577", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been classified as critical. Affected is the function fromSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument timeType leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC8 16.03.34.09. Se ha clasificado como cr\u00edtica. La funci\u00f3n fromSetSysTime del archivo /goform/SetSysTimeCfg est\u00e1 afectada. La manipulaci\u00f3n del argumento timeType provoca un desbordamiento del b\u00fafer basado en la pila. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json index 14ef792d822..47101ec2439 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5799.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5799", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T20:15:23.770", - "lastModified": "2025-06-06T20:15:23.770", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. Affected by this vulnerability is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC8 16.03.34.09. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n fromSetWirelessRepeat del archivo /goform/WifiExtraSet. La manipulaci\u00f3n del argumento wpapsk_crypto provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5806.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5806.json index 63b96911b09..a731b20a13c 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5806.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5806.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5806", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-06-06T14:15:23.323", - "lastModified": "2025-06-06T16:15:31.560", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins Gatling Plugin 136.vb_9009b_3d33a_e serves Gatling reports in a manner that bypasses the Content-Security-Policy protection introduced in Jenkins 1.641 and 1.625, resulting in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content." + }, + { + "lang": "es", + "value": "El complemento Gatling 136.vb_9009b_3d33a_e de Jenkins sirve informes Gatling de una manera que elude la protecci\u00f3n de la pol\u00edtica de seguridad de contenido introducida en Jenkins 1.641 y 1.625, lo que genera una vulnerabilidad de Cross Site Scripting (XSS) que los usuarios pueden explotar para cambiar el contenido del informe." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5814.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5814.json index 5050b7d0cc0..9c9be8a449e 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5814.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5814.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5814", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-07T05:15:24.913", - "lastModified": "2025-06-07T05:15:24.913", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Profiler \u2013 What Slowing Down Your WP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsd_plugin_control() function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to reactivate previously deactivated plugins after accessing the \"Profiler\" page." + }, + { + "lang": "es", + "value": "El complemento Profiler \u2013 What Slowing Down Your WP para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de comprobaci\u00f3n de capacidad en la funci\u00f3n wpsd_plugin_control() en todas las versiones hasta la 1.0.0 incluida. Esto permite que atacantes no autenticados reactiven complementos previamente desactivados tras acceder a la p\u00e1gina \"Profiler\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json index a86e63401b6..f038e96f156 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5836.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5836", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T14:15:22.500", - "lastModified": "2025-06-07T14:15:22.500", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC9 15.03.02.13. It has been rated as critical. This issue affects the function formSetIptv of the file /goform/SetIPTVCfg of the component POST Request Handler. The manipulation of the argument list leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC9 15.03.02.13. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n formSetIptv del archivo /goform/SetIPTVCfg del componente POST Request Handler. La manipulaci\u00f3n de la lista de argumentos provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json index 77a870e3728..9e93c534612 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5837.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5837", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T14:15:22.803", - "lastModified": "2025-06-07T14:15:22.803", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Employee Record Management System 1.3. Affected is an unknown function of the file /admin/allemployees.php. The manipulation of the argument delid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Employee Record Management System 1.3. Se ve afectada una funci\u00f3n desconocida del archivo /admin/alemployees.php. La manipulaci\u00f3n del argumento delid provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json index 14314017968..cf3877ea648 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5838", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T16:15:23.440", - "lastModified": "2025-06-07T16:15:23.440", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Employee Record Management System 1.3. Affected by this vulnerability is an unknown functionality of the file /admin/adminprofile.php. The manipulation of the argument AdminName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Employee Record Management System 1.3. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/adminprofile.php. La manipulaci\u00f3n del argumento AdminName provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json index a4812f57608..fc5a5ff3300 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5839.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5839", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T18:15:25.080", - "lastModified": "2025-06-07T18:15:25.080", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Tenda AC9 15.03.02.13. Affected by this issue is the function fromadvsetlanip of the file /goform/AdvSetLanip of the component POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC9 15.03.02.13. Este problema afecta a la funci\u00f3n fromadvsetlanip del archivo /goform/AdvSetLanip del componente POST Request Handler. La manipulaci\u00f3n del argumento lanMask provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json index 150c8e46369..23a1c836512 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5840", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T18:15:25.320", - "lastModified": "2025-06-07T18:15:25.320", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in SourceCodester Client Database Management System 1.0. This affects an unknown part of the file /user_update_customer_order.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to initiate the attack remotely." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Client Database Management System 1.0. Esta afecta a una parte desconocida del archivo /user_update_customer_order.php. La manipulaci\u00f3n del argumento uploaded_file permite la carga sin restricciones. Es posible iniciar el ataque de forma remota." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json index 7211f8c023a..e306132bba2 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5847.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5847", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T14:15:21.097", - "lastModified": "2025-06-08T14:15:21.097", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json index da3e9dcbc78..93c7fec7d1b 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5848", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T22:15:21.200", - "lastModified": "2025-06-08T22:15:21.200", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json index 45d84a35c2a..6390ffc7b6c 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5849", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T23:15:20.713", - "lastModified": "2025-06-08T23:15:20.713", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json index 805a14c0f88..24c113cc667 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5850", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-08T23:15:20.927", - "lastModified": "2025-06-08T23:15:20.927", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json index 6adbf2939f1..729cf588f2e 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5851.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5851", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T00:15:20.837", - "lastModified": "2025-06-09T00:15:20.837", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json index 5b9738f6555..b6fb8beca38 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5852.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5852", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T01:15:20.633", - "lastModified": "2025-06-09T01:15:20.633", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json index 9f0207309a7..df3959f1541 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5853.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5853", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T01:15:21.583", - "lastModified": "2025-06-09T01:15:21.583", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json index bae9a749b67..f223a386fa8 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5854.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5854", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T01:15:21.777", - "lastModified": "2025-06-09T01:15:21.777", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json index dd51b9d2b58..dc98a6321dd 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5855.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5855", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T02:15:23.293", - "lastModified": "2025-06-09T02:15:23.293", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json index 7333d134a31..f7b28c2230c 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5856", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T03:15:25.353", - "lastModified": "2025-06-09T03:15:25.353", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5857.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5857.json index 320496156e0..2b7ee2ee55b 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5857.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5857.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5857", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T03:15:26.000", - "lastModified": "2025-06-09T03:15:26.000", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json index 705393675e3..03ed4afff42 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5858", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T03:15:26.190", - "lastModified": "2025-06-09T03:15:26.190", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json index 27b972536d2..6e4d4f87cfb 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5859", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T04:15:45.350", - "lastModified": "2025-06-09T04:15:45.350", - "vulnStatus": "Received", + "lastModified": "2025-06-09T13:15:25.350", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.591443", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/65", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json index 3471959246e..b8d0a2fd7f2 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5860", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T04:15:48.427", - "lastModified": "2025-06-09T04:15:48.427", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json index 1e74ee5d644..99de7a25a12 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5861", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T05:15:20.297", - "lastModified": "2025-06-09T05:15:20.297", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json index 58b7ffe40f7..cc644f05928 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5862", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T05:15:21.887", - "lastModified": "2025-06-09T05:15:21.887", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json index 40dcf14f6fd..6a19e0c8a69 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5863.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5863", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T06:15:25.870", - "lastModified": "2025-06-09T06:15:25.870", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5864.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5864.json index df3ee3bcad1..4694ac6a6d8 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5864.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5864.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5864", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T06:15:26.170", - "lastModified": "2025-06-09T06:15:26.170", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5865.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5865.json index 93cab73ff40..bcdbed61464 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5865.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5865.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5865", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T07:15:22.660", - "lastModified": "2025-06-09T07:15:22.660", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5866.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5866.json index a67c9281778..dba7a00386b 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5866.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5866.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5866", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T07:15:22.947", - "lastModified": "2025-06-09T07:15:22.947", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5867.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5867.json index 5204c0706b8..440ca4fc491 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5867.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5867.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5867", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T08:15:22.140", - "lastModified": "2025-06-09T08:15:22.140", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5868.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5868.json index 84c4a282955..afafa702b9f 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5868.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5868.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5868", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T08:15:22.370", - "lastModified": "2025-06-09T08:15:22.370", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5869.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5869.json index 8e7c08520f0..610e8201ae3 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5869.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5869.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5869", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T09:15:22.320", - "lastModified": "2025-06-09T09:15:22.320", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5870.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5870.json index 58b3eb365c9..76848d11a9e 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5870.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5870.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5870", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T09:15:22.500", - "lastModified": "2025-06-09T09:15:22.500", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5871.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5871.json index e8012d5fc86..4c7daddb481 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5871.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5871.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5871", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T10:15:26.030", - "lastModified": "2025-06-09T10:15:26.030", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5872.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5872.json index cab75946918..94c4ff2eb53 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5872.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5872.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5872", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T10:15:26.370", - "lastModified": "2025-06-09T10:15:26.370", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5873.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5873.json index 3a24f3e22b6..80a7e21915a 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5873.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5873.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5873", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T11:15:22.240", - "lastModified": "2025-06-09T11:15:22.240", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5874.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5874.json index 2cc52bdb0f9..a84a9959510 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5874.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5874.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5874", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T11:15:22.440", - "lastModified": "2025-06-09T11:15:22.440", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5875.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5875.json new file mode 100644 index 00000000000..f2da15880b4 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5875.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-5875", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T12:15:21.890", + "lastModified": "2025-06-09T13:15:25.637", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in TP-Link TL-IPC544EP-W4 1.0.9 Build 240428 Rel 69493n. Affected is the function sub_69064 of the file /bin/main. The manipulation of the argument text leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://locrian-lightning-dc7.notion.site/TL-IPC544EP-W4-1f98e5e2b1a280ae9862d49391d95651", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311634", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311634", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.581366", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tp-link.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://locrian-lightning-dc7.notion.site/TL-IPC544EP-W4-1f98e5e2b1a280ae9862d49391d95651", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5876.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5876.json new file mode 100644 index 00000000000..6c0249e5b89 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5876.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5876", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T12:15:22.107", + "lastModified": "2025-06-09T13:15:25.777", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Lucky LM-520-SC, LM-520-FSC and LM-520-FSC-SAM up to 20250321. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zeke2997/cve_request_LuckyTechnologyLtd", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311635", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311635", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585821", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zeke2997/cve_request_LuckyTechnologyLtd", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5877.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5877.json new file mode 100644 index 00000000000..2fd60a53589 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5877.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-5877", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T13:15:26.017", + "lastModified": "2025-06-09T13:15:26.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Fengoffice Feng Office 3.2.2.1. Affected by this issue is some unknown functionality of the file /application/models/ApplicationDataObject.class.php of the component Document Upload Handler. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + }, + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/mcdruid/e78694d754f44884830898be082fcbaa", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/mcdruid/e78694d754f44884830898be082fcbaa#steps-to-reproduce", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311636", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311636", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586971", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/mcdruid/e78694d754f44884830898be082fcbaa#steps-to-reproduce", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5879.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5879.json new file mode 100644 index 00000000000..42d73cf931d --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5879.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5879", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T13:15:26.280", + "lastModified": "2025-06-09T13:15:26.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in WuKongOpenSource WukongCRM 9.0. This affects an unknown part of the file AdminSysConfigController.java of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Aiyakami/CVE-1/issues/7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311637", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311637", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.587201", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5893.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5893.json index 66174e53cef..c687498ad43 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5893.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5893.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5893", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-06-09T07:15:23.167", - "lastModified": "2025-06-09T07:15:23.167", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5894.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5894.json index 58e72d9571b..d69bb50fa1d 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5894.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5894.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5894", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-06-09T08:15:22.607", - "lastModified": "2025-06-09T08:15:22.607", - "vulnStatus": "Received", + "lastModified": "2025-06-09T12:15:47.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 759ba85e147..f8a55d2aa85 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-09T12:00:24.904043+00:00 +2025-06-09T14:00:20.314095+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-09T11:15:22.440000+00:00 +2025-06-09T13:15:26.280000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297048 +297063 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `15` -- [CVE-2025-27709](CVE-2025/CVE-2025-277xx/CVE-2025-27709.json) (`2025-06-09T11:15:20.807`) -- [CVE-2025-36528](CVE-2025/CVE-2025-365xx/CVE-2025-36528.json) (`2025-06-09T11:15:21.773`) -- [CVE-2025-3835](CVE-2025/CVE-2025-38xx/CVE-2025-3835.json) (`2025-06-09T11:15:21.913`) -- [CVE-2025-40675](CVE-2025/CVE-2025-406xx/CVE-2025-40675.json) (`2025-06-09T10:15:25.190`) -- [CVE-2025-41437](CVE-2025/CVE-2025-414xx/CVE-2025-41437.json) (`2025-06-09T11:15:22.053`) -- [CVE-2025-5871](CVE-2025/CVE-2025-58xx/CVE-2025-5871.json) (`2025-06-09T10:15:26.030`) -- [CVE-2025-5872](CVE-2025/CVE-2025-58xx/CVE-2025-5872.json) (`2025-06-09T10:15:26.370`) -- [CVE-2025-5873](CVE-2025/CVE-2025-58xx/CVE-2025-5873.json) (`2025-06-09T11:15:22.240`) -- [CVE-2025-5874](CVE-2025/CVE-2025-58xx/CVE-2025-5874.json) (`2025-06-09T11:15:22.440`) +- [CVE-2025-40668](CVE-2025/CVE-2025-406xx/CVE-2025-40668.json) (`2025-06-09T13:15:22.633`) +- [CVE-2025-40669](CVE-2025/CVE-2025-406xx/CVE-2025-40669.json) (`2025-06-09T13:15:22.803`) +- [CVE-2025-40670](CVE-2025/CVE-2025-406xx/CVE-2025-40670.json) (`2025-06-09T13:15:22.963`) +- [CVE-2025-41444](CVE-2025/CVE-2025-414xx/CVE-2025-41444.json) (`2025-06-09T12:15:21.240`) +- [CVE-2025-48053](CVE-2025/CVE-2025-480xx/CVE-2025-48053.json) (`2025-06-09T13:15:23.163`) +- [CVE-2025-48062](CVE-2025/CVE-2025-480xx/CVE-2025-48062.json) (`2025-06-09T13:15:23.320`) +- [CVE-2025-48877](CVE-2025/CVE-2025-488xx/CVE-2025-48877.json) (`2025-06-09T13:15:23.500`) +- [CVE-2025-49006](CVE-2025/CVE-2025-490xx/CVE-2025-49006.json) (`2025-06-09T13:15:23.650`) +- [CVE-2025-49013](CVE-2025/CVE-2025-490xx/CVE-2025-49013.json) (`2025-06-09T13:15:23.803`) +- [CVE-2025-49130](CVE-2025/CVE-2025-491xx/CVE-2025-49130.json) (`2025-06-09T13:15:23.977`) +- [CVE-2025-49131](CVE-2025/CVE-2025-491xx/CVE-2025-49131.json) (`2025-06-09T13:15:24.120`) +- [CVE-2025-5875](CVE-2025/CVE-2025-58xx/CVE-2025-5875.json) (`2025-06-09T12:15:21.890`) +- [CVE-2025-5876](CVE-2025/CVE-2025-58xx/CVE-2025-5876.json) (`2025-06-09T12:15:22.107`) +- [CVE-2025-5877](CVE-2025/CVE-2025-58xx/CVE-2025-5877.json) (`2025-06-09T13:15:26.017`) +- [CVE-2025-5879](CVE-2025/CVE-2025-58xx/CVE-2025-5879.json) (`2025-06-09T13:15:26.280`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `157` -- [CVE-2025-2784](CVE-2025/CVE-2025-27xx/CVE-2025-2784.json) (`2025-06-09T10:15:22.457`) -- [CVE-2025-32049](CVE-2025/CVE-2025-320xx/CVE-2025-32049.json) (`2025-06-09T10:15:24.673`) -- [CVE-2025-32914](CVE-2025/CVE-2025-329xx/CVE-2025-32914.json) (`2025-06-09T10:15:24.927`) -- [CVE-2025-4948](CVE-2025/CVE-2025-49xx/CVE-2025-4948.json) (`2025-06-09T10:15:25.730`) +- [CVE-2025-5852](CVE-2025/CVE-2025-58xx/CVE-2025-5852.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5853](CVE-2025/CVE-2025-58xx/CVE-2025-5853.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5854](CVE-2025/CVE-2025-58xx/CVE-2025-5854.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5855](CVE-2025/CVE-2025-58xx/CVE-2025-5855.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5856](CVE-2025/CVE-2025-58xx/CVE-2025-5856.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5857](CVE-2025/CVE-2025-58xx/CVE-2025-5857.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5858](CVE-2025/CVE-2025-58xx/CVE-2025-5858.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5859](CVE-2025/CVE-2025-58xx/CVE-2025-5859.json) (`2025-06-09T13:15:25.350`) +- [CVE-2025-5860](CVE-2025/CVE-2025-58xx/CVE-2025-5860.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5861](CVE-2025/CVE-2025-58xx/CVE-2025-5861.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5862](CVE-2025/CVE-2025-58xx/CVE-2025-5862.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5863](CVE-2025/CVE-2025-58xx/CVE-2025-5863.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5864](CVE-2025/CVE-2025-58xx/CVE-2025-5864.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5865](CVE-2025/CVE-2025-58xx/CVE-2025-5865.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5866](CVE-2025/CVE-2025-58xx/CVE-2025-5866.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5867](CVE-2025/CVE-2025-58xx/CVE-2025-5867.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5868](CVE-2025/CVE-2025-58xx/CVE-2025-5868.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5869](CVE-2025/CVE-2025-58xx/CVE-2025-5869.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5870](CVE-2025/CVE-2025-58xx/CVE-2025-5870.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5871](CVE-2025/CVE-2025-58xx/CVE-2025-5871.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5872](CVE-2025/CVE-2025-58xx/CVE-2025-5872.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5873](CVE-2025/CVE-2025-58xx/CVE-2025-5873.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5874](CVE-2025/CVE-2025-58xx/CVE-2025-5874.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5893](CVE-2025/CVE-2025-58xx/CVE-2025-5893.json) (`2025-06-09T12:15:47.880`) +- [CVE-2025-5894](CVE-2025/CVE-2025-58xx/CVE-2025-5894.json) (`2025-06-09T12:15:47.880`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1c93bc45985..63f238d859b 100644 --- a/_state.csv +++ b/_state.csv @@ -248223,8 +248223,8 @@ CVE-2024-13083,0,0,9baf862c4a01e16469f726f0f2436d28244783672ca85ea8f1f8981937170 CVE-2024-13084,0,0,f2c72f4c09d45c5cd33a8dc82e8e6f76fce41bba98f78ae1d6ecedd64730d79d,2025-01-06T14:44:57.910000 CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40fedb,2025-01-06T14:43:13.437000 CVE-2024-13086,0,0,7ac42c524055e40fca53eb99442db6298fae490b3d2a5b9bd9dde151851588be,2025-03-07T17:15:18.430000 -CVE-2024-13087,0,0,35260f13a79cf139041023831654c64219b8f809a7b38814600971834708570f,2025-06-06T16:15:22.573000 -CVE-2024-13088,0,0,0272f4b3c968a816786485aafa87f084bd478cc6c925669a3769d54b35ce88a1,2025-06-06T16:15:23.323000 +CVE-2024-13087,0,1,de9220c2f3228338d6992a72f028e115aecfe3e99735d21a56e1a464c6d673c9,2025-06-09T12:15:47.880000 +CVE-2024-13088,0,1,f092e286d50e3d3e98d13de53109368260b6d1e8323f34fd9cce2a144359b3de,2025-06-09T12:15:47.880000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000 @@ -267203,7 +267203,7 @@ CVE-2024-42363,0,0,016fd44098d7ee781aaaf122c9954b2ea3b5c3d262b5245aa15acd0ae03c6 CVE-2024-42364,0,0,06f185982c633dbf35ef3dcfd82b1b12e745db21175edbe91e9aeba2a2692614,2024-09-12T18:20:20.257000 CVE-2024-42365,0,0,ead76b15b87ac6142d6f994d7385c787b9aea9606d977ac43fd2f6a408c1a2ac,2024-09-16T20:23:18.407000 CVE-2024-42366,0,0,fe2de9d85a95a85521a76d5ce40ade16338e4d44476acc8cc15bd153081d3ad8,2024-08-29T14:04:30.733000 -CVE-2024-42367,0,0,e34dd363e9e6032e059689ceff268db7a36b09f4bac71bf0c668383e8d6376df,2024-08-12T13:41:36.517000 +CVE-2024-42367,0,1,6b86c19ac9434d9f21c7c13f14dd895d665e05a5450e96ed917e2c2a85ee2cfa,2025-06-09T13:15:21.623000 CVE-2024-42368,0,0,19e372245223d5bb59e2a2b159dac4fce32005cdff2c12524f2e355da94a1885,2024-08-14T02:07:05.410000 CVE-2024-42369,0,0,175cc06a3214faa9cc4f994eee20c18b9c3cdbd351d8ab0c3628aac013a129a4,2024-08-21T16:01:03.147000 CVE-2024-4237,0,0,d086b479a235cfd23d8c9e6a65bb640182ae630c53f963ea26e200af8e904637,2025-01-27T18:30:46.217000 @@ -273322,7 +273322,7 @@ CVE-2024-50402,0,0,28472c7defbbac1b7ee91e0374b734ad9c07484f87a0834b751e8761f9fd2 CVE-2024-50403,0,0,a4aa183b6f66c4ffb2fd1f183c9279ee43b63cdcaf8bd051b52907975e4618c5,2024-12-06T17:15:09.900000 CVE-2024-50404,0,0,b5b2cf7f4bf1d6f93ea84548591911fd77b0383a18caa9c4b41e9f2a677f47b0,2024-12-06T17:15:10.043000 CVE-2024-50405,0,0,06e3b60885c6440ab76c773e978b8803975ccdad2c31fc890d225b2f4d48208f,2025-03-07T18:15:41.860000 -CVE-2024-50406,0,0,5d949256504083c95f77236e1d75ad6767e7a8c329c49774df341d7f1fc59d72,2025-06-06T16:15:23.500000 +CVE-2024-50406,0,1,4dec97ad6aa38a2e952a00c4615746df5ff40b1d945d50f8c3750ed16d9f3f0b,2025-06-09T12:15:47.880000 CVE-2024-50407,0,0,9866052bb59192baca2967b3bc2111164d6bd7872bf340b1aca3f2c160296628,2024-11-07T20:28:22.860000 CVE-2024-50408,0,0,58a47a84acdf0f836c9f8a5fa3c21e90b2d2f3c587c1b70e5c24f5387d6b7c59,2024-10-29T16:01:08.447000 CVE-2024-50409,0,0,d098af286ab64a0110f5be7e77620539ec040083e43f27de87ded5e888586c5d,2024-11-07T20:28:43.577000 @@ -276772,7 +276772,7 @@ CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb643164424 CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000 CVE-2024-55581,0,0,c4461aeefe710b8127c139746d541669508c4f036fc04415a5c2df9466c650ae,2025-04-07T18:39:22.837000 CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000 -CVE-2024-55585,0,0,0f7c661ba4dfaf575227f6713aaef1b832bbfabbe5bb617576dabc535accb22b,2025-06-07T20:15:23.417000 +CVE-2024-55585,0,1,63af7fe272df8dfd7051e22f6478ef78915d30c921c3f7c1479cb5a0fa0f2941,2025-06-09T12:15:47.880000 CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000 @@ -277654,7 +277654,7 @@ CVE-2024-56800,0,0,1070967245f97018d7931f1b8b9aae6488fa864b099e181ef436fe219b367 CVE-2024-56801,0,0,6cef8dddf864e165aa4a99ecadbdf0b87f7bd86d5c6e0ade6e7a30e3abe18a7a,2025-02-07T15:24:01.100000 CVE-2024-56802,0,0,ca8c864df520606afd51db2524a82ddab30d22123f6eef6cec3ac696eba93af5,2024-12-31T16:15:28.240000 CVE-2024-56803,0,0,1584d41fd9d3e6beb3be7c57bb8ba96341667bc6ec41b946b6138146b4297f8b,2024-12-31T23:15:41.553000 -CVE-2024-56805,0,0,c3c4099e049365293de69b0d2010b61b03c0ed630a246eda3b08848a3c903feb,2025-06-06T16:15:23.660000 +CVE-2024-56805,0,1,c7241bff979e410b7543eb65959837a02763623cff6a4961735c79d51c1eb582,2025-06-09T12:15:47.880000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 CVE-2024-56810,0,0,194a35bc92d3f9958aea6b769fb050479e40c23a506bee57531c36053803ff2a,2025-02-27T15:15:39.930000 CVE-2024-56811,0,0,a175c74dc672ed974260adb2523ba1d1cc36b446afb4b300e1f0c115c8f66a38,2025-02-27T15:15:40.067000 @@ -282390,8 +282390,8 @@ CVE-2024-9988,0,0,3a57a3bd1e1ea4f8d09bc695c1d0c77c1048ce16774434f3ccd260190d6620 CVE-2024-9989,0,0,618b83ec3907f65a51fa013819dfb2ad0168aaafe2f1ce04204110fa9825808c,2024-11-07T17:00:56.337000 CVE-2024-9990,0,0,242153fdd1e5955fd6e7a309b2c58cf53a3438553f63cd46d750d9018c4da6a2,2024-11-06T23:11:42.037000 CVE-2024-9991,0,0,d52f7f0e4baa2d457c00639209b566401d8bb298d0ede1bbcb21455e0c81280d,2024-10-28T13:58:09.230000 -CVE-2024-9993,0,0,95c1040cd57eee6b06a91fe2322ddc9ed17b93d1827961082f34f8f17a98eb56,2025-06-07T12:15:21.360000 -CVE-2024-9994,0,0,4f421cd3ba4fc6f7f5daa890c3cd2d4f2d22be29613fbef6ace9bdec75749782,2025-06-07T12:15:22.963000 +CVE-2024-9993,0,1,75920f73a36e3eae972eae7ffced3aa15a2d2093ff9f36a4fd60b8ff7af6a32a,2025-06-09T12:15:47.880000 +CVE-2024-9994,0,1,b08b85c8069a18a0c0ed2894b311445ac185625f076640afd8cea18468da6f2e,2025-06-09T12:15:47.880000 CVE-2024-9996,0,0,188a485776485f9e8dc9179367e7d7a07cab50fec958b227455a8676b5858255,2025-02-10T21:15:21.700000 CVE-2024-9997,0,0,51821db7d21cbb0538794082049a61caa9f4a383f155309224dbe8f2cd1118b1,2025-04-04T15:15:46.203000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 @@ -282846,7 +282846,7 @@ CVE-2025-0615,0,0,ebbe675921592ae8cbe2172db6e2765a464d273fff841eec1146e0ddf51f2d CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af4e,2025-01-29T11:15:09.330000 CVE-2025-0618,0,0,a593804ad72ce2a28c45218d44c74c44e97fb22bf3ef7b7191613950f392edd2,2025-04-23T14:08:13.383000 CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000 -CVE-2025-0620,0,0,06f33e4903f6824d7323f2852ddc895878005f3fc9ca5977b1968a853dc024c9,2025-06-06T14:15:21.247000 +CVE-2025-0620,0,1,d3273284b9a9e4aceff19b5468f1fd1d29ddd1c0883f7a63a9c27032ea46d0a1,2025-06-09T12:15:47.880000 CVE-2025-0622,0,0,229742090c833003a7f4d1cfe9dcad29abd83cefc6f00fded6ecc64324cc88e4,2025-05-13T20:15:25.703000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0624,0,0,5e7cc7e5662444cde03f306d8020f755456ce74e001137340eb6cbb9d3fbcdcc,2025-05-21T15:16:04.547000 @@ -284003,7 +284003,7 @@ CVE-2025-2006,0,0,d5d74f41fa3ae9bbd4fe95b11d94c32b823c104859d3441c59ab51ca4eb67b CVE-2025-20060,0,0,ef26af373b8c1500801575569870314eee69d6fc265fd3cd0ef2de4362a965d5,2025-02-28T17:15:16.440000 CVE-2025-20061,0,0,6979d6e76b2847064c2a9b7a24215846556b4a731cf1290fe0f120404af6a611,2025-01-29T20:15:35.363000 CVE-2025-20062,0,0,3578081cc9bd1cb38fdf9704ce1103b0e0f63ee830e3be5ad1e5e7e85f40bab2,2025-05-16T14:43:56.797000 -CVE-2025-20063,0,0,8f881c32062223f91b1b3afeffe9615cfc0f139874f7665053386d27ee437c6f,2025-06-08T12:15:20.493000 +CVE-2025-20063,0,1,a80ecb0bba49b8074767c66a614171403c45f913b9141712ef6e97075674db6b,2025-06-09T12:15:47.880000 CVE-2025-2007,0,0,da59d82323527ec1abfe9f480cc8fe1fd6651069aa66cdf2f4f8acbf4750a509,2025-04-01T20:26:11.547000 CVE-2025-20071,0,0,20298223494bb4a4d40c9c5bd0bf2218fcf397c3599f0ea9a641e3e4ec386ed0,2025-05-16T14:43:56.797000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 @@ -284421,7 +284421,7 @@ CVE-2025-2106,0,0,12e6a433d251be1a7b8caba06a5be90b0fd1db509f397a8d7d7499b4e464ef CVE-2025-2107,0,0,135bf09ff50485dd2912025078b557b35b087079462172252b9881a30af6dc30,2025-03-13T02:15:13.250000 CVE-2025-2108,0,0,60b4ae79e344e4658824ff2975004a181bb22f5bb0373a3558afeca319c66e13,2025-03-20T07:15:38.187000 CVE-2025-21081,0,0,2001a89bc61e9590c36304579e4e9d48d5980697f9b552f01b260ec73e2e53cb,2025-05-16T14:43:56.797000 -CVE-2025-21082,0,0,6601b173ecd97c3aff0e032251a87d76cd91a48e3a196b10366db64e6d8127e4,2025-06-08T12:15:21.433000 +CVE-2025-21082,0,1,ca7da96832fead64976909e5eb126767112a102c25be83da5bc79f7fb011e8f6,2025-06-09T12:15:47.880000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21084,0,0,af34ba3562290d89d6e1fadbcb1efbf04888823c3570480deec642a909378dd0,2025-03-04T17:42:20.943000 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 @@ -285716,12 +285716,12 @@ CVE-2025-22478,0,0,581a5f745c8e6e0231f6143e773a9eb6d230b0d53e7237fccf8d3d76cc422 CVE-2025-22479,0,0,1020ed0786a0c53974ebfcb601d1f02d18778bef0e765c0c2884bd0e7b0f68ff,2025-05-13T20:18:11.457000 CVE-2025-2248,0,0,c777d68e94acb7df7f51d66a6234f2e224456943a6065bd7a816052673458dc6,2025-06-04T20:03:58.247000 CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 -CVE-2025-22481,0,0,d74c9adfee1121da6a1e6f2d58cb11ada31a80bc7c544b0607c7fafc3d69ef0d,2025-06-06T16:15:23.877000 -CVE-2025-22482,0,0,a8e89db2e4260d7d21d7b67ed88b68525e45b5132a6520096bc2e01c9a58de16,2025-06-06T16:15:24.023000 -CVE-2025-22484,0,0,08224f26f52f4e16503913d7a9e727f145339af9b37a01b5624bd3cf87632d95,2025-06-06T16:15:24.187000 -CVE-2025-22486,0,0,0bf5f5a60a5cb32b416a663fa2e5e8c25d3442a416e7fa7e70186e2b43cf84a4,2025-06-06T16:15:24.330000 +CVE-2025-22481,0,1,7b864b7258505afce9228649cf97314a1268030f45b646a8de114cacb93021ff,2025-06-09T12:15:47.880000 +CVE-2025-22482,0,1,19e32c8f5fea81e98f4e317d5fd253a921758681617913a284c874fb91a9e8dd,2025-06-09T12:15:47.880000 +CVE-2025-22484,0,1,d2520b9969e256dd4d35f06d64cb28bdc2f60bbe1055f5fc8a53187a0a8ef0ef,2025-06-09T12:15:47.880000 +CVE-2025-22486,0,1,54d317d1aa19a56bfb613353e45de591250517a60cfa97b710fe645a1c945426,2025-06-09T12:15:47.880000 CVE-2025-2249,0,0,b8b4319df0eeaddaa08416535fc97107b599907518d1e8273137ec9437aa4b47,2025-04-01T20:26:30.593000 -CVE-2025-22490,0,0,7e5f2ff5a52a80d60adb4bf67b53061f31607fc04f0aef85cd22febbcd4a8465,2025-06-06T16:15:24.487000 +CVE-2025-22490,0,1,bd578ae08e92930d9217b0c865e6e83bd31f7511e8767453b680d34e03ba25c4,2025-06-09T12:15:47.880000 CVE-2025-22491,0,0,ad85f2f60683d1b1d15d527fe2b105a5594d84c0da0f697daa4684f44b948c2e,2025-02-28T09:15:12.540000 CVE-2025-22492,0,0,6675658809687c830ee351f78ca107f7df64e972ba8ef72f245dee116e840551,2025-02-28T09:15:12.680000 CVE-2025-22493,0,0,d929c5d6113570551417420f2e90fa0b9e868f3eee937ae9b18c8bf109c1b5b2,2025-03-05T09:15:10.443000 @@ -286384,7 +286384,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe CVE-2025-2323,0,0,38dc6c42b7b635e3caddc5b01ae9aa4a1f84282e9ca11a611a0d7850c76ef099,2025-03-15T17:15:36.610000 CVE-2025-23233,0,0,9d0894e8f043e8d2e3d9f99b4c5bfc27819eaf2a631a882e6cbd474030b88962,2025-05-16T14:43:56.797000 CVE-2025-23234,0,0,0aa84930362b667d70a5001cc89de9e9c7d2ff576260338d532dbdb11280c011,2025-03-04T17:40:00.083000 -CVE-2025-23235,0,0,82992cc2697fb66d238f80c5457cdcce19c463b1c19867fc702edbcf6ae2316a,2025-06-08T12:15:21.590000 +CVE-2025-23235,0,1,053e7f86f661558d383b3a03726a984e62dc4f39892bcf75a125546184da7893,2025-06-09T12:15:47.880000 CVE-2025-23236,0,0,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 CVE-2025-23239,0,0,73761053f1cf486225f31cfbe2c5d7282e449e2379e63bc42bc6b88358fef062,2025-02-05T18:15:31.373000 @@ -287480,7 +287480,7 @@ CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eec CVE-2025-24487,0,0,6cfb50534b9f66df8c6ab5b7fd99a29e22eab1acb6c93c8413ece70cd6d8bafc,2025-04-16T13:25:59.640000 CVE-2025-2449,0,0,0dbd069203a80b660cdb63a2610dc85f23643235633ff15eeaf11d0c77ab186d,2025-03-18T14:15:45.670000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 -CVE-2025-24493,0,0,1ce2c11ba5bc993c2fad7b4be87e31ce585e37e0e8a613fa22604c729f706524,2025-06-08T12:15:21.763000 +CVE-2025-24493,0,1,fdb66e8ca53b9f884c9dd06c53af3ba981007bf583927e7d2c39b353d9ed623b,2025-06-09T12:15:47.880000 CVE-2025-24494,0,0,43ac2d60a286060ae572ec37f3d35d579c4245be449efae1f59958937f264e22,2025-03-05T16:15:38.937000 CVE-2025-24495,0,0,e05ac5fb553cb7bdef2f83a624ac7e903dfc7b9db7dcae5dbf9b1cb088de8cfd,2025-05-16T14:43:56.797000 CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000 @@ -288093,12 +288093,12 @@ CVE-2025-25203,0,0,040b03b28fff3f91466e7eaa5a2d6143cc21f99e3d967437d45c81f30cd9c CVE-2025-25204,0,0,119932f98cc8b58871d029f6ccd9a89a806462d1c2b6c06ee7f6d1cb510c31af,2025-02-14T17:15:19.140000 CVE-2025-25205,0,0,53d346539ec5bb58856ce63a9d1fdca5438e2c859c2047a9cb707ece5a8bcbe8,2025-02-12T19:15:21.717000 CVE-2025-25206,0,0,9f668b067e3e448579721524d9498db32e90e7d300d6cfeef5961eac800c1c31,2025-02-14T17:15:19.327000 -CVE-2025-25207,0,0,0e0e829685716ecaf759b88ee7f1a127bb4d67ef50c8a9747c9c0f18797d0855,2025-06-09T06:15:24.413000 -CVE-2025-25208,0,0,2cb54ece6be4fc5be8d5da7ec45f5e96a01cd7bf7b477bf9a03f30ff0c08c70a,2025-06-09T06:15:24.667000 -CVE-2025-25209,0,0,f9bb4fdb4861f6a5c3332f6a81c8217b23bda315e14a275024d2c4a778590a02,2025-06-09T06:15:24.853000 +CVE-2025-25207,0,1,d2c1637c3ac75b7ed5c416d3be194ace3ceb0c915066acf4d2876f097631a990,2025-06-09T12:15:47.880000 +CVE-2025-25208,0,1,1babdf0da15439521fe543d31f9f6d67b42bee417cefee202809ea696e0778e0,2025-06-09T12:15:47.880000 +CVE-2025-25209,0,1,0aa853401b6b75209cd7b56e58149d52405e55b58a8364fbad4464a2e6d7fef4,2025-06-09T12:15:47.880000 CVE-2025-25211,0,0,cc654165143e1a6a565806b2fc146b90cc33ea614905ce025bd44c72692f30c8,2025-04-01T20:26:30.593000 CVE-2025-25213,0,0,4b306f44f1e5df4d081a6c0fb4426c0cd2686db9ca8e9c6904e1b2bea864dca1,2025-04-09T20:02:41.860000 -CVE-2025-25217,0,0,58cf9d35ac5fa2a92b051fa347e53fb769b1db03984f073f24ffed20906c5810,2025-06-08T12:15:21.933000 +CVE-2025-25217,0,1,40f7da79f01bb24e5536c3a7e2d58e020bad609d3c6837747ddf9e56abc855fb,2025-06-09T12:15:47.880000 CVE-2025-25218,0,0,fba0872e99b54dc5764f05bf49635253da00a326eff6e2ff854aa21ca321508d,2025-05-09T19:06:17.877000 CVE-2025-25220,0,0,3e48240fbed17896ea7da609293ff3c7512ec69524229da5c9de3065be015d34,2025-03-18T09:15:13.750000 CVE-2025-25221,0,0,da7f39219236daa10c6a9a322f77562859face44f96d9c55ab9ddbe74ace6d9f,2025-02-18T01:15:09.070000 @@ -288830,9 +288830,9 @@ CVE-2025-26686,0,0,875d6e2e2335e247eb60c92fd966d311965d4dfa5b2e37254f2e9c381e740 CVE-2025-26687,0,0,3e22551589e4ec527d753d1d500a0d81debbda8185553b19774b1c6aad2170f5,2025-04-09T20:03:01.577000 CVE-2025-26688,0,0,21b07cd2440210e182a8d6b8137627939ef3f62b96f51db277c59d6502d24206,2025-04-09T20:03:01.577000 CVE-2025-26689,0,0,dec5b99891737ae6a49560338e391a9fd35d35000ff58423c3aa4180c66c711d,2025-04-01T20:26:30.593000 -CVE-2025-26691,0,0,9e29b7a249fafa6d2967e8938440ce5458f221ff0244f50437a7415f0c37cc3c,2025-06-08T12:15:22.093000 +CVE-2025-26691,0,1,6fe5f3561890fa718f566c2d1a51493e2cdd5b7cfa38eaec1813106a7f0aa782,2025-06-09T12:15:47.880000 CVE-2025-26692,0,0,254a0626b24ab412c5b839817131becc67f683a51ef18efa9c64e438fb6bbc9e,2025-04-29T13:52:10.697000 -CVE-2025-26693,0,0,78018f3bf4fc9e7858a832020111818cd54fc95a70dc39fd7df6967339866842,2025-06-08T12:15:22.260000 +CVE-2025-26693,0,1,5d818dcb2c8dd8d4fa69b38a71cba2e4052e2f6135d4c0ed7a03aaaff5cbcc66,2025-06-09T12:15:47.880000 CVE-2025-26695,0,0,f077e716806e3aa11572737cbb762272530f7e8504d9bb6d9406f576cc783416,2025-04-03T13:30:39.037000 CVE-2025-26696,0,0,b9658e1d3c0f3dd4003407283a716267ae4de824c8808025c4c0cd47206d44f0,2025-04-03T13:30:33.593000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 @@ -289145,7 +289145,7 @@ CVE-2025-27113,0,0,3f927ac99bedded3f15625d404f90be5185a2dbbeb1f3658f62dd072e77cf CVE-2025-2712,0,0,f459821222a72c79cc7ff9a9b481a8bc6ba3bcc2247f05dabdfc4ed09d6e195d,2025-03-27T16:45:46.410000 CVE-2025-2713,0,0,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000 CVE-2025-27130,0,0,a1dc5070cb706965f29565e1845bf948cc8ae12d305309227937d0f3062f821a,2025-04-01T20:26:11.547000 -CVE-2025-27131,0,0,ddf774c63f1d24bde47e5c849c70e3770df9708965df642992a4102abf69be79,2025-06-08T12:15:22.423000 +CVE-2025-27131,0,1,aea51e9b40422a78fff967501e7e056eb3da818efde9be0c84f083bd134ae62b,2025-06-09T12:15:47.880000 CVE-2025-27132,0,0,b1a8a12d0148537a02c0d96ce9420181e0484ee5a2e7e39fdd1e47ef3d526ac3,2025-05-09T19:14:30.360000 CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000 CVE-2025-27134,0,0,5fd775f971c7476e093d169270d7a42aa9ce8b27b84358718e7f8ecbff454f65,2025-05-16T16:32:35.957000 @@ -289232,9 +289232,9 @@ CVE-2025-27221,0,0,49e7be9560dc9cc77f297711484d4ecb5ba5b672bef56754e4d2d3990afad CVE-2025-2723,0,0,52e45c0ba96402a35fab3eb286730cbe627c9a2787e2f2127fb3c173463fb2d6,2025-04-22T13:15:43.140000 CVE-2025-2724,0,0,4610ac8ad922ea624cd2d35c755551566dc6e12e181c5f6d5e7e865b18b82086,2025-04-22T13:15:43.203000 CVE-2025-27241,0,0,5f3f6499b682ea2df4f525925370f561106f8235867d4ad8fc9ab0cd76693210,2025-05-09T19:14:21.627000 -CVE-2025-27242,0,0,6e014c2b3833a9e8588f91f5d9f61aa34ae221c161b0282d29c71bdcf1cf5773,2025-06-08T12:15:22.583000 +CVE-2025-27242,0,1,4e62bf9c35b5aaff138bccb1f91bf9b1b88c17e0c48d8685810867712c369004,2025-06-09T12:15:47.880000 CVE-2025-27244,0,0,86fab9c76c6855c3f65d6fe655fad17ea7f4d78587bc5a57db26b5cf4b92bc76,2025-04-02T14:58:07.527000 -CVE-2025-27247,0,0,8b8100c365f98c7a09c12219488c2b5519bcc285ae77113169ba5c1e95c60120,2025-06-08T12:15:22.733000 +CVE-2025-27247,0,1,369dd68158d8e08a0a4a7e6ac616370389a7740c9d92ca6ee053b9480699856d,2025-06-09T12:15:47.880000 CVE-2025-27248,0,0,fecd2c1f71e975d5a7a66828a8b8c63d27847b5ba5cdc677ce3ae8da25e6ebf8,2025-05-09T19:14:06.030000 CVE-2025-2725,0,0,4c49041f815970a2f0962172abde8e9b997e751be7cfde55bbadd432ffae1641,2025-04-11T20:15:22.937000 CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000 @@ -289479,7 +289479,7 @@ CVE-2025-27525,0,0,a4b246e05aa8e9149e0a9842b4c6807efcd61fab385038ed52473da98c7e4 CVE-2025-27526,0,0,ddc528ca33e807ad7bd5971d3e294beeb24112a05eee8ee501fa1c1a70ff05da,2025-06-03T15:36:56.813000 CVE-2025-27528,0,0,737d925979e07df03f0b19543dbdef55dc6a203923452f1c2a733ea2711ffa92,2025-06-03T15:36:47.120000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 -CVE-2025-27531,0,0,5452f5b190efa89ef8be415705aee88da5a91bdafcb01601a0d1d79c4fe16969,2025-06-06T15:15:23.883000 +CVE-2025-27531,0,1,9397fd6f5bb41c7c16cafe0bf6c6879d5b9498685b699b089024b73cb6d8b05e,2025-06-09T12:15:47.880000 CVE-2025-27532,0,0,651aa4a409c4869b141a04074791dba5e586b669772ff0617df8a664fec2b98e,2025-05-02T13:53:40.163000 CVE-2025-27533,0,0,b646a1fe0a6d11554ef785ea8ecefbb2ab2f1a88b51b3c456731090eb57b5f27,2025-05-07T14:13:20.483000 CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000 @@ -289496,7 +289496,7 @@ CVE-2025-27556,0,0,4ca86b14fb70d2b656f3535be9cca045a182add78643be3ce819c6025668a CVE-2025-27558,0,0,36f74819ef16427985854dfa04d27faf45c7f71f4482aa2cdead32788e417814,2025-05-22T19:15:43.790000 CVE-2025-2756,0,0,092a25b42b3189a59251afe4527fb8569dc69374ff038cad349569e68ebf3853,2025-03-27T16:45:46.410000 CVE-2025-27561,0,0,9a2ed6a48d4c37646f33372f3188d4d9d564856295e313ebd6cb5bf15b4af1ba,2025-04-16T13:25:37.340000 -CVE-2025-27563,0,0,c24095a4ac461f554aa177b7e5acd8c71327456920fe82f62b83577809a6b4ff,2025-06-08T12:15:22.917000 +CVE-2025-27563,0,1,8db8a18450ed8df51ce5577acdf9c44d267086174b312a93939d7ab8afa959cc,2025-06-09T12:15:47.880000 CVE-2025-27565,0,0,e150582bbd4ca1404978c02e2de39c9c934be7297b5291301044964574dfba69,2025-04-16T13:25:37.340000 CVE-2025-27566,0,0,20151802c77a54c11d86158716186dd611d922e0ea863da24950c80acc30e475,2025-05-19T13:35:20.460000 CVE-2025-27567,0,0,8ca9b74c3e219a4d15e6ee8281f7f16769702266f24ed34aea1ada953bbf2d6a,2025-03-28T18:11:40.180000 @@ -289573,7 +289573,7 @@ CVE-2025-27656,0,0,dc5fc2c3c8a07c3a3cfe1ee867d42fde63655b6c9bddf068a07c7bc74ae1a CVE-2025-27657,0,0,3eddb2d82080e689fb7a38a26491cf85af6f11c0b6c2f8b880fc98ccf7cbb284,2025-04-15T22:15:23.297000 CVE-2025-27658,0,0,0a24404418538ac121d7c4c4d8f44e3f618fd8f7b009a95b9a16f5a27c30cc30,2025-04-01T20:52:35.280000 CVE-2025-27659,0,0,6989eae856811847c2a58c863f54f44cb2dcbec3e10efcd978081087ac6c7169,2025-04-01T20:52:40.093000 -CVE-2025-2766,0,0,9b1f5f2e9dfc091985c96c027ccf7610a1d9f346d8550706c8f521f5867b908d,2025-06-06T19:15:26.930000 +CVE-2025-2766,0,1,7ae136b39a95febb6ce17e0644e83c4c93603a3ee2ff81d847f5a07021f006dd,2025-06-09T12:15:47.880000 CVE-2025-27660,0,0,3a0899dbc46812a2590e82860ab081b5510035133bae348d96e775c97781ae71,2025-04-01T20:52:30.800000 CVE-2025-27661,0,0,869daaf4557f5365a322d5447c96a298787adea4b5ab9a153eff276733cb0538,2025-04-01T20:52:26.040000 CVE-2025-27662,0,0,51f9a933b126beaf1b2bbf92aaf57c2055219e6474859e87b287385577c6458b,2025-04-01T20:49:44.823000 @@ -289619,7 +289619,7 @@ CVE-2025-27703,0,0,f41288ec5900955b0cf9466ed3e7f5c768dfb1d7c1369c8b047bdaee8bb89 CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000 CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000 CVE-2025-27706,0,0,366db5baaa6540a4830c30306563c995abcbb80dda2cc2e6aaf1e42c68352033,2025-06-04T19:59:30.750000 -CVE-2025-27709,1,1,3151dac52c56bb04a5541c9aac0632fde6a230c7b5dd16a3658326ff7d5ba294,2025-06-09T11:15:20.807000 +CVE-2025-27709,0,1,b0f674e578303733cb72f4bc9f90d978267da4e2fbaea214fcb0213ad43ea5b1,2025-06-09T12:15:47.880000 CVE-2025-2771,0,0,669ee5eb97646afb82a0694c49c0b6d1df006accbc659c269487c2a90325f7e3,2025-04-29T13:52:47.470000 CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000 CVE-2025-27716,0,0,65bcc3c5b3482c33d19a88cecf33eda0c46f0e6a542313f4127f96639786d02e,2025-03-28T18:11:40.180000 @@ -289723,7 +289723,7 @@ CVE-2025-27835,0,0,bfd55bfd7467fd1074b48c9c5b6d2f6f88f9d233c37b427ef5473af1632e7 CVE-2025-27836,0,0,f465c8991d790bdb41314bcd1316c06a9f596110c7a85fa30ce1c38f1408796a,2025-04-01T16:35:25.050000 CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e550,2025-04-01T16:35:15.650000 CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 -CVE-2025-2784,0,1,a8f30d5bfa2d3cb94a268e478af752e8103b971e3168ec97fef63ef7d1d50bec,2025-06-09T10:15:22.457000 +CVE-2025-2784,0,0,a8f30d5bfa2d3cb94a268e478af752e8103b971e3168ec97fef63ef7d1d50bec,2025-06-09T10:15:22.457000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 CVE-2025-2786,0,0,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e17,2025-04-09T21:16:25.720000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 @@ -290390,17 +290390,17 @@ CVE-2025-2986,0,0,d4de6065b989c9ce03bdc42146227d2a6037461d4d3c99124dadaa602d2c97 CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000 CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000 CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000 -CVE-2025-29871,0,0,267c054edce34824e666ecdd086324cba2d0ad91df2d78d897370c789b93d154,2025-06-06T16:15:24.637000 -CVE-2025-29872,0,0,b47a1b5c44b1cec4607f515d79dc9aae42c499abba4c8945d5c4afffcf1c14f7,2025-06-06T16:15:24.803000 -CVE-2025-29873,0,0,5e72666f14aa6741fe6a4524e435490585627074d96ed7ba355cc9614d5635f9,2025-06-06T16:15:24.950000 -CVE-2025-29876,0,0,fe2c3191bf79fe8d06d6ad0018d1ce7d1ad17b7d81d15bac7cff381347084d4a,2025-06-06T16:15:25.090000 -CVE-2025-29877,0,0,f1f08b6cdc4ff5e4b56a31314ab6767a457d0032600ee9abbceb5ad1c6f484a2,2025-06-06T16:15:25.230000 -CVE-2025-29883,0,0,fafeb9b425444214e843df19142453900d78b3f422b3d198a360aa8d90917ef1,2025-06-06T16:15:25.370000 -CVE-2025-29884,0,0,23acd2be25dd92a8b18ffd732ff540f9d80942927e75a70459be534506abb4ef,2025-06-06T16:15:25.510000 -CVE-2025-29885,0,0,b9e6e9a126b1dcbba775375b61769f16c62852b42581d74bb3cd311c75e4ac0e,2025-06-06T16:15:25.643000 +CVE-2025-29871,0,1,979d3b3d606d56faa261c36a716e6d38a1b6c81d0b10919c5ab529543ea73a68,2025-06-09T12:15:47.880000 +CVE-2025-29872,0,1,a1569d628caf8ec6b60a528f46503d6bc944fcd1550bb4216c3ded52708702a8,2025-06-09T12:15:47.880000 +CVE-2025-29873,0,1,4838eca6959ce200b86e3e7170b7404971b87ce40ab74b2c907724f8b4c5ec26,2025-06-09T12:15:47.880000 +CVE-2025-29876,0,1,c8bff9716bc3d6985ae941303186526adde02d208d83fe6caef93914083d7278,2025-06-09T12:15:47.880000 +CVE-2025-29877,0,1,2b6954ac732c5a952d4a854c575ac44f6797218bf348960f9a7a286b92041241,2025-06-09T12:15:47.880000 +CVE-2025-29883,0,1,10e6753a3ba2969f2c6e54f86700631245a5b4bbbe717f7209aa89de77b16605,2025-06-09T12:15:47.880000 +CVE-2025-29884,0,1,23eb4ad20d1eb3d5db78c2c8e615470a93a22d0dbe8967523480f6c45f16563b,2025-06-09T12:15:47.880000 +CVE-2025-29885,0,1,561d9ffae6a7c5d72e7fb60a7724e8ed1d353227f2d1dc8facff11d19b0ffb18,2025-06-09T12:15:47.880000 CVE-2025-2989,0,0,0766747cb0e01c92c737981bb238f9adb3ab95fb53aa49cc63ece17dfe385650,2025-04-07T14:15:04.880000 CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000 -CVE-2025-29892,0,0,301ea0ffaebd07f242ba7f2696555bf21271f625f4d5c9ef3270e06efab1508f,2025-06-06T16:15:25.783000 +CVE-2025-29892,0,1,2f30eb8bda4660a13c94f6e590661bd66072c1732fc80056868bef8dddc8b81d,2025-06-09T12:15:47.880000 CVE-2025-2990,0,0,71ab3f8fbfc23333e9355c75b23bef4a236943bf94587f620db3828791ab7825,2025-04-07T14:14:41.947000 CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 @@ -290637,7 +290637,7 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000 CVE-2025-3026,0,0,e1d5f90de5cffdef16fb6ac0720c6a50512e756b166ba5e7f995a1b9b9409a90,2025-04-01T20:26:30.593000 CVE-2025-3027,0,0,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285f7,2025-04-01T20:26:30.593000 -CVE-2025-30279,0,0,0f1d8e34427e7e9b9347e6dd97295917263a9ff02ac454bcd4463da00b618f78,2025-06-06T16:15:26.030000 +CVE-2025-30279,0,1,d448c979e445565b7cd2b2a1e7afd76dcee33cb92f1fa7194b593febbd34ae4e,2025-06-09T12:15:47.880000 CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000 CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000 CVE-2025-30281,0,0,1559be2cc3af28eafdfdda2201e058111279b1728b928b15c90560429d8cd6de,2025-05-28T17:06:16.963000 @@ -292125,7 +292125,7 @@ CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82 CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 CVE-2025-32044,0,0,a71de1cf666447c00a842f33f324ff6f1e1b8218897a24a1ab72a6777d44e851,2025-04-29T13:52:28.490000 CVE-2025-32045,0,0,b17bdb427633d487b0808a2e4ae8cc6c6c54291aabbf23bed11ce2ff7243e639,2025-04-29T13:52:28.490000 -CVE-2025-32049,0,1,8ce60c6bfcbf9933ffa2c4f6c8a3e4f1bbc46007033103b1f8f9283aaf242195,2025-06-09T10:15:24.673000 +CVE-2025-32049,0,0,8ce60c6bfcbf9933ffa2c4f6c8a3e4f1bbc46007033103b1f8f9283aaf242195,2025-06-09T10:15:24.673000 CVE-2025-3205,0,0,2fbe92de3997566680a1052e42bc5ae830a44caf727a733907db3320a0fb983b,2025-05-07T15:58:51.537000 CVE-2025-32050,0,0,d0a186287f84675d733fc8adf7b721e0ef8373d24cc78f737949580577a7a0c2,2025-05-29T07:15:22.560000 CVE-2025-32051,0,0,c5601bf30a2280db534481dc10ccb3d4bc49f5f6486729ed8c2da54db3bdca25,2025-04-07T14:18:34.453000 @@ -292436,11 +292436,11 @@ CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c8 CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000 CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000 CVE-2025-32454,0,0,d112044e8ac2aa2106f1b31f5429f300a7ae216ee8a2c99529918a4b88fc6446,2025-05-13T19:35:18.080000 -CVE-2025-32455,0,0,bbd9ee7abf40b6a9dccd709e5166dd796cbf8871a831e20efc6c94212d75e777,2025-06-08T21:15:30.993000 -CVE-2025-32456,0,0,d284ee679a768c67f842611d5c59a6768d9c189a7ebe9c37c6e1062e8a06747a,2025-06-08T21:15:31.267000 -CVE-2025-32457,0,0,910ccefc90cb2d13a730c03221bedc28d87ecb750c712cd54ffa90f1b9a92bd9,2025-06-08T21:15:31.403000 -CVE-2025-32458,0,0,ed1b705f41f96a6ee909150c688ae38f4b9351f40212178441d1a8c4862086ff,2025-06-08T21:15:31.537000 -CVE-2025-32459,0,0,aaa4a129c48104f431de5e03da57d6d29997a8f105b3c31e87f984e68da64c95,2025-06-08T21:15:31.673000 +CVE-2025-32455,0,1,19d10764c3763c0c23dfab68d6a329fc4abcf09501701715c081556de3edc5a8,2025-06-09T12:15:47.880000 +CVE-2025-32456,0,1,1ce8f759ee6f741f008085bf0eeecb8b31344033a3a3e47546b4e2801a380438,2025-06-09T12:15:47.880000 +CVE-2025-32457,0,1,50946da35b02279da6d46eb4e9566733b7319e1a2239ae06478f8f4f35d1afa5,2025-06-09T12:15:47.880000 +CVE-2025-32458,0,1,9b1028dbddfb61c93e2e521058386e446cf04e51e86088ccf2111b7448811625,2025-06-09T12:15:47.880000 +CVE-2025-32459,0,1,09d01f36abfeeae97a9ba56f1636ee28dd22d44a44a33d36d52fce81a0497e9a,2025-06-09T12:15:47.880000 CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000 CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 @@ -292838,7 +292838,7 @@ CVE-2025-32910,0,0,240d5c7ee2b4c85daa5f41c88c38a0b1ff00089c1fa83111393e2a6ccde41 CVE-2025-32911,0,0,3dd5d330e5c87cf21d952d6d2f4ac7061b9425e4a5d7e13fec51bbce59ac67e5,2025-05-29T07:15:24.783000 CVE-2025-32912,0,0,537b35ec8e3e7b56fc525d652e56f2627ca353a9690e505ad216d07c70358d3f,2025-05-14T00:15:18.100000 CVE-2025-32913,0,0,4c0909f1e764fc3bf7ac16dc571564afbd85a7a86a7370c78e55f528fa4db095,2025-05-29T07:15:24.957000 -CVE-2025-32914,0,1,f111116292642a8d9075af57c1ff7064ec7337a57bd531d01793342b33c9f4d3,2025-06-09T10:15:24.927000 +CVE-2025-32914,0,0,f111116292642a8d9075af57c1ff7064ec7337a57bd531d01793342b33c9f4d3,2025-06-09T10:15:24.927000 CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000 CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000 CVE-2025-3292,0,0,118c173f186dcc5720366632802764bcff206cc9d545c82cefbfbd5ae3208b31,2025-04-15T18:39:27.967000 @@ -292922,8 +292922,8 @@ CVE-2025-33026,0,0,16823ea87e15ed5dd06862f606f290dd47fd68e96dd8b001f96144de8d0be CVE-2025-33027,0,0,315132d50b588b2e2dcb36832e008e48471336783b88752c2b030500f9b618d4,2025-04-25T16:54:53.077000 CVE-2025-33028,0,0,d10b7c0dfad3fcdf6e98b228bc3a645088136373e6ebf203ac0322a6c2690e9d,2025-05-06T01:15:50.660000 CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000 -CVE-2025-33031,0,0,2d969a774af5ceaf66dd278f74553fa7ce9d1ba27a89b3a16d68fba80ac09e53,2025-06-06T16:15:28.203000 -CVE-2025-33035,0,0,db3cb0da6488f5b3a0815770af4b96e6b94c6f22fc359a699e9183c8dbff6539,2025-06-06T16:15:28.353000 +CVE-2025-33031,0,1,3bb970c0cc5776587757125a88a29cd102e27a7c2df0dae45f1871b1f5649424,2025-06-09T12:15:47.880000 +CVE-2025-33035,0,1,9736697c5ea724fe588629b52625befad92e2383d2bd542658378a457321ad5a,2025-06-09T12:15:47.880000 CVE-2025-3304,0,0,cd001e23659b91ac09e62e7f84c563c50c19190543e934899e672b5c50fb7073,2025-05-28T21:10:23.573000 CVE-2025-33043,0,0,044f6c7834f7eed1d82fb6b8377e155f5c1ae51cb36f952b6bba03be184e28e8,2025-05-29T14:29:50.247000 CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000 @@ -293077,9 +293077,9 @@ CVE-2025-3454,0,0,4237309546c7f67c43ed4306317e4be2d74b3a324e1d901b3aa918c9e80660 CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000 CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000 CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000 -CVE-2025-3459,0,0,d6c1106b70aa5cfae6feacd38449dbf3a310c9d0ee2b1fe6311c1cbd7996f5ba,2025-06-08T21:15:32.770000 -CVE-2025-3460,0,0,febf8323410ea68877ee89a7f789617931d3037b404c524b1e2cb91fedf7c836,2025-06-08T21:15:32.900000 -CVE-2025-3461,0,0,ad004bc388076ed434c1e9184e494c466490c4ca2f3a04538ead681fc0228995,2025-06-08T21:15:33.030000 +CVE-2025-3459,0,1,0b1c13e7e844621d8ac638818847c9b5e1778f8eadc809696b8a14f806153e56,2025-06-09T12:15:47.880000 +CVE-2025-3460,0,1,9c2283d02cbbdaa2926409047208b0f4b13fd4f3b9f2a31878872ef8374e48d0,2025-06-09T12:15:47.880000 +CVE-2025-3461,0,1,f413d51fd7b56fed9ef653351c458678bf01a895009852690e8e73e6e4f729e9,2025-06-09T12:15:47.880000 CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000 CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000 CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000 @@ -293096,7 +293096,7 @@ CVE-2025-3481,0,0,fc292950178293c5d7012f2f451427b1d8e213e39ec7c38473276a4ba3b782 CVE-2025-3482,0,0,725e6811f786fa1a2964e3139476056bc5110112a084055b3ffcf507726db606,2025-05-23T15:55:02.040000 CVE-2025-3483,0,0,67eec717b32d9cb5e3ef7b345bcc95d2e7c639bc1fc7069d55c953a17c519d44,2025-05-23T15:55:02.040000 CVE-2025-3484,0,0,9b379aadd7d20c9c57369b6e7e822e1a6ac4b4258b87caf2b9dec82eec0f1f80,2025-05-23T15:55:02.040000 -CVE-2025-3485,0,0,1fca2d8d0a5ebe67549a5a24586ff9275e3df7d8dbde2a3dbcb10d69869ed26c,2025-06-06T19:15:27.140000 +CVE-2025-3485,0,1,ba1f01e6f92e9922c0140d2a270c95cc08ea33d09cce50d3fe0786d81c43aeb3,2025-06-09T12:15:47.880000 CVE-2025-3486,0,0,7a44a599ea4a475c12a9f935494be9cbd4167bf7d281b57a4d4512713e92309b,2025-05-23T15:55:02.040000 CVE-2025-3487,0,0,199b8611c8e5457bd92c751e347923a2fd3e3ae8117e5e7759eec299c03e5969,2025-05-28T17:53:05.963000 CVE-2025-3488,0,0,c7eefb60f78d0958cd2e23946d634228ed1d24a7964a368a35db998af9592006,2025-05-06T13:42:26.630000 @@ -293105,14 +293105,14 @@ CVE-2025-3491,0,0,764070d57369c52ed17db36acb0e46c080442745adab2da0d65d4052df55b4 CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000 CVE-2025-3496,0,0,eeeb25234db4b5411b18647e6b883fd7c97d2c7df03da24267ee3dd146e4a70c,2025-05-12T17:32:32.760000 CVE-2025-35003,0,0,21587c625dab7683038a5bdc307498878657bea1128b3a4ea6c83622b9ed0b8f,2025-05-28T15:01:30.720000 -CVE-2025-35004,0,0,447749e5f1b0eeac431a6fb6856d9e948a7ac885a2abf514f9bcf5b5c8092a98,2025-06-08T21:15:31.807000 -CVE-2025-35005,0,0,18cf31cde4de8eb18affbeccdc38209c1e192cff1e5424dfafebde7dad73809d,2025-06-08T21:15:31.947000 -CVE-2025-35006,0,0,ee6d0ae4ce9d090e00224c991975358873b1d3612721159c8066554651ad976c,2025-06-08T21:15:32.087000 -CVE-2025-35007,0,0,d4d8bee293276b125296b3e9aff03c89dd0f8f7947991715e73320a8b1b09e65,2025-06-08T21:15:32.227000 -CVE-2025-35008,0,0,353dfbae967aee2dcca1327124a428244cc82b3301fcd256fafcd44fba206bdc,2025-06-08T21:15:32.363000 -CVE-2025-35009,0,0,df7f9b7486a3b396ddf5855c8f54dc471a364cd8eb32d9dd87f8eec6e2e1608e,2025-06-08T21:15:32.500000 -CVE-2025-3501,0,0,b44a31b094864acab1ff386cddcad3fda5c65db85ee8c99ed4dbb344cd7aad09,2025-05-02T13:53:40.163000 -CVE-2025-35010,0,0,c5b3875219955a1bd44b22a7cb7938ccd85e9e7159a7e4d39174a62544915425,2025-06-08T21:15:32.633000 +CVE-2025-35004,0,1,22a6b3bcf0fa0fb7442491bd4565016d554f1df631057de1d336c90f8d0abd38,2025-06-09T12:15:47.880000 +CVE-2025-35005,0,1,cd78ecaede8e2e5dde50778d475cad97fbcc21199d0b876c6f36a0db211ec6ed,2025-06-09T12:15:47.880000 +CVE-2025-35006,0,1,7cca0ff8349d7062e2ca1f2046e5d75acd3853536de93cc081bfb6a495bae2a2,2025-06-09T12:15:47.880000 +CVE-2025-35007,0,1,93c74dc6da6afa966f875fdb5ebdc7639f3c0418fae74eeeca7a5572249eff15,2025-06-09T12:15:47.880000 +CVE-2025-35008,0,1,3de0f7cb1ba8d6e12515f0ac9606951b39aec2f7d1ecce03ab188e9b800941d1,2025-06-09T12:15:47.880000 +CVE-2025-35009,0,1,ed4393ca79d6952395146661c14a1ccdc5437968940b4df4154e37736cda44b3,2025-06-09T12:15:47.880000 +CVE-2025-3501,0,1,0d2bf411ad8b6074e7e1378bb429fed680044e45c8dfe296f08b2ff84e670e44,2025-06-09T13:15:22.493000 +CVE-2025-35010,0,1,aa887c06aa125edccff32001b9bb712f85f807e9f25671249e372f18075a9365,2025-06-09T12:15:47.880000 CVE-2025-3502,0,0,7c73723b0d4b00e6da894445c57c5ec7f552a238ff16d874e6183139bc542d93,2025-05-07T16:30:24.910000 CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905f5,2025-05-07T16:30:33.803000 CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000 @@ -293187,8 +293187,8 @@ CVE-2025-3577,0,0,dfdef997e669866588ab8eb7c1ca73b6cf2cbe16fcb69f43d2b34abd27af80 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 CVE-2025-3580,0,0,fb5209c3cd7ebcd66c15bce657f3ddb23cbe27d0c5d33814deb9407bd651e1de,2025-05-23T15:54:42.643000 -CVE-2025-3581,0,0,33341e7a70b3d423dd506a0f8229ae6b99cd52d14722d63db080f1d0d9465703,2025-06-09T06:15:25.067000 -CVE-2025-3582,0,0,0ad7e27dfc60920df2e45bfe2bc378b36e2e2195339903d1da786b9a065191b3,2025-06-09T06:15:25.200000 +CVE-2025-3581,0,1,e6a3e24e073e14719dfd448d1d5bc70a636400588bdbf078fa20cd30f4551bb8,2025-06-09T12:15:47.880000 +CVE-2025-3582,0,1,ca2c027d4e107e2dc4fa011f85cfd68a611484fa635b02d0e2f009d2486b5a42,2025-06-09T12:15:47.880000 CVE-2025-3583,0,0,5e828bc2ad696ee8fcb9f09a10e41d54b38effce4c0c5b61566233d5e9eb1a29,2025-05-07T16:36:47.020000 CVE-2025-3584,0,0,59ca71c3ddec8b989ca250d68253dd4ed4793bd2db21f016ec9f563d6fba7dc2,2025-06-05T14:10:30.393000 CVE-2025-3585,0,0,793d014b8d4f8a0338ac5bc0543e903589c1e8b4dc1d9fc37efe0dfb6e2b3b88,2025-05-21T20:01:00.620000 @@ -293251,7 +293251,7 @@ CVE-2025-36513,0,0,40997ded6ccfa9f42a498c7fa3aba63677e185863eb779042a0e6b33a18b5 CVE-2025-36521,0,0,76dbe5c9e005eebc45d03f4e270884a68d88e62c1e707e433be80dfc20224dd6,2025-05-02T13:52:51.693000 CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed45ac,2025-05-08T14:39:09.683000 CVE-2025-36527,0,0,020ac4647f700215df1a929fd367ca00f7a928aa1186e2cc968570239b95437f,2025-05-23T15:54:42.643000 -CVE-2025-36528,1,1,84cb3ba222d2976820b8b63f77b97f7f6d9e786f4a48b4ae46a753a221ac30e9,2025-06-09T11:15:21.773000 +CVE-2025-36528,0,1,076c61ebf5594c45a4def91e720317e934ea5f49422ba58f73dd1b677e89c2ab,2025-06-09T12:15:47.880000 CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000 CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000 CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000 @@ -293640,10 +293640,10 @@ CVE-2025-37998,0,0,8b3a033de28c5250b92a20ec6656f25a5a6c680db94b831dccabfeb3cc39d CVE-2025-37999,0,0,a517cad338986973fd796cf391804bbba29e3fb988c03d4bcd238ff9e8610f40,2025-05-29T14:29:50.247000 CVE-2025-3800,0,0,6a524157d3ca2737fe4416bb6e9cbf5012a795b031353ff787810fd4eb72a4b6,2025-04-21T14:23:45.950000 CVE-2025-38000,0,0,ea8ea42c8332342d055654f647e4130fb47709cc184fd4e52fd21d97032e37a9,2025-06-06T14:06:58.193000 -CVE-2025-38001,0,0,975e61c3da2b9861eb28a855015f68ffe5745ba318d3698155d462f84f41335f,2025-06-06T14:15:22.183000 -CVE-2025-38002,0,0,4a04e89fed7e0d16640bd07b79f7ef9f442750e90b86d29c9e63b369780ede5a,2025-06-06T14:15:22.313000 -CVE-2025-38003,0,0,1be3ba742e65b18f9b5319dee88e9d3f79ea2030d5f26caa8e77470886e7113c,2025-06-08T11:15:20.990000 -CVE-2025-38004,0,0,52fcb95c389239e3f10e69d6930694dab46a4925e994984664408f2536503220,2025-06-08T11:15:22.210000 +CVE-2025-38001,0,1,4742856d034e44a70c7a160b65d3baa1e51c74fb792fbf63e1d3ee3e9e2c71a3,2025-06-09T12:15:47.880000 +CVE-2025-38002,0,1,0e2b95b7683ce9160d9906a3f278c5022b1770c45e99a731c45afc7e6fcf9135,2025-06-09T12:15:47.880000 +CVE-2025-38003,0,1,ca8f9ecbae8fdba1b8865fd21be281164759e9596e2b0eec8b348d2e0dad31a0,2025-06-09T12:15:47.880000 +CVE-2025-38004,0,1,85c8b2da0f0f4015c5981e2f5b69c4e07297a0419f793802db6cb7027b5224b4,2025-06-09T12:15:47.880000 CVE-2025-3801,0,0,6b6ff942433f61f662faba2077e387c7e727543b5aa46dfc81789b9bc5de9c1b,2025-04-21T14:23:45.950000 CVE-2025-3802,0,0,cb8866d1a3d40e40a3689450a33e3b06e4726efc19dbf523d222d1c8ac26594c,2025-04-21T14:23:45.950000 CVE-2025-3803,0,0,01cac43cb81122f40562a95ea00e02849827ad730598145fa3ede5a68597810d,2025-04-21T14:23:45.950000 @@ -293681,7 +293681,7 @@ CVE-2025-3830,0,0,3ca7fd35f12c00858d19906448614222a608b776fe97491b48d4786654ad32 CVE-2025-3832,0,0,4341ec7053cdfcd8a390d90346badb808517e6099d45c1d26164d2b6c67b7ee1,2025-04-29T13:52:47.470000 CVE-2025-3833,0,0,7f9efddc434c5a834e34f9b02819bab78b434bce69954c54e0066db06f0e9e6b,2025-05-16T14:43:56.797000 CVE-2025-3834,0,0,6daa411c17b2f18e4970a27b87df8b22246e211d6c3f0c02245d64a4e9f7a3a2,2025-05-16T14:43:56.797000 -CVE-2025-3835,1,1,325a4b4bbd7ae90a731b691596cf04dba1b50b650bbae52838262bdaede993ff,2025-06-09T11:15:21.913000 +CVE-2025-3835,0,1,c8c1e4068915c5c393259eca56f91a918f9a1cf122a648eb582bb46915bde4dd,2025-06-09T12:15:47.880000 CVE-2025-3836,0,0,3d825a5448c3c664c47fd44654a8a7149f2c964d059aaec6aa397b77a376d670,2025-05-23T15:55:02.040000 CVE-2025-3837,0,0,5a47b33afdb7e1907c95a70c26ce3ac05141d02d9782062528ed4ee5ab63acd5,2025-04-21T14:23:45.950000 CVE-2025-3838,0,0,bb793984df5f3344ae8c93ea895951dc09f41cafe84f678ece4d6f95f3b2b330,2025-04-21T14:23:45.950000 @@ -293895,7 +293895,7 @@ CVE-2025-39464,0,0,5021866073b4c31242c9a7ae18259b29ce378a9b068ae11c4d8f90f0f33df CVE-2025-39469,0,0,e18849e95e863d0389b13542e78fc7e5370e06514982d8ca59d2eba138210f3f,2025-04-21T14:23:45.950000 CVE-2025-39470,0,0,e010fc0801cd6bb4936cb1b65898bdce69bac41af3bf33793e9451cff50a9a80,2025-04-21T14:23:45.950000 CVE-2025-39471,0,0,21ed7a6e1899b30a1a56f084c0c39ef4da03cd3bced83cdf5407e02bb87fb289,2025-04-21T14:23:45.950000 -CVE-2025-39472,0,0,a7cbfd1fcbc3c3b205d7e0f46a012bccf0b5c525fa1ae0195e8c3aeff79f686a,2025-04-17T20:21:48.243000 +CVE-2025-39472,0,1,bb2f2cb88d690511a4cd39d1b1efb90424abbd9f68741fae65c0ada4798552a8,2025-06-09T13:15:22.357000 CVE-2025-39480,0,0,339ca3a785b41e56bc901bd68b8ae900170b561cf9584e47581955799fe339b6,2025-05-23T15:54:42.643000 CVE-2025-39481,0,0,ffc38075b9c9e137d0a9f220b07f654268d9b6b192ff077aaa96738d747f33c5,2025-05-21T14:23:08.503000 CVE-2025-39482,0,0,f44ca390a511cc4fa9864ad222a12fd65c81c88e214777e055d5294de44cc742,2025-06-06T21:54:00.823000 @@ -294171,11 +294171,14 @@ CVE-2025-40664,0,0,e366ae4d0edc3020bccb4958e82dfc623d961bfd022fb180a3be2259f2bb5 CVE-2025-40665,0,0,80c9d614a0e728f77e8ffb6c772411e08f1a3422b53c0225c9a2a3eda1f363a3,2025-05-28T15:01:30.720000 CVE-2025-40666,0,0,e6063342de7ec377dc75c223c3c882cf4cf50a56631c7a4f84ac1ba5d952b618,2025-05-28T15:01:30.720000 CVE-2025-40667,0,0,61ef3a59113c0c6c62c30abf951a97e8e151adf6aae473b27bcc0ec35f846729,2025-05-28T15:01:30.720000 +CVE-2025-40668,1,1,5bde77a586190584676e154e006bb20a8d67502c0c4ab0960508c9d292d506a3,2025-06-09T13:15:22.633000 +CVE-2025-40669,1,1,5f0bb20df2d6f19bb576b9b235d981ab939b12ba6426ad4f28e4959f242a6266,2025-06-09T13:15:22.803000 CVE-2025-4067,0,0,dbc4fa5a3543fbd835e23dc834da9e648caa31287a34f63ada5ad254d564f79f,2025-05-12T19:35:20.583000 +CVE-2025-40670,1,1,09af6bb66c3bf277e1f46359827d2dd7a9b3a13613ccb23cfd7d2a7d657ae8c5,2025-06-09T13:15:22.963000 CVE-2025-40671,0,0,434fcb0f85fca3f9d859442da381d4e1454f2c968132e3a6b8db7392906ce4f0,2025-05-28T15:01:30.720000 CVE-2025-40672,0,0,16bc6b87ff9caf15184dbd8991107d7b17c5beb8ff9d9c80bdf9b979ca591b75,2025-05-28T15:01:30.720000 CVE-2025-40673,0,0,b579e57f63d588753084335ab891fb47997b91677321939dfff9acbc408e6ab4,2025-05-28T15:01:30.720000 -CVE-2025-40675,1,1,e615c00d74c27a37f43fca862f9811ab3707789619e669102051f36c9b3f1b6c,2025-06-09T10:15:25.190000 +CVE-2025-40675,0,1,f7d398159d594900ed3b61f12a14acc2dd30722f4e9e86c3ecf3c3a6b84c8f88,2025-06-09T12:15:47.880000 CVE-2025-4068,0,0,3e3326c67789178a2e89dd2c7182f86f8b00ff853809cd66d0d99e3251986e87,2025-05-28T17:27:28.983000 CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f25,2025-05-28T17:26:13.450000 CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000 @@ -294287,10 +294290,11 @@ CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17 CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000 CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000 CVE-2025-41433,0,0,f6273c3cc0a212df803e85bf8ba3fed5695ff63848595dbd80f25b739ca0954c,2025-05-08T14:39:09.683000 -CVE-2025-41437,1,1,6c6681b37c65d506133f6f652ea4a4550aad857521bf4230242b07ead60c9ae7,2025-06-09T11:15:22.053000 +CVE-2025-41437,0,1,7c84b2b693a3f16c0db30dd30c424fac49929af62631bf7fbdc13936e907b6b0,2025-06-09T12:15:47.880000 CVE-2025-41438,0,0,11ba6504cbbbf79eb2cd396e9c090ab75fa4dee3d0b15e980e071c03e0563d88,2025-05-30T16:31:03.107000 CVE-2025-4144,0,0,ed44a24e80e1487d547bfe32499c8ba4450309e0e9d0acd2df7ebfcd519c74a9,2025-05-12T19:39:31.053000 CVE-2025-41441,0,0,3b51a802d5e876ef5e3db952c79744bda892bc6a2133cce8cddd52ad9c2cfab2,2025-06-03T15:42:40.710000 +CVE-2025-41444,1,1,b99b9aadb42f50483061cd6a1f435a0e2452c2159ac240114d078555b52cc020,2025-06-09T12:15:47.880000 CVE-2025-4145,0,0,fa58d4933201d65cc9b44e9816af7313e719b690552f69a8a0e4a077c4fb877f,2025-05-12T19:39:15.540000 CVE-2025-41450,0,0,4e7db9e6a2f333eacb62d02ca3c8295c9ab4584aaa2c1829b76057cf389c3cab,2025-05-14T10:15:17.687000 CVE-2025-4146,0,0,07eb7fcc601b4a07c54a54f1a27fd62b73f5d21ac1225fa7710ce74139eda2a3,2025-05-12T19:38:57.493000 @@ -294313,7 +294317,7 @@ CVE-2025-4162,0,0,bd7ee4eafbad385e1e351df319e6d6835cd1bab5b8f0b1df69e26a394c35b5 CVE-2025-4163,0,0,90b94328ec1d78c2c92fb5347be0835a81d1ecb778d277713df60a936155c16e,2025-05-16T17:47:32.577000 CVE-2025-4164,0,0,c409a415056cfc60d19356dab298bdf2afe4926171d33ff65db9098cfdafae24,2025-05-16T17:45:46.460000 CVE-2025-41645,0,0,05dc7979d552d91b524b274c74c87b4d6526958474a345200f3e130228064f47,2025-05-13T19:35:18.080000 -CVE-2025-41646,0,0,1b75172c317086c28f8e71fc7377e023f4ee6b7ace6c5133216fd5cb63b237b9,2025-06-06T15:15:26.183000 +CVE-2025-41646,0,1,dd84a79c2e3683c9bc27dc7c0b9052a3daed22a2a581423061f9ff9324bc3db2,2025-06-09T12:15:47.880000 CVE-2025-41649,0,0,612914eeae0d0b80cff3d2f6bd08d474bd30dce7e9b2b85352e6df3c8ab3fb10,2025-05-28T15:01:30.720000 CVE-2025-41650,0,0,269c0d41f251c325a207de06d644a97e57e82f1a90edffb55ef7207165df0de3,2025-05-28T15:01:30.720000 CVE-2025-41651,0,0,38a22c1448767e102d555501f2b957b582c47bcd5ef6a6193da873a6e029276c,2025-05-28T15:01:30.720000 @@ -295193,7 +295197,7 @@ CVE-2025-46516,0,0,4c88ad304f0a3200cb6dc067922e69e11f23bef3885f8612be34edd9304b4 CVE-2025-46517,0,0,e00d3386df3e4b7181f0c929b08e457a807826ffd3ac273de6467947811d8ead,2025-04-29T13:52:28.490000 CVE-2025-46518,0,0,8ff37657d40d28b7e43670dec8250c937bdcb35627142fe4e1a4550710ea863b,2025-05-23T15:54:42.643000 CVE-2025-46519,0,0,a33ce7fa0944b2cff6a953c93d911a59cad0e41e0288c75a1ef712b260164b09,2025-04-29T13:52:28.490000 -CVE-2025-4652,0,0,98d76ea334495bc8fefb0aeae67dead3801e9fdef11ca8e8f6e0003476b6ddd0,2025-06-09T06:15:25.740000 +CVE-2025-4652,0,1,d749552241890355f8fedd32517b71b5eeb6a42f9b2cafbc64278df140247c96,2025-06-09T12:15:47.880000 CVE-2025-46520,0,0,1c31d6dbbd3e5241ef4e2c12464d7caf8aa9991d18bc3f254623825eb9b8b54c,2025-04-29T13:52:28.490000 CVE-2025-46521,0,0,c218263f26834f6156811624211affe72a1577541fc4caa1b57a6d05a3e214a1,2025-04-29T13:52:28.490000 CVE-2025-46522,0,0,d3d2527c85c582d99da6bcb828f5f2b083bd408e3a5301718b05fe08113648f0,2025-04-29T13:52:28.490000 @@ -295641,7 +295645,7 @@ CVE-2025-47595,0,0,9adf7d209ac9b8d3400c8588f008170c41edc2d63f5ac07b2215d46ce5b29 CVE-2025-47596,0,0,690e3b47de078ba08084cd61db672689fbe99a61629098464a3f13b510134cf9,2025-05-08T14:39:09.683000 CVE-2025-47597,0,0,fb76cae12f5b526063c4e4a4be253bc9c7c48e40696db77b034e646e42c05626,2025-05-08T14:39:09.683000 CVE-2025-47599,0,0,9ee039ad2cd9c104f74dafdaab19a680ccf8acfe2bdc3e4b9451c1c37f06b445,2025-05-23T15:54:42.643000 -CVE-2025-47601,0,0,28a4cd166161737f53c3070c5ad9da3c191ee6086f00330ef25223efb9abc978,2025-06-07T05:15:24.213000 +CVE-2025-47601,0,1,c335faea14ab10462c3e46670df66fe038dd1d14b79de2f1440abed04f84f72c,2025-06-09T12:15:47.880000 CVE-2025-47602,0,0,d3dbfb428c0954dce9fcab4e9e45f9d0df6844ceeac2e295f71482a5f5bda0bd,2025-05-08T14:39:09.683000 CVE-2025-47603,0,0,3b2a1520c7a0466157de2fff2680a5992223fbabfe3b81b953ed658ebf18bf41,2025-05-23T15:54:42.643000 CVE-2025-47604,0,0,5fe8052a1ec8d805c9163a0e7fe2f0a39439d3c6190a6aeb618f3b6906c1c820,2025-05-08T14:39:09.683000 @@ -295743,8 +295747,8 @@ CVE-2025-47708,0,0,b46183ff90ad8011319bd811809b8dcc43906e688b5b61113c48b937e14fc CVE-2025-47709,0,0,9c00b271893f53d1f52294cb240e92548326ebdfcea3825170f6a366a64bc3e2,2025-05-19T15:15:24.443000 CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d346e,2025-05-21T14:16:02.380000 CVE-2025-47710,0,0,3861e04e9e65074d020efa7dab9e00a25ecb80cf10fb272d3ea074fb3b627c14,2025-05-19T15:15:24.580000 -CVE-2025-47711,0,0,9a5c8182ca59ddff43bb4ecb707f27881878df9fc97d4fa36fe7191a73d76ba7,2025-06-09T06:15:25.320000 -CVE-2025-47712,0,0,101eee340b6391eab98727e94b0f48ecbd365584e37b148dd337d3790adb4bb1,2025-06-09T06:15:25.537000 +CVE-2025-47711,0,1,84134213c5152e1def5667fee36ba3a5b2be995d24d7708c58e002afb898ec35,2025-06-09T12:15:47.880000 +CVE-2025-47712,0,1,36ab066e163c4ffc449059531315de23291a62b1378074f34cd0681da81a794c,2025-06-09T12:15:47.880000 CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000 CVE-2025-47724,0,0,c392ae279a9c6e1324e9d9c71628ad9f2bd31920b4d617428838fa9f83dc2fa5,2025-06-04T14:54:33.783000 CVE-2025-47725,0,0,889f3515c44952cf57a8d17f0356726e20588e99515827ba927156d41cc6af64,2025-06-04T14:54:33.783000 @@ -295874,7 +295878,7 @@ CVE-2025-47947,0,0,937e21e816ace6c7b2eea9b27977c70a0355dffa802eeb709a1580aec3fe9 CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefadd52,2025-05-19T15:15:25.400000 CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000 CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000 -CVE-2025-47950,0,0,29677218adcd7be141f793716ad5bdeaafe069370b1864c8214031a9cd15118e,2025-06-06T22:15:23.207000 +CVE-2025-47950,0,1,4b0b13462648502a1d9e9c65a1a516635c319d24d84102d181b2a27357de0e4c,2025-06-09T12:15:47.880000 CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000 CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8d40,2025-06-06T14:07:28.330000 CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000 @@ -295899,12 +295903,14 @@ CVE-2025-48047,0,0,90c6b8a2873189c12920d6716ea7296040367faaceea397be7be5a923b042 CVE-2025-4805,0,0,c6073c9a851be5e89b9b6a73f6e0a94d727dba70f9dad98357bef818a7d70880,2025-05-19T13:35:20.460000 CVE-2025-48050,0,0,fb11876c739186b17efdda0f201617f2ba38492e858d291ddb8ff8349bb73ea9,2025-05-16T15:15:48.510000 CVE-2025-48051,0,0,cf1e954f33c982ae444dcea3f47551d3fc40ad2a24d8eec14e72387fd2e613f5,2025-05-16T14:43:26.160000 +CVE-2025-48053,1,1,5c918b5f6e04c78af2c667316df64432b51bf232503aa39943fd9f4009314966,2025-06-09T13:15:23.163000 CVE-2025-48054,0,0,619ab1f87d286d2d8cec942751a3a0672c0ee415c655aa7e7fd196e00f07880e,2025-05-28T15:01:30.720000 CVE-2025-48056,0,0,a8d32136bfa1274c5c1a44ad4e0fd36b6417f9ac8904498885d9d904c4b52165,2025-05-21T20:24:58.133000 CVE-2025-48057,0,0,a191ca594fce2043575d294ad9a27f048e1246820e66b4cf94f49035f8bda852,2025-05-28T15:01:30.720000 CVE-2025-4806,0,0,2518615806c8845e10f07d0087e3d6590e4a403546137a9f44732cf46e6ce47d,2025-05-28T13:46:20.210000 CVE-2025-48060,0,0,e880a7998ac7937dea606622d4d4f9e16644f2d07bf1521aa507e684ea319d27,2025-05-21T20:24:58.133000 CVE-2025-48061,0,0,9623adaa4a2a12419dc1960402eeb7cda483dd4973982b2b4588eefcc7c2d6af,2025-05-23T15:55:02.040000 +CVE-2025-48062,1,1,9131da3ef4cd7079fab1ec4e6e8b4b54f8684972666b68dcb7ee239675dd1725,2025-06-09T13:15:23.320000 CVE-2025-48063,0,0,30768bd0b996f4003af001e4f1f93e88434b229ec5305143caf606aa28b95eff,2025-05-21T20:24:58.133000 CVE-2025-48064,0,0,f30f6abfc706c8ec009b8e1646b8ce7a94ad294f1fc91f47ca51b619773ad0e0,2025-05-21T20:24:58.133000 CVE-2025-48066,0,0,faea31f6567e989a0ef973c3f26a498ca723f84a2b80d40e0205222fbd185beb,2025-05-30T01:18:41.410000 @@ -296203,6 +296209,7 @@ CVE-2025-48872,0,0,dfe06ae958ad1312b4af7d129d367f975238b312e4addf9e5da976e3a48eb CVE-2025-48873,0,0,4451418e69b9683e4c8577758088c5d2ce92d15138757f995580cbaa635d8fdc,2025-05-30T20:15:43.347000 CVE-2025-48874,0,0,38c8a7a9f9e4de254c475a3cc2adb8109dfa7e2eed584004a3cf9ab32d38ade6,2025-05-30T20:15:43.450000 CVE-2025-48875,0,0,029be7ab6273a4455b3ac7b9bf6f732c1f5c1649e6f1271a40adecc61bf80bab,2025-06-04T19:54:12.937000 +CVE-2025-48877,1,1,3d171f46299c208fb03451f172d8304bf1ced3034004c6c504e2f6bc88072c45,2025-06-09T13:15:23.500000 CVE-2025-4888,0,0,6310b8fff197a575079561816e1f76f1ad70f7608de3ca85411d4b87b2143843,2025-05-28T15:27:22.353000 CVE-2025-48880,0,0,e3f8b2cdd2d7e01ae05621a292349f1663c3a39c76f38840987aaac340e5533a,2025-06-04T18:32:36.090000 CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe5e0,2025-06-04T21:15:40.263000 @@ -296275,12 +296282,14 @@ CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee CVE-2025-49000,0,0,f8cce1a2bdee8bde170fefa186e3e45152457ed27acc2f9d05d9f849c91c807b,2025-06-04T14:54:33.783000 CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094302,2025-06-05T14:07:47.397000 CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000 +CVE-2025-49006,1,1,bce4382dde1e1bae932f4ee518adcc6bf655153ccdf907f6d1b1c04e200dbb9f,2025-06-09T13:15:23.650000 CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000 CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000 CVE-2025-49009,0,0,05fbc148f5fea24cfe48010b88fe5429514c8df92279b8f7fec4106b44808b61,2025-06-05T20:12:23.777000 CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000 -CVE-2025-49011,0,0,2e7da429b95a4f2254c5a8795b5999a44c06845c593ad460917245d4e9c39380,2025-06-06T18:15:35.497000 +CVE-2025-49011,0,1,3665e61b0cd57a602b77e200d37022bd1c16f58fa0f0e634b56cbf0760aaef11,2025-06-09T12:15:47.880000 CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000 +CVE-2025-49013,1,1,08c5051e70b9de4c343f7a640287da54743e28f420bb351a15f6e57758cbe09f,2025-06-09T13:15:23.803000 CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000 CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000 CVE-2025-4904,0,0,d7b6b9c62b4fa4e81411d46fa975a661fdf9f9acbbbf9c59e6a55eeb063418e5,2025-05-27T16:29:33.560000 @@ -296303,9 +296312,11 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369 CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000 CVE-2025-49113,0,0,3740e35451abe1a78e20b6fcfcc30939518c1442be6c83079800621122ba29db,2025-06-09T04:15:35.803000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 -CVE-2025-49127,0,0,75d721494d98d4722f3d78798cf05e23db38a7c6bebef6c22b8d9a8d81898d86,2025-06-06T21:15:23.137000 -CVE-2025-49128,0,0,42874cd39e27e420db84f117bd69f6a93c7d0ef6555be75306d09ad33e291157,2025-06-06T22:15:23.427000 +CVE-2025-49127,0,1,e37bb47c44579a99fe56603b3bb84e937bfd158a72c8cbf86fc249969252e3c5,2025-06-09T12:15:47.880000 +CVE-2025-49128,0,1,43e586414120b06cad56531e5527ffa9777cf2e2995ab111ebfd35648bbb4434,2025-06-09T12:15:47.880000 CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000 +CVE-2025-49130,1,1,101994697265c4124b21893e7018192e4caf4f2ec31625a5dfcbe146cdb28e2a,2025-06-09T13:15:23.977000 +CVE-2025-49131,1,1,cb5b50180e5eaa5b85e2d41a2bea84c06691db09851c0931186c9857c00a2951,2025-06-09T13:15:24.120000 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 @@ -296425,11 +296436,11 @@ CVE-2025-49450,0,0,fb4f52dbcabe6d10a7029fe4e63b7637345c171e5ff856e151d99f1496446 CVE-2025-49453,0,0,66b7e122d30d583eff84e0f9157cb5663586cb3b5d97be1749136fd19a39911b,2025-06-06T14:06:58.193000 CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 -CVE-2025-4948,0,1,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 +CVE-2025-4948,0,0,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 -CVE-2025-49599,0,0,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000 -CVE-2025-49619,0,0,668bd05025c86671edffdc13a521d6f88794f1d70ee3c0823fa2dd6aee1a1e54,2025-06-07T21:15:21.887000 +CVE-2025-49599,0,1,7644f0c0f37da226473b8e0aa8d1cf1e3f6afce05b6b6d50576715ad32c9255c,2025-06-09T12:15:47.880000 +CVE-2025-49619,0,1,36e98b70609b58c4538c409e7ae236c9e202188190a8b3a1cb9c502b37e74362,2025-06-09T12:15:47.880000 CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000 CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000 CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000 @@ -296666,7 +296677,7 @@ CVE-2025-5295,0,0,86992e97da5db3e66123dc758ac5a1f83b74ab998ea61bbd2f95d3d081833d CVE-2025-5297,0,0,87f5c2ea55786c8b81963baa725b45d00523179cb7524fec69b00cb83e8c752e,2025-05-28T15:01:30.720000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 CVE-2025-5299,0,0,2c75e790822eb43ea8892b1d4769ffefef855c8d85079d6be37a9a0e02c6ddb1,2025-05-28T15:01:30.720000 -CVE-2025-5303,0,0,d8fc5a6e51ef2a9d12e6771e9a0416eb43a9a46de25baf135fa9f6a284d65a56,2025-06-07T09:15:22.007000 +CVE-2025-5303,0,1,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000 CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000 CVE-2025-5321,0,0,31d96e00ea1024b8084a7837ef9bf0b4fd55d789d529b1f4fae375684c451003,2025-06-01T05:15:20.947000 @@ -296715,7 +296726,7 @@ CVE-2025-5387,0,0,65ec5c965e0aa55c8047ca231400a6ecd9307463295059e1349de0bd80976c CVE-2025-5388,0,0,a0253f0c3333e57e30f53ca748c2f786064d252af030391460f61763742994dc,2025-06-02T17:32:17.397000 CVE-2025-5389,0,0,260909efcc6b6b292bffdc65b5b0e9633781d0b5c8c5ea87a3dce1c6319b67ab,2025-06-02T17:32:17.397000 CVE-2025-5390,0,0,039345fdea46e1731d2841f7a4397db225f36b8f7cd62f23d1ae898d97067564,2025-06-02T17:32:17.397000 -CVE-2025-5399,0,0,2760b717b030d03c7627cf67ecc731e4ba767e47a97334843123a895120dcc29,2025-06-07T08:15:20.687000 +CVE-2025-5399,0,1,303701ebb0798c2c50b4b622424860dfd8dc6a1aa82cf946746f3f94b9b250b8,2025-06-09T12:15:47.880000 CVE-2025-5400,0,0,7cd289b1f8796f433468abfa83e965b2ae8c6d02300bfc34aeb9a97484dcc2f7,2025-06-02T17:32:17.397000 CVE-2025-5401,0,0,7191cee0bc77ec5bd67bfc250972477b89f2f18db54f39596b26be9c1bb1595c,2025-06-02T17:32:17.397000 CVE-2025-5402,0,0,45f6783233a4afb3eb11fc05c7cd975eca906300368aad5ba6a7385cf6bfa0ef,2025-06-02T17:32:17.397000 @@ -296759,10 +296770,10 @@ CVE-2025-5445,0,0,048fd814ef42199f053c2e82398be3c5147effcceabcbf3b1626ae84367b42 CVE-2025-5446,0,0,35d85a6b109786f1b24f687919ca0a0a29c0ef8c307735f4c4f3239f7042c652,2025-06-02T17:32:17.397000 CVE-2025-5447,0,0,3f0e18d04d97ed4b37df377d5a284b98bec607376a89ae1ee717f001b4c6401a,2025-06-02T17:32:17.397000 CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000 -CVE-2025-5473,0,0,3fe62f0104bf9a4b0a1d8ab027088b8f175238f5a4bdc7e000632cb2da20271a,2025-06-06T19:15:27.463000 -CVE-2025-5474,0,0,36332de2185297aad47d710829277e2bb20c3868e01cf4164480d727b7485abb,2025-06-06T19:15:27.613000 -CVE-2025-5480,0,0,d99165dc939dd1b33cdd36787937414a81409d6ee0fe6550da8ac1874c25f128,2025-06-06T19:15:27.757000 -CVE-2025-5481,0,0,fc5f08f7dec8c8d23a03b3d531756e8b923ab5264d6e6fbb2c8804adad13ce9e,2025-06-06T19:15:27.903000 +CVE-2025-5473,0,1,71e9a0d8879b30e10102aac4dbfd9c373861b74ea445d6f4d1c1466cb063c6e4,2025-06-09T12:15:47.880000 +CVE-2025-5474,0,1,ff56ae6d33a817b3b5972773cb7c3e3407b0f73c6768464aca7201e3d55867a2,2025-06-09T12:15:47.880000 +CVE-2025-5480,0,1,b6157243f7fdbaf5769c8c248be5113b7a9538f2054411dc814924ab031c7b6a,2025-06-09T12:15:47.880000 +CVE-2025-5481,0,1,0df5112d76a8e502ef89d6f4c9ab47a4ed6ed40f8c8ec4607ebdb9cb6b4ab86a,2025-06-09T12:15:47.880000 CVE-2025-5482,0,0,010176165dc064c9d0f5c42c228b3c1b03d533e2fec3bc43624fb7ad3f4bc0b3,2025-06-04T14:54:33.783000 CVE-2025-5486,0,0,403a5f3fdf24114225af88123fd5df41b3fe4d4616779e15f6218229399593fb,2025-06-06T14:07:28.330000 CVE-2025-5492,0,0,5239a7cb50dec6b348e683d7a6c48897854a921e0d403f100d8eaef90a706bbd,2025-06-04T14:54:33.783000 @@ -296792,7 +296803,7 @@ CVE-2025-5522,0,0,a6f0feb7c3dd1459fe736f4f5982460ecbcab99d78d309661631c0ee8cbfc4 CVE-2025-5523,0,0,3db88372cbc1cbb18787ac749ffbf9db8eaa6d8a017b7015b4abf369a593e9d6,2025-06-04T14:54:33.783000 CVE-2025-5525,0,0,8a6fda70c73f8d7caf337b44e8088af73f34b5d808b601ef429b01e524913c40,2025-06-06T17:27:21.350000 CVE-2025-5527,0,0,df26e082fd575c8053d5aaf00a7861d1af6fb5a0812fe71c052a1b13260a10c9,2025-06-04T14:54:33.783000 -CVE-2025-5528,0,0,6361ca8ed5a8d00c711f415cb8430cc9f7678ed6bf73cc3ee4aabca88fed903b,2025-06-07T12:15:23.157000 +CVE-2025-5528,0,1,9ff6f51c97698d79ccf64d3644dee7c04924a371e5162b7f2b385dd7df42f941,2025-06-09T12:15:47.880000 CVE-2025-5531,0,0,6d27f31038761ad0a1ccad441f88039d5d4e8afb6e2422d32c208713130619d5,2025-06-04T14:54:33.783000 CVE-2025-5532,0,0,d307f7aa5ca0395a7c8a1bde45bdc53cca6e2426e0b9fc80212fdc7f65c5fbe7,2025-06-04T14:54:33.783000 CVE-2025-5533,0,0,2dfcccaae175c59c944126a99e8f6d8f65e21d5c385b8c2ddbbe92c2ba47ee00,2025-06-06T14:07:28.330000 @@ -296823,7 +296834,7 @@ CVE-2025-5562,0,0,343add22f2528d1ab365d74b6c653aeb153b343601b0ebacf12124363f3af2 CVE-2025-5563,0,0,abd05332a66da82c0a84bbcebb55ce866c616ee358de4033b1bc944eee92c5bd,2025-06-06T14:07:28.330000 CVE-2025-5565,0,0,69057d9fcda3a9d391a6fdd2d36028e43e46d962e75d2a96d0e0e06e8f6deb95,2025-06-06T14:07:28.330000 CVE-2025-5566,0,0,6cd1b19db0a2abdf35ae21538de449c05d1cecfb40c37f0b82d89c2ca9b4dcf9,2025-06-04T14:54:33.783000 -CVE-2025-5568,0,0,86d8458bbc8c612953258965305ee470fe4a8242c54b5ca07e27dc9d04bcf917,2025-06-07T12:15:23.370000 +CVE-2025-5568,0,1,3985b2b3c56041cfacfc47ea29b5076a771839690445a0941918b66a37c31945,2025-06-09T12:15:47.880000 CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000 CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000 CVE-2025-5572,0,0,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000 @@ -296962,8 +296973,8 @@ CVE-2025-5725,0,0,d3701d66a6db5d09228ba12b03edd664cd03fd88dc14a12d7113b43adfe0ae CVE-2025-5726,0,0,617aad9a8853ccfe2921b474109c58f51a6c761fa5a93e6ced4980b6cc6fd3ae,2025-06-06T14:07:28.330000 CVE-2025-5727,0,0,eabd3f4195be577c366171af27add08fb1cbf3b0847e8c043b4505610ec7187e,2025-06-06T14:07:28.330000 CVE-2025-5728,0,0,e2fa58256cb0d29423fcb0e824bd7e4656db6ba1650517e49601d58f3c21dc1c,2025-06-06T14:07:28.330000 -CVE-2025-5729,0,0,fdd136d0342541275d4f7697b2f22f545bd6950637dde159874123faa6e3f037,2025-06-06T14:07:28.330000 -CVE-2025-5732,0,0,769d1b6f48a48712bde9301fa361f46578b59f66ca54451e3a179f020896fa28,2025-06-06T14:07:28.330000 +CVE-2025-5729,0,1,e4496e2ef853aa19924d8ea59da09547edb389972468d1750a85a5b387d74db8,2025-06-09T13:15:24.277000 +CVE-2025-5732,0,1,88969f77f54957d4f211de83841dea80ff4e241209563aaaeb0430e1e1eb6fef,2025-06-09T13:15:24.430000 CVE-2025-5733,0,0,f9414f378c72883d276dec17aff75405246e3e34329518fe5887772f8c216d63,2025-06-06T14:07:28.330000 CVE-2025-5734,0,0,81db6ecaa2a330086e45d900f736563966e5de0eb1d315c7daba46bc2cd74caa,2025-06-06T14:07:28.330000 CVE-2025-5735,0,0,8d0103ffa8acdd7bdc427c0ade475eb00f65ea47ec4c25b162f49ca576d312ab,2025-06-06T14:07:28.330000 @@ -296972,11 +296983,11 @@ CVE-2025-5737,0,0,08daa88b0f47d96d464bb5d9df986f1f88b3c61d0636f7d9794766640f13fa CVE-2025-5738,0,0,40160f872c6c36d854905fad1108d58a096f60c1e64b8c34f437851763611290,2025-06-06T14:07:28.330000 CVE-2025-5739,0,0,a0de668636e833e77f2e9d40411491def3e08bcb75e4e696079fb6b5aab62971,2025-06-06T14:07:28.330000 CVE-2025-5745,0,0,3580be19c456f8a1a42e4194fda4fe5138a1c28c64f6ee9c28042cef6c57327d,2025-06-06T14:07:28.330000 -CVE-2025-5747,0,0,22d5519f083be3f8d2a8c9eea97154a8a75de23ff5e22d049c2d58ba3d765e71,2025-06-06T16:15:29.803000 -CVE-2025-5748,0,0,d86ec27e31fd48801eed64b3d420979b10c849d0943186d84a02d1e8c61f06e3,2025-06-06T16:15:29.973000 -CVE-2025-5749,0,0,5f07eda7d9ba20a4657ed395d1656f3428448552c8d1d495fde6b025a8cbed2e,2025-06-06T16:15:30.120000 -CVE-2025-5750,0,0,d4ab220caeb76541db4ea4ba45af1a7a5802a84991eb08604daaac3330e5d24f,2025-06-06T16:15:30.273000 -CVE-2025-5751,0,0,69076bbb32593cf710292aa1be54c2442edb0bb6cc30f685087289be2ca2f2b7,2025-06-06T16:15:30.413000 +CVE-2025-5747,0,1,bd30b9109ec2b512691e79e8454cb527e5b877dfc8564ef4c3e4be6a95e872d8,2025-06-09T12:15:47.880000 +CVE-2025-5748,0,1,b761ade174b0cc8fcfa37b7bf22c809e0fbc46ef538ca5441f6bcf38746a2c13,2025-06-09T12:15:47.880000 +CVE-2025-5749,0,1,2acdc5934ddc07f2fae85bef8a4374f26ddda9b56d85fb729428cb8631784aa0,2025-06-09T12:15:47.880000 +CVE-2025-5750,0,1,646c631d9c514f468fff0f4160ac8169075fcfbd4ea661785f21ee9043cdb606,2025-06-09T12:15:47.880000 +CVE-2025-5751,0,1,23d09c43fb68d6574ce1c145de5cc00dbd740af4044f3203a46a17e73c0d72a6,2025-06-09T12:15:47.880000 CVE-2025-5755,0,0,28839a4284836d06b3eb4221f50b293458c660e12fcab8d4c7841bb6d8cb6c7a,2025-06-06T14:07:28.330000 CVE-2025-5756,0,0,983cab85761c36f1e1ac2363ae99121e28a102ce2360578e9cd88c0e790262ab,2025-06-06T14:07:28.330000 CVE-2025-5757,0,0,135c18e20d949031e9ce20b6a79d8818b9e53edc58f52d0f7788e7c2403d1718,2025-06-06T14:07:28.330000 @@ -296984,66 +296995,70 @@ CVE-2025-5758,0,0,f29f723e5a3da550f4080edb1d7359542867827286b043ad1c32cc4dd5f69f CVE-2025-5759,0,0,dda644c7f490148d22afc41f06dc0941a79053f9874e973d4213cd0c60d7fc97,2025-06-06T14:06:58.193000 CVE-2025-5760,0,0,264b625ff0aed0d36bd2f34c00b500f47e8637a884732813c7f4bc5752a68537,2025-06-06T14:06:58.193000 CVE-2025-5761,0,0,f5786efee122b17921e751eef8ca3015bb841de875d60b00e77a91a29ee98902,2025-06-06T14:06:58.193000 -CVE-2025-5762,0,0,0bad576c1e959bb512e4aee959ad88e1cdfa92a167bdf24726b8673827c00d18,2025-06-06T14:06:58.193000 -CVE-2025-5763,0,0,7ae842a1a1a5870e1bda5094def0c4049bbf6315b182baf702e528e0d351602c,2025-06-06T14:06:58.193000 +CVE-2025-5762,0,1,3558c9e5da808cc793ac8fb6d0bec4c1b48aeb225c92a394cebb64ef1ddc114e,2025-06-09T13:15:24.880000 +CVE-2025-5763,0,1,41d604f04edc1938d5e800df8c1f25db77438e28ae6ae49e3894fa6f403a93d6,2025-06-09T13:15:25.010000 CVE-2025-5764,0,0,4f2c6876d92b5bb3c9e709af486cd2fb98e24b69cec52614390a76a0be759650,2025-06-06T14:06:58.193000 CVE-2025-5765,0,0,cc7be56634c2f62cd8fdc8fbbfe917fe4b28ac465d14d0ac5a2db8b97fa56654,2025-06-06T14:06:58.193000 CVE-2025-5766,0,0,3f1ef799b1969b022c2537aba595576f00ea36d744373bc3641b8077757e92ee,2025-06-06T14:06:58.193000 -CVE-2025-5778,0,0,7dd65f7b7d2079765d1c512eea3927ac3c646f8994e80c20cc78a723151d530a,2025-06-06T14:15:22.940000 -CVE-2025-5779,0,0,b858bce2d1721a2ca6d0d019547451287def5b486cf9ff2d2fad7fb1ad003372,2025-06-06T15:15:27.177000 -CVE-2025-5780,0,0,a79d5bde6de9888e44d84f63ec0737d64a7984794aa0da81a48131d9e8e51862,2025-06-06T15:15:27.377000 -CVE-2025-5782,0,0,865cb59b6e6b56132012beaa7e218524dc300348ded3d8f9dcd3df0750fe6449,2025-06-06T15:15:27.557000 -CVE-2025-5783,0,0,eb7629d6e871a5ce50ba18dc59b688484697dd4904a8b7b212df38655ce738e2,2025-06-06T16:15:30.960000 -CVE-2025-5784,0,0,70d455f6ee88efdac40963af74a25cee89588a1583d5a5c837d38d806e9590ef,2025-06-06T16:15:31.180000 -CVE-2025-5785,0,0,361ed2e9929bd986f8e364266b2b1015221efe4c9e553e488ffb26ccf656b07c,2025-06-06T16:15:31.370000 -CVE-2025-5786,0,0,a3c7640def0bc2caebf515a3375c80f49c2cd1584462164c628634750210c4db,2025-06-06T17:15:39.037000 -CVE-2025-5787,0,0,8fb5d0c9a0922f6975e303c4a28ae967b1efa29d1c5a20cd9a2bad475ac5f635,2025-06-06T17:15:40.630000 -CVE-2025-5788,0,0,60dd3c5365aac2f4f1565cf49e3038f104fe13ca6eda25144b7b3512d60e5de2,2025-06-06T17:15:41.797000 -CVE-2025-5789,0,0,333389dc54f6208be11c93c03d375d5fb9bd2bd30bfcc2fc0f7eacb3d14317eb,2025-06-06T18:15:35.650000 -CVE-2025-5790,0,0,39c11c121a77d487a0b0c7947fb18590cbb86e05dd264a93a0ba9b6e05670d5f,2025-06-06T18:15:35.840000 -CVE-2025-5791,0,0,4f64f57ffbcb47b155f217980406fa0c16d85c7d46fc83efc6ae0930e3d8ae52,2025-06-06T14:15:23.137000 -CVE-2025-5792,0,0,7defe825b7fe3099a7d2d69432cf358752c0d539c6590c8abc6d472feac2f339,2025-06-06T18:15:36.030000 -CVE-2025-5793,0,0,30ac5ca9089d062b3d4345fd7fad55ed1214a8cd144a2c8fba58fe48429537d2,2025-06-06T18:15:36.227000 -CVE-2025-5794,0,0,3f65c0d7298169a109cf0baabde8ecd5a15519770db304978c850a9071131391,2025-06-06T19:15:28.393000 -CVE-2025-5795,0,0,cc1a92a566920098ab15eb4a4114f8f42e0b319eb8a4d01ad7cb6009fadd75b2,2025-06-06T19:15:28.617000 -CVE-2025-5796,0,0,3cc1480c7cc1ebb4a1cd22150b9ab428e5376bc40b32f998106b4d663b5dfc11,2025-06-06T19:15:28.817000 -CVE-2025-5797,0,0,bd9bf686214be6b38d4a32143657441c5d0367e67d4567d873e7312218108fa6,2025-06-06T21:15:23.293000 -CVE-2025-5798,0,0,b3792bfff437aed2ce89a7a9c5089e9ff98ac7c618fa9625e80c45dc986f3038,2025-06-06T20:15:23.577000 -CVE-2025-5799,0,0,27e1ca3e09d4e48d58a25b926e2b7ee3c9f9f9be4091f25fe1b6fbb50c81f085,2025-06-06T20:15:23.770000 -CVE-2025-5806,0,0,79933e1939f5bacaa56d4bc6218de84ebab11db530a087d329b01c15373f4e0d,2025-06-06T16:15:31.560000 -CVE-2025-5814,0,0,8eaa11a12cc6d088f99ec0c5bfb996778135d981aea4d6fb1de682955c0d7f2c,2025-06-07T05:15:24.913000 -CVE-2025-5836,0,0,565d4f19453abbf56c1b4488c6be21c7ecd730624265db965143c5e82f418662,2025-06-07T14:15:22.500000 -CVE-2025-5837,0,0,be29c5c9b02bd53536929c7a116921036f05804cf354e43b53d617bbaab362bd,2025-06-07T14:15:22.803000 -CVE-2025-5838,0,0,ba5038c5e4544342301fefd65f16f3eb1945ebf96b386c6cbebecd735cfeddff,2025-06-07T16:15:23.440000 -CVE-2025-5839,0,0,4efb9e7f992ec0cf0b490a41765d64fdc79638a0fc7c7b695bd87786fa84522d,2025-06-07T18:15:25.080000 -CVE-2025-5840,0,0,6060b28c44367562648dda64a70c474fb07a81415250a659e2cb863608a79fe9,2025-06-07T18:15:25.320000 -CVE-2025-5847,0,0,c2f0ef1d6191ae5a982ebbcf96b0aeccb9a9e804d684fffe50b5e080d1b4793b,2025-06-08T14:15:21.097000 -CVE-2025-5848,0,0,b80478a5483b6bb182e91f5c754722b41c29b063497fef165e16b5e242f332fe,2025-06-08T22:15:21.200000 -CVE-2025-5849,0,0,4bd985a99f1205023a2c3d4c2113f4a18d1aeb5c85ad841e9d9b0bc21074e9f5,2025-06-08T23:15:20.713000 -CVE-2025-5850,0,0,b6adc1754c863146876fe444ca95e185a637d2b50259ecc472df93f14d69003c,2025-06-08T23:15:20.927000 -CVE-2025-5851,0,0,13fe5198f7267a4e27f528492f2cbeb959a306be0a727a2f552e7477f71459ee,2025-06-09T00:15:20.837000 -CVE-2025-5852,0,0,d225815d31c84b2f98b19940a2b2527a405fb8eb6455019740c3f9c3f4d9aaeb,2025-06-09T01:15:20.633000 -CVE-2025-5853,0,0,8a925efdf9baed82eeaa5d4344467c3960aa5b0377e2b820702b39dfaf7cac38,2025-06-09T01:15:21.583000 -CVE-2025-5854,0,0,d0c01d995a2cd5c0e612a876bbfd342ba9170457d0de251147bb9f568cadc44d,2025-06-09T01:15:21.777000 -CVE-2025-5855,0,0,d297afa07413f8f41b9c10d467cc6d2d69e3eed5d9294778e365ecd234f9539f,2025-06-09T02:15:23.293000 -CVE-2025-5856,0,0,78118142298e16e53ebce08fcc0e868d82e15e050c9ef03ea368f6548b1fd763,2025-06-09T03:15:25.353000 -CVE-2025-5857,0,0,be4dd6b66ef955da24b6daef73272f333f337110f5eac2fe46d9617044524617,2025-06-09T03:15:26 -CVE-2025-5858,0,0,887c9b62596baae7ae622fb724b298af9500480ddd2ebefb98dec0f8d58b3ee9,2025-06-09T03:15:26.190000 -CVE-2025-5859,0,0,6b7923abeb300c134b7519954ec60c06a2d244931efd3f53a9e5517b47c9fae2,2025-06-09T04:15:45.350000 -CVE-2025-5860,0,0,b998a3183531c6c25fbb639a8c7d53f3d06c5149568a0f8364158a6bef400433,2025-06-09T04:15:48.427000 -CVE-2025-5861,0,0,a862f0db4e6993f9ab273ba42d1a9716562ac19fbf1131e7894a39cb6ec3e418,2025-06-09T05:15:20.297000 -CVE-2025-5862,0,0,0fa759fec7bd1c0efd0c0afd7a3a54fd5f8d485b772cb0df12745f419b3ed464,2025-06-09T05:15:21.887000 -CVE-2025-5863,0,0,48c76b9bfa38e7e0a0f52b1b842aed688908b32d6a421ab601c1014d7706ec32,2025-06-09T06:15:25.870000 -CVE-2025-5864,0,0,a8dfdc92ebae782cfb313fdf227d67ce16ff2d07e50f927ff70b066b1c4f2b62,2025-06-09T06:15:26.170000 -CVE-2025-5865,0,0,a5836e94fbb60a125a2805660c473972fadb9903f2bf855f605cedbd858d9acd,2025-06-09T07:15:22.660000 -CVE-2025-5866,0,0,1a1d40945c1633e902dcaac1351e4ba6f87f431ee14eece2cadb9e2cd6c656d1,2025-06-09T07:15:22.947000 -CVE-2025-5867,0,0,0585e70f0a94eebc82070f4c8d0acced7cd1326e1742022585ec325215d52f49,2025-06-09T08:15:22.140000 -CVE-2025-5868,0,0,68325a09b0aa436dd63f13057559ed756c9f827edede32bc436473ceb53e08f9,2025-06-09T08:15:22.370000 -CVE-2025-5869,0,0,7f9bd72ad4e67de286e93c718d5f458cff19ce714f432bf26be3f1bc93827c1d,2025-06-09T09:15:22.320000 -CVE-2025-5870,0,0,56cf0c38b24b464d756983b24deeb195e9267a0e2addbce31e23ff88c82e87be,2025-06-09T09:15:22.500000 -CVE-2025-5871,1,1,29fb930e3fc6aeb03b6c2faa5dfa0cd92581e7da02247233f876f7c627e17fa7,2025-06-09T10:15:26.030000 -CVE-2025-5872,1,1,065a51e37fdf65c7f966e875d4acfff2913805d1168d49fd45e4e7501750bd7d,2025-06-09T10:15:26.370000 -CVE-2025-5873,1,1,b51c403668b0fbf00c2f172c2e762b5adf681b1a42af63fcb0fa1bea768d4044,2025-06-09T11:15:22.240000 -CVE-2025-5874,1,1,540690cc4adc0a8d995ac70ac2198ed020bcd19f068d81699b6e311c6c1b09f4,2025-06-09T11:15:22.440000 -CVE-2025-5893,0,0,db2cb20387f45cbfc876a64d8c459c328ded6b8c6c817ea819d837fda0dd41a7,2025-06-09T07:15:23.167000 -CVE-2025-5894,0,0,97e3391380d1ca8a2e75764d648c24bbcb0057a8ec46b60cdae81ae4f97e3d29,2025-06-09T08:15:22.607000 +CVE-2025-5778,0,1,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000 +CVE-2025-5779,0,1,9f50a78d552e33c5e0febe1891ee20155e9d5a17d0263584475829dac430dfc4,2025-06-09T12:15:47.880000 +CVE-2025-5780,0,1,49469915e6c1514d41c901b198058eedaf34c45323a42d8f18373908581b8627,2025-06-09T13:15:25.197000 +CVE-2025-5782,0,1,92c856392f044da69dc51f834b132dd71b362afb8d05e85e4be798a860f00a4d,2025-06-09T12:15:47.880000 +CVE-2025-5783,0,1,891987bd26e30e447e51a21dc9523e6bd9b1ba7b621812594699957a487c7557,2025-06-09T12:15:47.880000 +CVE-2025-5784,0,1,9efa1c60b0afd29315382569b5130a6c14d594665647993cf840eb9168f3b013,2025-06-09T12:15:47.880000 +CVE-2025-5785,0,1,918791d7ee6ee54aa1d876c269bed5950ababc500ec42f2166dc4957a25cebde,2025-06-09T12:15:47.880000 +CVE-2025-5786,0,1,48789b9dd4e05beac94849b5d632581870b565cd2916f96bb4d09da7188e0843,2025-06-09T12:15:47.880000 +CVE-2025-5787,0,1,6d8ec797474721fd522c6813642aebda99ed26f625cc02b097e86caed0384b17,2025-06-09T12:15:47.880000 +CVE-2025-5788,0,1,2847241c83e1c8d9a5f733c813427e8d4543ca823c572216b502ffe13186a65e,2025-06-09T12:15:47.880000 +CVE-2025-5789,0,1,4f6235b94f16e5c206ed5136069906e559153aa0c61ee3e62290879068355024,2025-06-09T12:15:47.880000 +CVE-2025-5790,0,1,e0e138a7360b78c4ef1fd05a7857db579277faafb52651c4fc39364ee7b2036e,2025-06-09T12:15:47.880000 +CVE-2025-5791,0,1,80753438a8abbcadfdd330cb52dac03749d8d4ab9cd84472ce48cc8f178a0a91,2025-06-09T12:15:47.880000 +CVE-2025-5792,0,1,6d1e3770fb7342de79254680aa60a6dcddc7ebefaef96306447034e132d53721,2025-06-09T12:15:47.880000 +CVE-2025-5793,0,1,890e78ef26ed2d3ed35dd4452fa6ddc5d8e1422fd24299930365cf64c0ca49f4,2025-06-09T12:15:47.880000 +CVE-2025-5794,0,1,e1fa0ed1de918a667c15e0eb296c7e5dc659df446f53cca406f1f7ca4c668c18,2025-06-09T12:15:47.880000 +CVE-2025-5795,0,1,63b8de55aa81cc3d6de80fc30fde7c06eabeedb36899a7bbd14bd3e5a4335594,2025-06-09T12:15:47.880000 +CVE-2025-5796,0,1,d2b5329ec47dab762ef4599841256282f5cb1aeae7b59824d8fb69fccc291754,2025-06-09T12:15:47.880000 +CVE-2025-5797,0,1,5b0c74e944d13a2ebac8d1a73e265586e394a72f3bb5beafa57c431cf65de712,2025-06-09T12:15:47.880000 +CVE-2025-5798,0,1,842262b1fec4eb0be6289e1cb8eef19c97c3e269137f2a3ba35534ee76e6f92f,2025-06-09T12:15:47.880000 +CVE-2025-5799,0,1,f0aab454c0fe17345732e262c8bcbcabc8de987d91120131811d13cc7c6dd31d,2025-06-09T12:15:47.880000 +CVE-2025-5806,0,1,eced74af9a3bd847a96fe591b592713a189dcd85d66bd43936ab31bd4aa88aea,2025-06-09T12:15:47.880000 +CVE-2025-5814,0,1,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000 +CVE-2025-5836,0,1,2021f13b75ff76b4b79a0aa396301e649e1adf3fd91ea115c6b258e87fffd2a2,2025-06-09T12:15:47.880000 +CVE-2025-5837,0,1,327296f8dde59091d53586dfb36609d68224dcced3b6cd7c6ffc5d8d73f9915a,2025-06-09T12:15:47.880000 +CVE-2025-5838,0,1,6cffed3ad5bb6ebc7a3a7d5185b54706bc29b5aa3d9892b7eda5ddeac376080c,2025-06-09T12:15:47.880000 +CVE-2025-5839,0,1,38a96a610fab5855ff74850c8f4cb3ec14c8d569bdb6a500f8e54769a489e19c,2025-06-09T12:15:47.880000 +CVE-2025-5840,0,1,10bb467b9354ff51b445f469eb5368da8f75354a271fa217ae4179a9fdffa942,2025-06-09T12:15:47.880000 +CVE-2025-5847,0,1,5718dcf9ee52ed7b4e5faaef48ac36a17e0f044403feff9d89a9d9e1c9fceddc,2025-06-09T12:15:47.880000 +CVE-2025-5848,0,1,436378ed1b78772d75e48ffdbeb268a7dcbfe2e844915bf1c0525052e2ffa256,2025-06-09T12:15:47.880000 +CVE-2025-5849,0,1,53ac7022b613ca34101846bc29acee730f625258c40800233fb07d9b7d288d68,2025-06-09T12:15:47.880000 +CVE-2025-5850,0,1,dd79b325f7804643655487da07798efe718cb663452a2f0c7c7c4b92aa2d7f58,2025-06-09T12:15:47.880000 +CVE-2025-5851,0,1,5984f253b911be9af326b87fac8f09b6a11a4a6a4077b923c94330b8c7120444,2025-06-09T12:15:47.880000 +CVE-2025-5852,0,1,4b6622c77de9c1b7d591a9655ccc835df17e64f35e819c2941f6299894326896,2025-06-09T12:15:47.880000 +CVE-2025-5853,0,1,abe10055947e8fa4c22ee7457a4bfd106f7f72025df13c9dbc4c1fb82ccc099a,2025-06-09T12:15:47.880000 +CVE-2025-5854,0,1,5778e0a8231ae598afadb80b3985026ef050ad2b8d6eaacfdaebf422c74634e6,2025-06-09T12:15:47.880000 +CVE-2025-5855,0,1,fa1a7a639d25f7fe6be136dea629c6a685549e1ea804df4acacd50556a08a824,2025-06-09T12:15:47.880000 +CVE-2025-5856,0,1,5468a00e537c72311b8dc7c4dc2d6c78d33e8cd35ae1f0716866263232ae9bd5,2025-06-09T12:15:47.880000 +CVE-2025-5857,0,1,cfeb535dbe9bc7d8d6ebf4be16cdf2e4637ec03ad9f0cb2fa366af4a9836b331,2025-06-09T12:15:47.880000 +CVE-2025-5858,0,1,2228b11234fa5607ed2fb9c7b56c8ee7aec9f91091c296fd5d48b0f990f9dfc4,2025-06-09T12:15:47.880000 +CVE-2025-5859,0,1,181f842b2dc3107bb8bd49140ec35578daa9766c7972ef20edad6ae69fee72e1,2025-06-09T13:15:25.350000 +CVE-2025-5860,0,1,308ed5ecd876b11eb2e382894a62993b6d92659a0e4b1e96c88e4d9c8cdfa179,2025-06-09T12:15:47.880000 +CVE-2025-5861,0,1,7894b3969202e232a4dc160b6ca7f5f0abbde17c69e3177b5b71d1e0b7c8e819,2025-06-09T12:15:47.880000 +CVE-2025-5862,0,1,f90c3fe3c1d9890efea7670bb89144b8a0167768bbee3a9d200402b9ec187f80,2025-06-09T12:15:47.880000 +CVE-2025-5863,0,1,8031c5dfd245a5213ca0af0b64ca6a19cc5100e8927db1f085a9a9cc441f64b8,2025-06-09T12:15:47.880000 +CVE-2025-5864,0,1,8c335b1fefc2e06e7439bb4b721e855028980e0e79820199cfb69ee6066efed7,2025-06-09T12:15:47.880000 +CVE-2025-5865,0,1,2e7a285489c4aab3df35212ab68291a6db1221a53ce525dadc10af4b1f5b2c45,2025-06-09T12:15:47.880000 +CVE-2025-5866,0,1,92ebdd4f027f2586ea57887774a4837577a4ba0044f0b326447c92ab8f4aa593,2025-06-09T12:15:47.880000 +CVE-2025-5867,0,1,916262609f1cddb32200e1385765448607f363f5fe4f83a8bcdb6804d95e1e48,2025-06-09T12:15:47.880000 +CVE-2025-5868,0,1,99770695bd47db13c8f4f2a45ed7852411b33e1ca8ba3fb08f618213bfa2d921,2025-06-09T12:15:47.880000 +CVE-2025-5869,0,1,534c19d86e2a1410c5dfbed60219396dc336a39a3fd8bbc279143974bbc745a9,2025-06-09T12:15:47.880000 +CVE-2025-5870,0,1,92b349429f41afe7520c8a6f4721325244972a1579e68e06bccfc8684f0dffd5,2025-06-09T12:15:47.880000 +CVE-2025-5871,0,1,2bf0968891a25fe6d9325e502a82edb874fc8b97d6b265bf7ad616da261e34e3,2025-06-09T12:15:47.880000 +CVE-2025-5872,0,1,d8627828d41738fb6841d0f89d658c6be20a802d67f28f50010868ba46d95a5d,2025-06-09T12:15:47.880000 +CVE-2025-5873,0,1,4dad9b4937b1ec6459f441c02150625e5678fee9454d57cd14b1115e7da6d319,2025-06-09T12:15:47.880000 +CVE-2025-5874,0,1,9ced9909954677980fd05ed703e0ada64f36d1b2d4a112366ca73af0c76203ce,2025-06-09T12:15:47.880000 +CVE-2025-5875,1,1,24e4f49f54b27d11f066f8fba41abf4bd6d448f2da79dea91762568f80c45afb,2025-06-09T13:15:25.637000 +CVE-2025-5876,1,1,c76215577ef3c6508a056a7810c6be9dafef05dae1d15fc561ff33b7d353c531,2025-06-09T13:15:25.777000 +CVE-2025-5877,1,1,fb2bcf4052cd1f96dd09c4d7adeb7758d0db64ec03a8280f59cdea5473f13f6e,2025-06-09T13:15:26.017000 +CVE-2025-5879,1,1,9f38da6b6fab7e2444db6fd37bcf690f7b4d7678a6fefdb9fd05afa8a3e140ca,2025-06-09T13:15:26.280000 +CVE-2025-5893,0,1,9044103ccb721af522b7b387bafda018ab5a7cc573ffd5677a8174274eea2d77,2025-06-09T12:15:47.880000 +CVE-2025-5894,0,1,654242cace97981f86dd5829ceaa9ac008f0c3374b73eef1c99cc2c32cf2e65d,2025-06-09T12:15:47.880000