Auto-Update: 2025-06-25T14:00:27.481340+00:00

This commit is contained in:
cad-safe-bot 2025-06-25 14:04:04 +00:00
parent 2843575539
commit 7d7e8367f6
27 changed files with 749 additions and 87 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47030",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T20:15:27.740",
"lastModified": "2025-06-24T18:15:23.003",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-25T12:50:37.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1ujUcB8XEs78WwWzs8cmD-u1Twqi10yEh/view?usp=sharing",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47030/CVE-2023-47030.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47031",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T17:15:27.313",
"lastModified": "2025-06-24T18:15:23.563",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-25T13:13:50.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
}
]
}
]
}
],
"references": [
{
"url": "http://ncr.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://terminal.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://drive.google.com/file/d/1f9riw_seicV9MB7pRQJFY-8voxkW8ZYH/view?usp=sharing",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47032",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:23.920",
"lastModified": "2025-06-24T18:15:23.730",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-25T13:32:01.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1rTKc2nxEc40VTItJiJ9moZ5VrHG3xQuj/view?usp=sharing",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47032/CVE-2023-47032.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47295",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.623",
"lastModified": "2025-06-24T18:15:23.893",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-25T13:30:08.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/14uldfUpLRIc-NfHiUco0ja-ZiF0MazGA/view?usp=sharing",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47295/CVE-2023-47295.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51978",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-06-25T08:15:31.223",
"lastModified": "2025-06-25T08:15:31.223",
"lastModified": "2025-06-25T13:15:20.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -71,6 +71,10 @@
{
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
"source": "cve@rapid7.com"
},
{
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51979",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-06-25T08:15:31.590",
"lastModified": "2025-06-25T08:15:31.590",
"lastModified": "2025-06-25T13:15:21.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -71,6 +71,10 @@
{
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
"source": "cve@rapid7.com"
},
{
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51980",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-06-25T08:15:31.930",
"lastModified": "2025-06-25T08:15:31.930",
"lastModified": "2025-06-25T13:15:22.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -71,6 +71,10 @@
{
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
"source": "cve@rapid7.com"
},
{
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51981",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-06-25T08:15:32.293",
"lastModified": "2025-06-25T08:15:32.293",
"lastModified": "2025-06-25T13:15:22.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -75,6 +75,10 @@
{
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
"source": "cve@rapid7.com"
},
{
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51982",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-06-25T08:15:32.650",
"lastModified": "2025-06-25T08:15:32.650",
"lastModified": "2025-06-25T13:15:23.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -63,6 +63,10 @@
{
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
"source": "cve@rapid7.com"
},
{
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51983",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-06-25T08:15:32.873",
"lastModified": "2025-06-25T08:15:32.873",
"lastModified": "2025-06-25T13:15:23.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -67,6 +67,10 @@
{
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
"source": "cve@rapid7.com"
},
{
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51984",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-06-25T08:15:33.220",
"lastModified": "2025-06-25T08:15:33.220",
"lastModified": "2025-06-25T13:15:23.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -71,6 +71,10 @@
{
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
"source": "cve@rapid7.com"
},
{
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25012",
"sourceIdentifier": "bressers@elastic.co",
"published": "2025-06-25T12:15:19.920",
"lastModified": "2025-06-25T12:15:19.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://discuss.elastic.co/t/kibana-7-17-29-8-17-8-8-18-3-9-0-3-security-update-esa-2025-10/379444",
"source": "bressers@elastic.co"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-34031",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:23.340",
"lastModified": "2025-06-24T03:15:32.860",
"lastModified": "2025-06-25T13:15:25.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de path traversal en el complemento Moodle LMS Jmol versi\u00f3n 6.1 y anteriores mediante el par\u00e1metro de consulta en jsmol.php. El script pasa directamente la entrada del usuario a la funci\u00f3n file_get_contents() sin la validaci\u00f3n adecuada, lo que permite a los atacantes leer archivos arbitrarios del sistema de archivos del servidor mediante la manipulaci\u00f3n de un valor de consulta malicioso. Esta vulnerabilidad puede explotarse sin autenticaci\u00f3n y puede exponer datos de configuraci\u00f3n confidenciales, incluidas las credenciales de la base de datos."
}
],
"metrics": {
@ -89,6 +93,10 @@
{
"url": "https://www.exploit-db.com/exploits/46881",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/46881",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-34032",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.350",
"lastModified": "2025-06-24T03:15:32.987",
"lastModified": "2025-06-25T13:15:25.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de cross-site scripting (XSS) reflejado en el complemento Moodle LMS Jmol versi\u00f3n 6.1 y anteriores a trav\u00e9s del par\u00e1metro data en jsmol.php. La aplicaci\u00f3n no depura correctamente la entrada del usuario antes de incrustarla en la respuesta HTTP, lo que permite a un atacante ejecutar JavaScript arbitrario en el navegador de la v\u00edctima mediante la manipulaci\u00f3n de un enlace malicioso. Esto puede utilizarse para secuestrar sesiones de usuario o manipular el contenido de la p\u00e1gina."
}
],
"metrics": {
@ -85,6 +89,10 @@
{
"url": "https://www.exploit-db.com/exploits/46881",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/46881",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-48466",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.013",
"lastModified": "2025-06-24T03:15:34.013",
"lastModified": "2025-06-25T13:15:26.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks."
},
{
"lang": "es",
"value": "La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir que un atacante remoto no autenticado env\u00ede paquetes Modbus TCP para manipular salidas digitales, lo que potencialmente permitir\u00eda el control remoto del canal de rel\u00e9 que podr\u00eda generar riesgos operativos o de seguridad."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/shipcod3/CVE-2025-48466",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-48469",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.390",
"lastModified": "2025-06-24T03:15:34.390",
"lastModified": "2025-06-25T13:15:26.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload firmware through a public update page, potentially leading to backdoor installation or privilege escalation."
},
{
"lang": "es",
"value": "La explotaci\u00f3n exitosa de la vulnerabilidad podr\u00eda permitir que un atacante no autenticado cargue firmware a trav\u00e9s de una p\u00e1gina de actualizaci\u00f3n p\u00fablica, lo que podr\u00eda conducir a la instalaci\u00f3n de una puerta trasera o a una escalada de privilegios."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://jro.sg/CVEs/CVE-2025-48469/",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-48470",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.523",
"lastModified": "2025-06-24T03:15:34.523",
"lastModified": "2025-06-25T13:15:26.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users\u2019 browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation."
},
{
"lang": "es",
"value": "La explotaci\u00f3n exitosa de la vulnerabilidad de cross-site scripting almacenado podr\u00eda permitir a un atacante inyectar secuencias de comandos maliciosas en los campos del dispositivo y ejecutarlas en el navegador de otros usuarios, lo que podr\u00eda conducir al secuestro de sesi\u00f3n, desfiguraci\u00f3n, robo de credenciales o escalada de privilegios. "
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-50348",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T19:15:24.647",
"lastModified": "2025-06-24T18:15:25.610",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-25T13:08:13.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-3.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-3.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-50349",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T19:15:24.787",
"lastModified": "2025-06-24T18:15:25.830",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-25T13:01:11.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-4.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-4.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-6424",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-24T13:15:23.273",
"lastModified": "2025-06-24T13:15:23.273",
"lastModified": "2025-06-25T13:15:26.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12."
},
{
"lang": "es",
"value": "Use-after-free en FontFaceSet provoc\u00f3 un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox &lt; 140, Firefox ESR &lt; 115.25 y Firefox ESR &lt; 128.12."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1966423",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-6431",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-24T13:15:24.103",
"lastModified": "2025-06-24T13:15:24.103",
"lastModified": "2025-06-25T13:15:26.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When a link can be opened in an external application, Firefox for Android will, by default, prompt the user before doing so. An attacker could have bypassed this prompt, potentially exposing the user to security vulnerabilities or privacy leaks in external applications. \n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 140."
},
{
"lang": "es",
"value": "Cuando se puede abrir un enlace en una aplicaci\u00f3n externa, Firefox para Android, por defecto, pregunta al usuario antes de hacerlo. Un atacante podr\u00eda haber omitido esta pregunta, exponiendo al usuario a vulnerabilidades de seguridad o filtraciones de privacidad en aplicaciones externas. *Este error solo afecta a Firefox para Android. Las dem\u00e1s versiones de Firefox no se ven afectadas.* Esta vulnerabilidad afecta a Firefox anteriores a la versi\u00f3n 140."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942716",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-6433",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-24T13:15:24.327",
"lastModified": "2025-06-24T13:15:24.327",
"lastModified": "2025-06-25T13:15:26.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires \"a secure transport established without errors\". This vulnerability affects Firefox < 140."
},
{
"lang": "es",
"value": "Si un usuario visitaba una p\u00e1gina web con un certificado TLS no v\u00e1lido y conced\u00eda una excepci\u00f3n, la p\u00e1gina web pod\u00eda generar un desaf\u00edo de WebAuthN que el usuario deb\u00eda completar. Esto infringe la especificaci\u00f3n de WebAuthN, que exige \"un transporte seguro establecido sin errores\". Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 140."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1954033",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6534",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T01:15:25.303",
"lastModified": "2025-06-24T01:15:25.303",
"lastModified": "2025-06-25T13:15:27.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in xxyopen/201206030 novel-plus up to 5.1.3. This affects the function remove of the file novel-admin/src/main/java/com/java2nb/common/controller/FileController.java of the component File Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en xxyopen/201206030 novel-plus hasta la versi\u00f3n 5.1.3. Esta vulnerabilidad afecta la funci\u00f3n de eliminaci\u00f3n del archivo novel-admin/src/main/java/com/java2nb/common/controller/FileController.java del componente File Handler. La manipulaci\u00f3n conlleva un control indebido de los identificadores de recursos. Es posible iniciar el ataque de forma remota. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.596505",
"source": "cna@vuldb.com"
},
{
"url": "https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-6543",
"sourceIdentifier": "secure@citrix.com",
"published": "2025-06-25T13:15:27.293",
"lastModified": "2025-06-25T13:15:27.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when\u00a0configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server"
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788",
"source": "secure@citrix.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6604",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-25T13:15:27.557",
"lastModified": "2025-06-25T13:15:27.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/add-staff.php. The manipulation of the argument Name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/SQL-5.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313821",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313821",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.601913",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-25T12:00:26.161381+00:00
2025-06-25T14:00:27.481340+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-25T11:15:22.193000+00:00
2025-06-25T13:32:01.277000+00:00
```
### Last Data Feed Release
@ -33,26 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
299278
299281
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `3`
- [CVE-2025-41255](CVE-2025/CVE-2025-412xx/CVE-2025-41255.json) (`2025-06-25T10:15:21.783`)
- [CVE-2025-41256](CVE-2025/CVE-2025-412xx/CVE-2025-41256.json) (`2025-06-25T10:15:22.610`)
- [CVE-2025-41647](CVE-2025/CVE-2025-416xx/CVE-2025-41647.json) (`2025-06-25T10:15:22.747`)
- [CVE-2025-49797](CVE-2025/CVE-2025-497xx/CVE-2025-49797.json) (`2025-06-25T10:15:22.910`)
- [CVE-2025-5927](CVE-2025/CVE-2025-59xx/CVE-2025-5927.json) (`2025-06-25T10:15:23.090`)
- [CVE-2025-6603](CVE-2025/CVE-2025-66xx/CVE-2025-6603.json) (`2025-06-25T11:15:22.193`)
- [CVE-2025-6613](CVE-2025/CVE-2025-66xx/CVE-2025-6613.json) (`2025-06-25T10:15:23.253`)
- [CVE-2025-25012](CVE-2025/CVE-2025-250xx/CVE-2025-25012.json) (`2025-06-25T12:15:19.920`)
- [CVE-2025-6543](CVE-2025/CVE-2025-65xx/CVE-2025-6543.json) (`2025-06-25T13:15:27.293`)
- [CVE-2025-6604](CVE-2025/CVE-2025-66xx/CVE-2025-6604.json) (`2025-06-25T13:15:27.557`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `22`
- [CVE-2023-47030](CVE-2023/CVE-2023-470xx/CVE-2023-47030.json) (`2025-06-25T12:50:37.217`)
- [CVE-2023-47031](CVE-2023/CVE-2023-470xx/CVE-2023-47031.json) (`2025-06-25T13:13:50.157`)
- [CVE-2023-47032](CVE-2023/CVE-2023-470xx/CVE-2023-47032.json) (`2025-06-25T13:32:01.277`)
- [CVE-2023-47295](CVE-2023/CVE-2023-472xx/CVE-2023-47295.json) (`2025-06-25T13:30:08.523`)
- [CVE-2024-51978](CVE-2024/CVE-2024-519xx/CVE-2024-51978.json) (`2025-06-25T13:15:20.717`)
- [CVE-2024-51979](CVE-2024/CVE-2024-519xx/CVE-2024-51979.json) (`2025-06-25T13:15:21.790`)
- [CVE-2024-51980](CVE-2024/CVE-2024-519xx/CVE-2024-51980.json) (`2025-06-25T13:15:22.203`)
- [CVE-2024-51981](CVE-2024/CVE-2024-519xx/CVE-2024-51981.json) (`2025-06-25T13:15:22.677`)
- [CVE-2024-51982](CVE-2024/CVE-2024-519xx/CVE-2024-51982.json) (`2025-06-25T13:15:23.133`)
- [CVE-2024-51983](CVE-2024/CVE-2024-519xx/CVE-2024-51983.json) (`2025-06-25T13:15:23.377`)
- [CVE-2024-51984](CVE-2024/CVE-2024-519xx/CVE-2024-51984.json) (`2025-06-25T13:15:23.900`)
- [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-25T13:15:25.270`)
- [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-25T13:15:25.400`)
- [CVE-2025-48466](CVE-2025/CVE-2025-484xx/CVE-2025-48466.json) (`2025-06-25T13:15:26.133`)
- [CVE-2025-48469](CVE-2025/CVE-2025-484xx/CVE-2025-48469.json) (`2025-06-25T13:15:26.273`)
- [CVE-2025-48470](CVE-2025/CVE-2025-484xx/CVE-2025-48470.json) (`2025-06-25T13:15:26.410`)
- [CVE-2025-50348](CVE-2025/CVE-2025-503xx/CVE-2025-50348.json) (`2025-06-25T13:08:13.867`)
- [CVE-2025-50349](CVE-2025/CVE-2025-503xx/CVE-2025-50349.json) (`2025-06-25T13:01:11.240`)
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-06-25T13:15:26.633`)
- [CVE-2025-6431](CVE-2025/CVE-2025-64xx/CVE-2025-6431.json) (`2025-06-25T13:15:26.800`)
- [CVE-2025-6433](CVE-2025/CVE-2025-64xx/CVE-2025-6433.json) (`2025-06-25T13:15:26.977`)
- [CVE-2025-6534](CVE-2025/CVE-2025-65xx/CVE-2025-6534.json) (`2025-06-25T13:15:27.137`)
## Download and Usage

View File

@ -237904,9 +237904,9 @@ CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
CVE-2023-47030,0,0,ee90a36dfc63d39b5c6737d0f0403f4137bce21157cbc095a67d4039da28da25,2025-06-24T18:15:23.003000
CVE-2023-47031,0,0,8c355c94ea255597d7cb2c2cedcc31b6f0c5e4c2f796647a5bcdfb2cafe77d57,2025-06-24T18:15:23.563000
CVE-2023-47032,0,0,ab1b52e064cb5253285a61f10d0988b397ce325e3f6846f306333001f10f5273,2025-06-24T18:15:23.730000
CVE-2023-47030,0,1,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000
CVE-2023-47031,0,1,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000
CVE-2023-47032,0,1,bacc5086cd0fda0d398c9333a36399e96f47e02b2b92f2e92d77083955e738c6,2025-06-25T13:32:01.277000
CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000
CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000
CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000
@ -238138,7 +238138,7 @@ CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000
CVE-2023-47295,0,0,b4a5a5866365997d4b67d82b14a920f11d08b865f6fbb000c9018e6db15b352d,2025-06-24T18:15:23.893000
CVE-2023-47295,0,1,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000
CVE-2023-47297,0,0,8949ada58483b5ab75d0893499dc33e938392dca9ba71df8235231fd2dbaa934,2025-06-24T18:15:24.060000
CVE-2023-47298,0,0,c409530cf61d56b21c99c649ee44169bc5e7d2ee17a3a9ef9a5831f4a402984b,2025-06-24T16:15:23.940000
CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000
@ -274829,14 +274829,14 @@ CVE-2024-51963,0,0,65d15561511f4792024c62d0c3dbbe1a84656f415b27a24cc7fcb099d4df1
CVE-2024-51966,0,0,69a0d46bcaa28466534ecd74cb2be650273566964ba1c75d7e0cb22b97d45b63,2025-04-10T20:15:21.850000
CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000
CVE-2024-51977,0,0,6f38658394725c55998fb8fb4c547765adae4f5bfc0f1b441e5f316f5094f7df,2025-06-25T08:15:30.053000
CVE-2024-51978,0,0,44f28670ba4aad01b2cab1e0a17e8fb3344218487bfaa21f545b2957b78b1aeb,2025-06-25T08:15:31.223000
CVE-2024-51979,0,0,7429856c2cab5ae7d15707bbef67ec808b2f44a2637525d216353bef0260aa8b,2025-06-25T08:15:31.590000
CVE-2024-51978,0,1,d44b0cb729e7cd696172a236e99f532d446a4a53474bf05684dfd78a11be47d6,2025-06-25T13:15:20.717000
CVE-2024-51979,0,1,04bf702ad651656976f29cdcae61c0e3e2e9a3e657ff9b88c97cf67bf1bb262f,2025-06-25T13:15:21.790000
CVE-2024-5198,0,0,3fa9ec394e1888d66e83812554066b455d9458d73cda1ea9275cc8bdd128d3dc,2025-06-10T16:12:09.340000
CVE-2024-51980,0,0,b18f64f7aa3048ec39d082a8669a7bf601251b6412a7b23ebac6c2d1ee2e0ba1,2025-06-25T08:15:31.930000
CVE-2024-51981,0,0,980109182d9945f2520d085055b44b201830eb4e90fa94fff4458383987395f6,2025-06-25T08:15:32.293000
CVE-2024-51982,0,0,06f6a1e27a95c32cb69b28782e5d6615d8c28e7f8c2b84931342b03b5deac10e,2025-06-25T08:15:32.650000
CVE-2024-51983,0,0,36bcfba68c3a049625884d1458380ec3cfbbad4ef01aed8743fe39304244919a,2025-06-25T08:15:32.873000
CVE-2024-51984,0,0,31dbf56b669052fe1f240085e00dd9f82b12f4346271534902d4591059b5ddd1,2025-06-25T08:15:33.220000
CVE-2024-51980,0,1,6d10bfcf86832faf46af355a7aa26eff84d97c03c8138abcea972409ecbc69ec,2025-06-25T13:15:22.203000
CVE-2024-51981,0,1,72ddbd3bfa6041b937ecf18a390d4a284a967c5c635371727ce70c88313d691d,2025-06-25T13:15:22.677000
CVE-2024-51982,0,1,27746e69663bb58bd06458c806ed1cc48e2532f73321ed06edb4941ae2d727ac,2025-06-25T13:15:23.133000
CVE-2024-51983,0,1,bedc909e90e5407358f50891163a7e24ca03f4c18588152dbac9594b3a1673cc,2025-06-25T13:15:23.377000
CVE-2024-51984,0,1,79f0a57fd72b0a1085d635567ee10eff8a43b87ccde02a19edb61ae5475ce42e,2025-06-25T13:15:23.900000
CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000
CVE-2024-51988,0,0,a45b9470dfa3fc9b3b82cb1bacb88f01f17e4e8292b3ec9c884e93e16e6b15ff,2024-11-08T19:01:25.633000
CVE-2024-51989,0,0,a62aa77319eb44e1ae15c0a171eaaf0800894194bc1d4e92f5debdb86b23946b,2024-11-08T19:01:03.880000
@ -288392,6 +288392,7 @@ CVE-2025-25002,0,0,12f8033c4f78f1fc2a11a22d65139dde5cad0f892f0f27858d617011f4499
CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000
CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000
CVE-2025-2501,0,0,b88e6d23c5ab944162eb989f85baa8515946f4b0b4bb397d5de06dbaddedba6c,2025-06-02T17:32:17.397000
CVE-2025-25012,1,1,a51f1a1a9e75f415cdf948a6f1f68fac77a619f4250be562c8dd2ea30c64da57,2025-06-25T12:15:19.920000
CVE-2025-25013,0,0,8b0fcb6890b87ced02ed7f1e0ef615815bf6fcf1ec3fd1005c85d59a010589fb,2025-04-09T20:02:41.860000
CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352e87,2025-05-07T14:13:20.483000
CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000
@ -293696,8 +293697,8 @@ CVE-2025-34028,0,0,5921097810a177c4353bfac19f550e88ddb782dc2bdfd50f1c119b90d9521
CVE-2025-34029,0,0,fce8cf00dbe90f2e2f66f959940597018af6c7d9b991eb3c7e5416bdc6367309,2025-06-23T20:16:21.633000
CVE-2025-3403,0,0,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000
CVE-2025-34030,0,0,f524795d494d41af1abb43d588204e0e445079de2112dc398bcbfb7219de5267,2025-06-23T20:16:21.633000
CVE-2025-34031,0,0,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82428,2025-06-24T03:15:32.860000
CVE-2025-34032,0,0,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000
CVE-2025-34031,0,1,a70b5aedc0e75dc07fbfcf927e0e2e646dcc463d3cc18aab8a00fbe9c96636cd,2025-06-25T13:15:25.270000
CVE-2025-34032,0,1,54f585644bc2d51f1157260f719a9ce5b0b0b0896326102d01601023e62f0c22,2025-06-25T13:15:25.400000
CVE-2025-34033,0,0,50da276360d9ac4942dc1b6769de57a8ae85ead868e492e6b65f0fba53e99f21,2025-06-24T22:15:21.157000
CVE-2025-34034,0,0,ff7757f528c677e8f5c6a1f05e94cc315c3dfd0881d802972ab4b91369b66bf5,2025-06-24T22:15:22.230000
CVE-2025-34035,0,0,875b7d990fc0620b461d78bcd5eb0a7cc37310985a6cc30d439b019a31ebffaa,2025-06-24T14:15:28.820000
@ -295089,8 +295090,8 @@ CVE-2025-41234,0,0,bb572dbce1b43c89d5def5eaa839991a1c2f9f88699e8591ac93b3ce7a270
CVE-2025-41235,0,0,d4d8945eb1b378e0ed66f8c1428c86eda4f61188221c7cba9d8ecf68b09b94fa,2025-05-30T16:31:03.107000
CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000
CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000
CVE-2025-41255,1,1,a7176b6926d7ad81c1856a10ec7e9d4648d6ff0bf70ae844ffb5539292ca9ec7,2025-06-25T10:15:21.783000
CVE-2025-41256,1,1,96d1b365160d5f02ee20cd2de8687c8c43d24a935aa12602542fcb00925da8ef,2025-06-25T10:15:22.610000
CVE-2025-41255,0,0,a7176b6926d7ad81c1856a10ec7e9d4648d6ff0bf70ae844ffb5539292ca9ec7,2025-06-25T10:15:21.783000
CVE-2025-41256,0,0,96d1b365160d5f02ee20cd2de8687c8c43d24a935aa12602542fcb00925da8ef,2025-06-25T10:15:22.610000
CVE-2025-4126,0,0,c504eb8f9e35e66ea3a2e9e649e0b3ff59910e9bf49695680cf85ff18119f2ac,2025-05-16T14:43:26.160000
CVE-2025-4127,0,0,440aeef33b0470c9ce2f9d93f454f227b230a85f1c418afc74834471a41511d6,2025-06-04T22:46:00.467000
CVE-2025-4128,0,0,cbfbd23f8b9189f9d5c05298486216afcf6102f02c1375e93bdcb03aa0f43ccd,2025-06-12T16:06:20.180000
@ -295163,7 +295164,7 @@ CVE-2025-4163,0,0,90b94328ec1d78c2c92fb5347be0835a81d1ecb778d277713df60a936155c1
CVE-2025-4164,0,0,c409a415056cfc60d19356dab298bdf2afe4926171d33ff65db9098cfdafae24,2025-05-16T17:45:46.460000
CVE-2025-41645,0,0,05dc7979d552d91b524b274c74c87b4d6526958474a345200f3e130228064f47,2025-05-13T19:35:18.080000
CVE-2025-41646,0,0,67ce20c1a9865425780a6906ee39e9288bbd25b638b5a3631cb1e54cf8c9584e,2025-06-10T19:29:22.893000
CVE-2025-41647,1,1,85d297ffa6615dcc9a411ec6a53cc73525a368c42f7bac3676b14ff4cdbd6da4,2025-06-25T10:15:22.747000
CVE-2025-41647,0,0,85d297ffa6615dcc9a411ec6a53cc73525a368c42f7bac3676b14ff4cdbd6da4,2025-06-25T10:15:22.747000
CVE-2025-41649,0,0,612914eeae0d0b80cff3d2f6bd08d474bd30dce7e9b2b85352e6df3c8ab3fb10,2025-05-28T15:01:30.720000
CVE-2025-41650,0,0,269c0d41f251c325a207de06d644a97e57e82f1a90edffb55ef7207165df0de3,2025-05-28T15:01:30.720000
CVE-2025-41651,0,0,38a22c1448767e102d555501f2b957b582c47bcd5ef6a6193da873a6e029276c,2025-05-28T15:01:30.720000
@ -297394,12 +297395,12 @@ CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18e
CVE-2025-48461,0,0,d4cb24a0ca958cfd524c8a208e61c21b45cf30bd8935dde1980a1409ead6ce43,2025-06-24T03:15:33.613000
CVE-2025-48462,0,0,a92baa8fe34e131d9c05e73e0d06f620a35a927c149b8a5afca7f6d615e5a9f8,2025-06-24T03:15:33.753000
CVE-2025-48463,0,0,7211400d6d7dbb163df4d1008261d95ee2fec45c1732b246e55db30906f17381,2025-06-24T03:15:33.870000
CVE-2025-48466,0,0,302b754f6f6ff88f885556cb3e15791fcb2f400c2eea512dc96e81d9b734629b,2025-06-24T03:15:34.013000
CVE-2025-48466,0,1,2563b76b52fd1deb9f15d3145719989c77aa827ae95f94628fb0760eb7e72663,2025-06-25T13:15:26.133000
CVE-2025-48467,0,0,65ada2888e88fb5c0497eb399176437531d80946e5f7d88848de64f9fa9754e8,2025-06-24T03:15:34.140000
CVE-2025-48468,0,0,e3f82796a87497059e9699052564dbe55665dc97b241dd7ec175041e0dcb7a93,2025-06-24T03:15:34.267000
CVE-2025-48469,0,0,172cdce077fd14d9ebe336da59ab28d888edcd39b6f64ba16ee3c9ab53de8c80,2025-06-24T03:15:34.390000
CVE-2025-48469,0,1,ee7a036457144c23ccd4e0a75a29af9e7ed71f0ef4e40fa2428819e7ce1abc4e,2025-06-25T13:15:26.273000
CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000
CVE-2025-48470,0,0,bebff4979ebac402ac5fcc2e1f497aa497fdbbae56eeb86825f3178611a020e0,2025-06-24T03:15:34.523000
CVE-2025-48470,0,1,2838398359d02ab95654539616fa46efd3e068ee075bd3027020a0928344ce00,2025-06-25T13:15:26.410000
CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000
CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000
CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000
@ -297941,7 +297942,7 @@ CVE-2025-49793,0,0,25d57e0b9df99cf6003be5aeef6975cbd58104035f2746b28b6910725b1e9
CVE-2025-49794,0,0,fb1efdcc8bcb343302868601f600bbbb7fce96a3ab5152faaf6b18dcb3cfc4a1,2025-06-17T20:50:23.507000
CVE-2025-49795,0,0,4c770467268ebf148fa0f28383caf66af5bf08e634296e0cb4c455afa6e9b153,2025-06-17T20:50:23.507000
CVE-2025-49796,0,0,c3ae5367828207e03498fac8ae67ddfb08b0af4ece3b2500316915ff59e84375,2025-06-17T20:50:23.507000
CVE-2025-49797,1,1,8911e4990266860c5e54afa1a03e682c7ce88d8f1cefc5c19c72331d0770e16f,2025-06-25T10:15:22.910000
CVE-2025-49797,0,0,8911e4990266860c5e54afa1a03e682c7ce88d8f1cefc5c19c72331d0770e16f,2025-06-25T10:15:22.910000
CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000
CVE-2025-4981,0,0,f5c12859221db84c36da0cdc2f5b3b0d709a62c17786be42789bf52dcdf30cf8,2025-06-23T20:16:40.143000
CVE-2025-49814,0,0,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000
@ -298115,8 +298116,8 @@ CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0
CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000
CVE-2025-50348,0,0,5dcc135486f0213433ed5f7b9f4c6109dd3d9fe6d3d0bdb0c3c8b785caf7d50a,2025-06-24T18:15:25.610000
CVE-2025-50349,0,0,b49b29406173d64e5335448cb0b74a4731d700428c9c3e2789ccd64489f70a7b,2025-06-24T18:15:25.830000
CVE-2025-50348,0,1,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000
CVE-2025-50349,0,1,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
@ -298883,7 +298884,7 @@ CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d
CVE-2025-5923,0,0,bd32fa6b95a8f310c6b07918d04b1a4cdef7f962ecfa8c2518b68d11b4b0741e,2025-06-16T12:32:18.840000
CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000
CVE-2025-5926,0,0,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000
CVE-2025-5927,1,1,cf3c733b39e9f1a3d73cd1694eb8e5bdf0dfa3a9dc6dd79673163c714eb1c6a3,2025-06-25T10:15:23.090000
CVE-2025-5927,0,0,cf3c733b39e9f1a3d73cd1694eb8e5bdf0dfa3a9dc6dd79673163c714eb1c6a3,2025-06-25T10:15:23.090000
CVE-2025-5928,0,0,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000
CVE-2025-5930,0,0,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000
CVE-2025-5934,0,0,2b04aea49be1b2e817d664c8d52ff126b146b95757a60bd9875f5715a4755cac,2025-06-20T13:11:11.560000
@ -299173,16 +299174,16 @@ CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287
CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000
CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000
CVE-2025-6422,0,0,106ef9916b04166cc5945f1203191244e9fd131bda586696c6c5fbd69a1a1382,2025-06-23T20:16:21.633000
CVE-2025-6424,0,0,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000
CVE-2025-6424,0,1,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000
CVE-2025-6425,0,0,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000
CVE-2025-6426,0,0,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000
CVE-2025-6427,0,0,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000
CVE-2025-6428,0,0,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000
CVE-2025-6429,0,0,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000
CVE-2025-6430,0,0,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000
CVE-2025-6431,0,0,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000
CVE-2025-6431,0,1,044ca2b501402907169f7fbba7ce2037be8fa78a7475c1b0366114cbb1ccd1a8,2025-06-25T13:15:26.800000
CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000
CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000
CVE-2025-6433,0,1,388a9e3c4ce770334337fb5b365eb81eea0a09dd37d26b543d992df75886bad1,2025-06-25T13:15:26.977000
CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
CVE-2025-6436,0,0,b853ac3673b78035fe770c3a17866c9ee7f8480961c5c6348e20fee513806904,2025-06-24T19:15:24.063000
@ -299251,9 +299252,10 @@ CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328
CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a9940,2025-06-24T00:15:25.917000
CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000
CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000
CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000
CVE-2025-6534,0,1,4aaa4dbea2d1e21bce858b4566e1e92b835724c6fd1a3385ad07ba3ba2aacaa6,2025-06-25T13:15:27.137000
CVE-2025-6535,0,0,e42f1a6543dbf0ee5c229c993281b53636fa2406c8182d5b8ffaa7f8f3686b13,2025-06-24T14:15:31.237000
CVE-2025-6536,0,0,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000
CVE-2025-6543,1,1,9aaa2725da776ce785d24f0dd5eecc89432fc6f7cf3f4439ec7f3a38a63ef19f,2025-06-25T13:15:27.293000
CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000
@ -299275,5 +299277,6 @@ CVE-2025-6580,0,0,313407b4cee1635580ede523b24ed2b3dcbbc329fd4419df576cddce24dcb0
CVE-2025-6581,0,0,75623302546846f37527192251955bf6abcfbc1a9ea07c9cd358376605100cb3,2025-06-24T23:15:21.087000
CVE-2025-6582,0,0,07de1b4aeb0f61802c9e0cc74625b01ba79e53908e01fff010b8340554ca8af3,2025-06-25T00:15:21.573000
CVE-2025-6583,0,0,977de4c8030c0fb1eb7d105ab776e053eb3c692f9cd94c3095f7ae1f288cef79,2025-06-25T00:15:22.763000
CVE-2025-6603,1,1,d0492af04a91c27b19f0489a0c33921a6410468e308ce186bd03faaf3f47413c,2025-06-25T11:15:22.193000
CVE-2025-6613,1,1,8ae1b51e5fef4c67b5addca2893725bb67eb764eebc7fc2637e2d1a1b4322c09,2025-06-25T10:15:23.253000
CVE-2025-6603,0,0,d0492af04a91c27b19f0489a0c33921a6410468e308ce186bd03faaf3f47413c,2025-06-25T11:15:22.193000
CVE-2025-6604,1,1,f499dbf33dd1db8cd9c7fdeee7df0239f800474c71a3bca629b9e334d1b6acd4,2025-06-25T13:15:27.557000
CVE-2025-6613,0,0,8ae1b51e5fef4c67b5addca2893725bb67eb764eebc7fc2637e2d1a1b4322c09,2025-06-25T10:15:23.253000

Can't render this file because it is too large.