From 7c1a39696ecac89efa0df4fbadc4dc0e5143bd7b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 8 Jun 2025 23:58:56 +0000 Subject: [PATCH] Auto-Update: 2025-06-08T23:55:18.901420+00:00 --- CVE-2025/CVE-2025-58xx/CVE-2025-5848.json | 145 ++++++++++++++++++++++ CVE-2025/CVE-2025-58xx/CVE-2025-5849.json | 145 ++++++++++++++++++++++ CVE-2025/CVE-2025-58xx/CVE-2025-5850.json | 145 ++++++++++++++++++++++ README.md | 26 ++-- _state.csv | 33 ++--- 5 files changed, 460 insertions(+), 34 deletions(-) create mode 100644 CVE-2025/CVE-2025-58xx/CVE-2025-5848.json create mode 100644 CVE-2025/CVE-2025-58xx/CVE-2025-5849.json create mode 100644 CVE-2025/CVE-2025-58xx/CVE-2025-5850.json diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json new file mode 100644 index 00000000000..da3e9dcbc78 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5848.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5848", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-08T22:15:21.200", + "lastModified": "2025-06-08T22:15:21.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetPPTPUserList-20adf0aa118580d080eacb031b89ddc6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591372", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json new file mode 100644 index 00000000000..45d84a35c2a --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5849.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5849", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-08T23:15:20.713", + "lastModified": "2025-06-08T23:15:20.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetSafeWanWebMan-20adf0aa1185806daab3ebe0036266cb", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591375", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json new file mode 100644 index 00000000000..805a14c0f88 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5850.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5850", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-08T23:15:20.927", + "lastModified": "2025-06-08T23:15:20.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/Tenda-AC15-formsetschedled-20adf0aa118580d984d8fcdb98d9959c", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591376", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 14c3c0826fa..56374c838c2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-08T22:00:20.066505+00:00 +2025-06-08T23:55:18.901420+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-08T21:15:33.030000+00:00 +2025-06-08T23:15:20.927000+00:00 ``` ### Last Data Feed Release @@ -33,28 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297006 +297009 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `3` -- [CVE-2025-32455](CVE-2025/CVE-2025-324xx/CVE-2025-32455.json) (`2025-06-08T21:15:30.993`) -- [CVE-2025-32456](CVE-2025/CVE-2025-324xx/CVE-2025-32456.json) (`2025-06-08T21:15:31.267`) -- [CVE-2025-32457](CVE-2025/CVE-2025-324xx/CVE-2025-32457.json) (`2025-06-08T21:15:31.403`) -- [CVE-2025-32458](CVE-2025/CVE-2025-324xx/CVE-2025-32458.json) (`2025-06-08T21:15:31.537`) -- [CVE-2025-32459](CVE-2025/CVE-2025-324xx/CVE-2025-32459.json) (`2025-06-08T21:15:31.673`) -- [CVE-2025-3459](CVE-2025/CVE-2025-34xx/CVE-2025-3459.json) (`2025-06-08T21:15:32.770`) -- [CVE-2025-3460](CVE-2025/CVE-2025-34xx/CVE-2025-3460.json) (`2025-06-08T21:15:32.900`) -- [CVE-2025-3461](CVE-2025/CVE-2025-34xx/CVE-2025-3461.json) (`2025-06-08T21:15:33.030`) -- [CVE-2025-35004](CVE-2025/CVE-2025-350xx/CVE-2025-35004.json) (`2025-06-08T21:15:31.807`) -- [CVE-2025-35005](CVE-2025/CVE-2025-350xx/CVE-2025-35005.json) (`2025-06-08T21:15:31.947`) -- [CVE-2025-35006](CVE-2025/CVE-2025-350xx/CVE-2025-35006.json) (`2025-06-08T21:15:32.087`) -- [CVE-2025-35007](CVE-2025/CVE-2025-350xx/CVE-2025-35007.json) (`2025-06-08T21:15:32.227`) -- [CVE-2025-35008](CVE-2025/CVE-2025-350xx/CVE-2025-35008.json) (`2025-06-08T21:15:32.363`) -- [CVE-2025-35009](CVE-2025/CVE-2025-350xx/CVE-2025-35009.json) (`2025-06-08T21:15:32.500`) -- [CVE-2025-35010](CVE-2025/CVE-2025-350xx/CVE-2025-35010.json) (`2025-06-08T21:15:32.633`) +- [CVE-2025-5848](CVE-2025/CVE-2025-58xx/CVE-2025-5848.json) (`2025-06-08T22:15:21.200`) +- [CVE-2025-5849](CVE-2025/CVE-2025-58xx/CVE-2025-5849.json) (`2025-06-08T23:15:20.713`) +- [CVE-2025-5850](CVE-2025/CVE-2025-58xx/CVE-2025-5850.json) (`2025-06-08T23:15:20.927`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index c93304cd3a8..f2540abd3a2 100644 --- a/_state.csv +++ b/_state.csv @@ -292432,11 +292432,11 @@ CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c8 CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000 CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000 CVE-2025-32454,0,0,d112044e8ac2aa2106f1b31f5429f300a7ae216ee8a2c99529918a4b88fc6446,2025-05-13T19:35:18.080000 -CVE-2025-32455,1,1,bbd9ee7abf40b6a9dccd709e5166dd796cbf8871a831e20efc6c94212d75e777,2025-06-08T21:15:30.993000 -CVE-2025-32456,1,1,d284ee679a768c67f842611d5c59a6768d9c189a7ebe9c37c6e1062e8a06747a,2025-06-08T21:15:31.267000 -CVE-2025-32457,1,1,910ccefc90cb2d13a730c03221bedc28d87ecb750c712cd54ffa90f1b9a92bd9,2025-06-08T21:15:31.403000 -CVE-2025-32458,1,1,ed1b705f41f96a6ee909150c688ae38f4b9351f40212178441d1a8c4862086ff,2025-06-08T21:15:31.537000 -CVE-2025-32459,1,1,aaa4a129c48104f431de5e03da57d6d29997a8f105b3c31e87f984e68da64c95,2025-06-08T21:15:31.673000 +CVE-2025-32455,0,0,bbd9ee7abf40b6a9dccd709e5166dd796cbf8871a831e20efc6c94212d75e777,2025-06-08T21:15:30.993000 +CVE-2025-32456,0,0,d284ee679a768c67f842611d5c59a6768d9c189a7ebe9c37c6e1062e8a06747a,2025-06-08T21:15:31.267000 +CVE-2025-32457,0,0,910ccefc90cb2d13a730c03221bedc28d87ecb750c712cd54ffa90f1b9a92bd9,2025-06-08T21:15:31.403000 +CVE-2025-32458,0,0,ed1b705f41f96a6ee909150c688ae38f4b9351f40212178441d1a8c4862086ff,2025-06-08T21:15:31.537000 +CVE-2025-32459,0,0,aaa4a129c48104f431de5e03da57d6d29997a8f105b3c31e87f984e68da64c95,2025-06-08T21:15:31.673000 CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000 CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 @@ -293073,9 +293073,9 @@ CVE-2025-3454,0,0,4237309546c7f67c43ed4306317e4be2d74b3a324e1d901b3aa918c9e80660 CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000 CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000 CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000 -CVE-2025-3459,1,1,d6c1106b70aa5cfae6feacd38449dbf3a310c9d0ee2b1fe6311c1cbd7996f5ba,2025-06-08T21:15:32.770000 -CVE-2025-3460,1,1,febf8323410ea68877ee89a7f789617931d3037b404c524b1e2cb91fedf7c836,2025-06-08T21:15:32.900000 -CVE-2025-3461,1,1,ad004bc388076ed434c1e9184e494c466490c4ca2f3a04538ead681fc0228995,2025-06-08T21:15:33.030000 +CVE-2025-3459,0,0,d6c1106b70aa5cfae6feacd38449dbf3a310c9d0ee2b1fe6311c1cbd7996f5ba,2025-06-08T21:15:32.770000 +CVE-2025-3460,0,0,febf8323410ea68877ee89a7f789617931d3037b404c524b1e2cb91fedf7c836,2025-06-08T21:15:32.900000 +CVE-2025-3461,0,0,ad004bc388076ed434c1e9184e494c466490c4ca2f3a04538ead681fc0228995,2025-06-08T21:15:33.030000 CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000 CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000 CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000 @@ -293101,14 +293101,14 @@ CVE-2025-3491,0,0,764070d57369c52ed17db36acb0e46c080442745adab2da0d65d4052df55b4 CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000 CVE-2025-3496,0,0,eeeb25234db4b5411b18647e6b883fd7c97d2c7df03da24267ee3dd146e4a70c,2025-05-12T17:32:32.760000 CVE-2025-35003,0,0,21587c625dab7683038a5bdc307498878657bea1128b3a4ea6c83622b9ed0b8f,2025-05-28T15:01:30.720000 -CVE-2025-35004,1,1,447749e5f1b0eeac431a6fb6856d9e948a7ac885a2abf514f9bcf5b5c8092a98,2025-06-08T21:15:31.807000 -CVE-2025-35005,1,1,18cf31cde4de8eb18affbeccdc38209c1e192cff1e5424dfafebde7dad73809d,2025-06-08T21:15:31.947000 -CVE-2025-35006,1,1,ee6d0ae4ce9d090e00224c991975358873b1d3612721159c8066554651ad976c,2025-06-08T21:15:32.087000 -CVE-2025-35007,1,1,d4d8bee293276b125296b3e9aff03c89dd0f8f7947991715e73320a8b1b09e65,2025-06-08T21:15:32.227000 -CVE-2025-35008,1,1,353dfbae967aee2dcca1327124a428244cc82b3301fcd256fafcd44fba206bdc,2025-06-08T21:15:32.363000 -CVE-2025-35009,1,1,df7f9b7486a3b396ddf5855c8f54dc471a364cd8eb32d9dd87f8eec6e2e1608e,2025-06-08T21:15:32.500000 +CVE-2025-35004,0,0,447749e5f1b0eeac431a6fb6856d9e948a7ac885a2abf514f9bcf5b5c8092a98,2025-06-08T21:15:31.807000 +CVE-2025-35005,0,0,18cf31cde4de8eb18affbeccdc38209c1e192cff1e5424dfafebde7dad73809d,2025-06-08T21:15:31.947000 +CVE-2025-35006,0,0,ee6d0ae4ce9d090e00224c991975358873b1d3612721159c8066554651ad976c,2025-06-08T21:15:32.087000 +CVE-2025-35007,0,0,d4d8bee293276b125296b3e9aff03c89dd0f8f7947991715e73320a8b1b09e65,2025-06-08T21:15:32.227000 +CVE-2025-35008,0,0,353dfbae967aee2dcca1327124a428244cc82b3301fcd256fafcd44fba206bdc,2025-06-08T21:15:32.363000 +CVE-2025-35009,0,0,df7f9b7486a3b396ddf5855c8f54dc471a364cd8eb32d9dd87f8eec6e2e1608e,2025-06-08T21:15:32.500000 CVE-2025-3501,0,0,b44a31b094864acab1ff386cddcad3fda5c65db85ee8c99ed4dbb344cd7aad09,2025-05-02T13:53:40.163000 -CVE-2025-35010,1,1,c5b3875219955a1bd44b22a7cb7938ccd85e9e7159a7e4d39174a62544915425,2025-06-08T21:15:32.633000 +CVE-2025-35010,0,0,c5b3875219955a1bd44b22a7cb7938ccd85e9e7159a7e4d39174a62544915425,2025-06-08T21:15:32.633000 CVE-2025-3502,0,0,7c73723b0d4b00e6da894445c57c5ec7f552a238ff16d874e6183139bc542d93,2025-05-07T16:30:24.910000 CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905f5,2025-05-07T16:30:33.803000 CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000 @@ -297005,3 +297005,6 @@ CVE-2025-5838,0,0,ba5038c5e4544342301fefd65f16f3eb1945ebf96b386c6cbebecd735cfedd CVE-2025-5839,0,0,4efb9e7f992ec0cf0b490a41765d64fdc79638a0fc7c7b695bd87786fa84522d,2025-06-07T18:15:25.080000 CVE-2025-5840,0,0,6060b28c44367562648dda64a70c474fb07a81415250a659e2cb863608a79fe9,2025-06-07T18:15:25.320000 CVE-2025-5847,0,0,c2f0ef1d6191ae5a982ebbcf96b0aeccb9a9e804d684fffe50b5e080d1b4793b,2025-06-08T14:15:21.097000 +CVE-2025-5848,1,1,b80478a5483b6bb182e91f5c754722b41c29b063497fef165e16b5e242f332fe,2025-06-08T22:15:21.200000 +CVE-2025-5849,1,1,4bd985a99f1205023a2c3d4c2113f4a18d1aeb5c85ad841e9d9b0bc21074e9f5,2025-06-08T23:15:20.713000 +CVE-2025-5850,1,1,b6adc1754c863146876fe444ca95e185a637d2b50259ecc472df93f14d69003c,2025-06-08T23:15:20.927000