diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json new file mode 100644 index 00000000000..da3e9dcbc78 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5848", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-08T22:15:21.200", + "lastModified": "2025-06-08T22:15:21.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetPPTPUserList-20adf0aa118580d080eacb031b89ddc6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591372", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json new file mode 100644 index 00000000000..45d84a35c2a --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5849", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-08T23:15:20.713", + "lastModified": "2025-06-08T23:15:20.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetSafeWanWebMan-20adf0aa1185806daab3ebe0036266cb", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591375", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json new file mode 100644 index 00000000000..805a14c0f88 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5850", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-08T23:15:20.927", + "lastModified": "2025-06-08T23:15:20.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formsetschedled-20adf0aa118580d984d8fcdb98d9959c", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591376", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 14c3c0826fa..56374c838c2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-08T22:00:20.066505+00:00 +2025-06-08T23:55:18.901420+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-08T21:15:33.030000+00:00 +2025-06-08T23:15:20.927000+00:00 ``` ### Last Data Feed Release @@ -33,28 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297006 +297009 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `3` -- [CVE-2025-32455](CVE-2025/CVE-2025-324xx/CVE-2025-32455.json) (`2025-06-08T21:15:30.993`) -- [CVE-2025-32456](CVE-2025/CVE-2025-324xx/CVE-2025-32456.json) (`2025-06-08T21:15:31.267`) -- [CVE-2025-32457](CVE-2025/CVE-2025-324xx/CVE-2025-32457.json) (`2025-06-08T21:15:31.403`) -- [CVE-2025-32458](CVE-2025/CVE-2025-324xx/CVE-2025-32458.json) (`2025-06-08T21:15:31.537`) -- [CVE-2025-32459](CVE-2025/CVE-2025-324xx/CVE-2025-32459.json) (`2025-06-08T21:15:31.673`) -- [CVE-2025-3459](CVE-2025/CVE-2025-34xx/CVE-2025-3459.json) (`2025-06-08T21:15:32.770`) -- [CVE-2025-3460](CVE-2025/CVE-2025-34xx/CVE-2025-3460.json) (`2025-06-08T21:15:32.900`) -- [CVE-2025-3461](CVE-2025/CVE-2025-34xx/CVE-2025-3461.json) (`2025-06-08T21:15:33.030`) -- [CVE-2025-35004](CVE-2025/CVE-2025-350xx/CVE-2025-35004.json) (`2025-06-08T21:15:31.807`) -- [CVE-2025-35005](CVE-2025/CVE-2025-350xx/CVE-2025-35005.json) (`2025-06-08T21:15:31.947`) -- [CVE-2025-35006](CVE-2025/CVE-2025-350xx/CVE-2025-35006.json) (`2025-06-08T21:15:32.087`) -- [CVE-2025-35007](CVE-2025/CVE-2025-350xx/CVE-2025-35007.json) (`2025-06-08T21:15:32.227`) -- [CVE-2025-35008](CVE-2025/CVE-2025-350xx/CVE-2025-35008.json) (`2025-06-08T21:15:32.363`) -- [CVE-2025-35009](CVE-2025/CVE-2025-350xx/CVE-2025-35009.json) (`2025-06-08T21:15:32.500`) -- [CVE-2025-35010](CVE-2025/CVE-2025-350xx/CVE-2025-35010.json) (`2025-06-08T21:15:32.633`) +- [CVE-2025-5848](CVE-2025/CVE-2025-58xx/CVE-2025-5848.json) (`2025-06-08T22:15:21.200`) +- [CVE-2025-5849](CVE-2025/CVE-2025-58xx/CVE-2025-5849.json) (`2025-06-08T23:15:20.713`) +- [CVE-2025-5850](CVE-2025/CVE-2025-58xx/CVE-2025-5850.json) (`2025-06-08T23:15:20.927`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index c93304cd3a8..f2540abd3a2 100644 --- a/_state.csv +++ b/_state.csv @@ -292432,11 +292432,11 @@ CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c8 CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000 CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000 CVE-2025-32454,0,0,d112044e8ac2aa2106f1b31f5429f300a7ae216ee8a2c99529918a4b88fc6446,2025-05-13T19:35:18.080000 -CVE-2025-32455,1,1,bbd9ee7abf40b6a9dccd709e5166dd796cbf8871a831e20efc6c94212d75e777,2025-06-08T21:15:30.993000 -CVE-2025-32456,1,1,d284ee679a768c67f842611d5c59a6768d9c189a7ebe9c37c6e1062e8a06747a,2025-06-08T21:15:31.267000 -CVE-2025-32457,1,1,910ccefc90cb2d13a730c03221bedc28d87ecb750c712cd54ffa90f1b9a92bd9,2025-06-08T21:15:31.403000 -CVE-2025-32458,1,1,ed1b705f41f96a6ee909150c688ae38f4b9351f40212178441d1a8c4862086ff,2025-06-08T21:15:31.537000 -CVE-2025-32459,1,1,aaa4a129c48104f431de5e03da57d6d29997a8f105b3c31e87f984e68da64c95,2025-06-08T21:15:31.673000 +CVE-2025-32455,0,0,bbd9ee7abf40b6a9dccd709e5166dd796cbf8871a831e20efc6c94212d75e777,2025-06-08T21:15:30.993000 +CVE-2025-32456,0,0,d284ee679a768c67f842611d5c59a6768d9c189a7ebe9c37c6e1062e8a06747a,2025-06-08T21:15:31.267000 +CVE-2025-32457,0,0,910ccefc90cb2d13a730c03221bedc28d87ecb750c712cd54ffa90f1b9a92bd9,2025-06-08T21:15:31.403000 +CVE-2025-32458,0,0,ed1b705f41f96a6ee909150c688ae38f4b9351f40212178441d1a8c4862086ff,2025-06-08T21:15:31.537000 +CVE-2025-32459,0,0,aaa4a129c48104f431de5e03da57d6d29997a8f105b3c31e87f984e68da64c95,2025-06-08T21:15:31.673000 CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000 CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 @@ -293073,9 +293073,9 @@ CVE-2025-3454,0,0,4237309546c7f67c43ed4306317e4be2d74b3a324e1d901b3aa918c9e80660 CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000 CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000 CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000 -CVE-2025-3459,1,1,d6c1106b70aa5cfae6feacd38449dbf3a310c9d0ee2b1fe6311c1cbd7996f5ba,2025-06-08T21:15:32.770000 -CVE-2025-3460,1,1,febf8323410ea68877ee89a7f789617931d3037b404c524b1e2cb91fedf7c836,2025-06-08T21:15:32.900000 -CVE-2025-3461,1,1,ad004bc388076ed434c1e9184e494c466490c4ca2f3a04538ead681fc0228995,2025-06-08T21:15:33.030000 +CVE-2025-3459,0,0,d6c1106b70aa5cfae6feacd38449dbf3a310c9d0ee2b1fe6311c1cbd7996f5ba,2025-06-08T21:15:32.770000 +CVE-2025-3460,0,0,febf8323410ea68877ee89a7f789617931d3037b404c524b1e2cb91fedf7c836,2025-06-08T21:15:32.900000 +CVE-2025-3461,0,0,ad004bc388076ed434c1e9184e494c466490c4ca2f3a04538ead681fc0228995,2025-06-08T21:15:33.030000 CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000 CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000 CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000 @@ -293101,14 +293101,14 @@ CVE-2025-3491,0,0,764070d57369c52ed17db36acb0e46c080442745adab2da0d65d4052df55b4 CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000 CVE-2025-3496,0,0,eeeb25234db4b5411b18647e6b883fd7c97d2c7df03da24267ee3dd146e4a70c,2025-05-12T17:32:32.760000 CVE-2025-35003,0,0,21587c625dab7683038a5bdc307498878657bea1128b3a4ea6c83622b9ed0b8f,2025-05-28T15:01:30.720000 -CVE-2025-35004,1,1,447749e5f1b0eeac431a6fb6856d9e948a7ac885a2abf514f9bcf5b5c8092a98,2025-06-08T21:15:31.807000 -CVE-2025-35005,1,1,18cf31cde4de8eb18affbeccdc38209c1e192cff1e5424dfafebde7dad73809d,2025-06-08T21:15:31.947000 -CVE-2025-35006,1,1,ee6d0ae4ce9d090e00224c991975358873b1d3612721159c8066554651ad976c,2025-06-08T21:15:32.087000 -CVE-2025-35007,1,1,d4d8bee293276b125296b3e9aff03c89dd0f8f7947991715e73320a8b1b09e65,2025-06-08T21:15:32.227000 -CVE-2025-35008,1,1,353dfbae967aee2dcca1327124a428244cc82b3301fcd256fafcd44fba206bdc,2025-06-08T21:15:32.363000 -CVE-2025-35009,1,1,df7f9b7486a3b396ddf5855c8f54dc471a364cd8eb32d9dd87f8eec6e2e1608e,2025-06-08T21:15:32.500000 +CVE-2025-35004,0,0,447749e5f1b0eeac431a6fb6856d9e948a7ac885a2abf514f9bcf5b5c8092a98,2025-06-08T21:15:31.807000 +CVE-2025-35005,0,0,18cf31cde4de8eb18affbeccdc38209c1e192cff1e5424dfafebde7dad73809d,2025-06-08T21:15:31.947000 +CVE-2025-35006,0,0,ee6d0ae4ce9d090e00224c991975358873b1d3612721159c8066554651ad976c,2025-06-08T21:15:32.087000 +CVE-2025-35007,0,0,d4d8bee293276b125296b3e9aff03c89dd0f8f7947991715e73320a8b1b09e65,2025-06-08T21:15:32.227000 +CVE-2025-35008,0,0,353dfbae967aee2dcca1327124a428244cc82b3301fcd256fafcd44fba206bdc,2025-06-08T21:15:32.363000 +CVE-2025-35009,0,0,df7f9b7486a3b396ddf5855c8f54dc471a364cd8eb32d9dd87f8eec6e2e1608e,2025-06-08T21:15:32.500000 CVE-2025-3501,0,0,b44a31b094864acab1ff386cddcad3fda5c65db85ee8c99ed4dbb344cd7aad09,2025-05-02T13:53:40.163000 -CVE-2025-35010,1,1,c5b3875219955a1bd44b22a7cb7938ccd85e9e7159a7e4d39174a62544915425,2025-06-08T21:15:32.633000 +CVE-2025-35010,0,0,c5b3875219955a1bd44b22a7cb7938ccd85e9e7159a7e4d39174a62544915425,2025-06-08T21:15:32.633000 CVE-2025-3502,0,0,7c73723b0d4b00e6da894445c57c5ec7f552a238ff16d874e6183139bc542d93,2025-05-07T16:30:24.910000 CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905f5,2025-05-07T16:30:33.803000 CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000 @@ -297005,3 +297005,6 @@ CVE-2025-5838,0,0,ba5038c5e4544342301fefd65f16f3eb1945ebf96b386c6cbebecd735cfedd CVE-2025-5839,0,0,4efb9e7f992ec0cf0b490a41765d64fdc79638a0fc7c7b695bd87786fa84522d,2025-06-07T18:15:25.080000 CVE-2025-5840,0,0,6060b28c44367562648dda64a70c474fb07a81415250a659e2cb863608a79fe9,2025-06-07T18:15:25.320000 CVE-2025-5847,0,0,c2f0ef1d6191ae5a982ebbcf96b0aeccb9a9e804d684fffe50b5e080d1b4793b,2025-06-08T14:15:21.097000 +CVE-2025-5848,1,1,b80478a5483b6bb182e91f5c754722b41c29b063497fef165e16b5e242f332fe,2025-06-08T22:15:21.200000 +CVE-2025-5849,1,1,4bd985a99f1205023a2c3d4c2113f4a18d1aeb5c85ad841e9d9b0bc21074e9f5,2025-06-08T23:15:20.713000 +CVE-2025-5850,1,1,b6adc1754c863146876fe444ca95e185a637d2b50259ecc472df93f14d69003c,2025-06-08T23:15:20.927000