Auto-Update: 2025-06-24T10:00:36.318656+00:00

This commit is contained in:
cad-safe-bot 2025-06-24 10:04:14 +00:00
parent 201e4d0aea
commit 81767a6ffa
8 changed files with 366 additions and 13 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3090",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-24T08:15:23.110",
"lastModified": "2025-06-24T08:15:23.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can obtain limited sensitive information and/or DoS the device due to missing authentication for critical function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-034",
"source": "info@cert.vde.com"
},
{
"url": "https://certvde.com/en/advisories/VDE-2025-037",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3091",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-24T09:15:25.190",
"lastModified": "2025-06-24T09:15:25.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-035",
"source": "info@cert.vde.com"
},
{
"url": "https://certvde.com/en/advisories/VDE-2025-038",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-3092",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-24T09:15:25.407",
"lastModified": "2025-06-24T09:15:25.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-035",
"source": "info@cert.vde.com"
},
{
"url": "https://certvde.com/en/advisories/VDE-2025-038",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-50213",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-24T08:15:24.253",
"lastModified": "2025-06-24T08:15:24.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) vulnerability in Apache Airflow Providers Snowflake.\n\nThis issue affects Apache Airflow Providers Snowflake: before 6.4.0.\n\nSanitation of table and stage parameters were added in\u00a0CopyFromExternalStageToSnowflakeOperator\u00a0to prevent\u00a0SQL injection\nUsers are recommended to upgrade to version 6.4.0, which fixes the issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-75"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/51734",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/2kqfmyt2pghg5f6797g8hzvq331v8qx3",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-5258",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-24T08:15:24.397",
"lastModified": "2025-06-24T08:15:24.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Conference Scheduler plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018className\u2019 parameter in all versions up to, and including, 2.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/conference-scheduler/trunk/conf-scheduler.php#L1703",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3316436/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/conference-scheduler/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d0a03e5-b09c-430d-aa65-8ef9e01cf241?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6206",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-24T09:15:25.653",
"lastModified": "2025-06-24T09:15:25.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/aiomatic-automatic-ai-content-writer/38877369#item-description__changelog",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e0ff2d6-65d2-4a54-b3e5-64b424013313?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-24T08:00:19.446543+00:00
2025-06-24T10:00:36.318656+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-24T07:15:26.157000+00:00
2025-06-24T09:15:25.653000+00:00
```
### Last Data Feed Release
@ -33,23 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
299179
299185
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2025-2962](CVE-2025/CVE-2025-29xx/CVE-2025-2962.json) (`2025-06-24T06:15:21.343`)
- [CVE-2025-3090](CVE-2025/CVE-2025-30xx/CVE-2025-3090.json) (`2025-06-24T08:15:23.110`)
- [CVE-2025-3091](CVE-2025/CVE-2025-30xx/CVE-2025-3091.json) (`2025-06-24T09:15:25.190`)
- [CVE-2025-3092](CVE-2025/CVE-2025-30xx/CVE-2025-3092.json) (`2025-06-24T09:15:25.407`)
- [CVE-2025-50213](CVE-2025/CVE-2025-502xx/CVE-2025-50213.json) (`2025-06-24T08:15:24.253`)
- [CVE-2025-5258](CVE-2025/CVE-2025-52xx/CVE-2025-5258.json) (`2025-06-24T08:15:24.397`)
- [CVE-2025-6206](CVE-2025/CVE-2025-62xx/CVE-2025-6206.json) (`2025-06-24T09:15:25.653`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
- [CVE-2024-10306](CVE-2024/CVE-2024-103xx/CVE-2024-10306.json) (`2025-06-24T07:15:25.567`)
- [CVE-2024-13484](CVE-2024/CVE-2024-134xx/CVE-2024-13484.json) (`2025-06-24T07:15:25.973`)
- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-06-24T07:15:26.157`)
## Download and Usage

View File

@ -245683,7 +245683,7 @@ CVE-2024-1030,0,0,6d2d82ef3072f02e7c34d7489d5c3e0649bc9fdc5d37c6ed18885f5f961ee1
CVE-2024-10300,0,0,71f89392a82bac9e3a1118d602fedad5aa8e35f49fa5cc5e5782fb8c6482f21b,2024-10-25T18:49:01.953000
CVE-2024-10301,0,0,3d2ee5c748542f3efcde40d90c311550627d3156c0575f82911af7d8dec82c11,2024-10-25T18:47:54.033000
CVE-2024-10305,0,0,c796e0a9a1f8c346431dc8391644400d6ff87d94b0f13883aeae274109208b98,2025-02-11T02:15:33.200000
CVE-2024-10306,0,1,fa45917d64481b0737b083d2e091cd946005e48c194b6f6cf4c0627d5be06569,2025-06-24T07:15:25.567000
CVE-2024-10306,0,0,fa45917d64481b0737b083d2e091cd946005e48c194b6f6cf4c0627d5be06569,2025-06-24T07:15:25.567000
CVE-2024-10307,0,0,b3c6596e9363272e01afbca3eda91cdf366d6168437cf679755595a795028a90,2025-03-28T18:11:40.180000
CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b5ec,2025-01-09T20:30:43.060000
CVE-2024-10309,0,0,4b2759d257cfe7d5297e8d161cf11fe4adb179be4b097ccbd04ffe263460154b,2025-05-11T23:38:49.507000
@ -248971,7 +248971,7 @@ CVE-2024-13480,0,0,d795c021708f83dec22e9e13f996cded557f5cce66508a10ed2f76476b1ec
CVE-2024-13481,0,0,faf68721eb62de8d404b3d261838769471094d47ce2561943bdd3127715cccbb,2025-03-11T18:48:06.980000
CVE-2024-13482,0,0,a2acc7d4cc4c2d2d2b1e7200ac7741537bababd6959604e81d2dadb612cdb04a,2025-05-28T15:42:41.373000
CVE-2024-13483,0,0,8fcd5683bc938442ba2abb32ac7e5e9aae7129e271932e6cb40281e1f32606a8,2025-02-25T20:50:29.027000
CVE-2024-13484,0,1,987633a49e97909fc954bebe70977c239f57ef9b756845565145e60ce2438244,2025-06-24T07:15:25.973000
CVE-2024-13484,0,0,987633a49e97909fc954bebe70977c239f57ef9b756845565145e60ce2438244,2025-06-24T07:15:25.973000
CVE-2024-13485,0,0,13891a751ed33776eeacdce8cd7bb797159d0f76d2c0706f2beaac89a9870581,2025-02-25T20:53:34
CVE-2024-13486,0,0,b1619da4a8796b221f2e77fb01e4284176f5ee8dc676f15a0610812866c9508e,2025-05-28T15:42:32.340000
CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80844,2025-02-18T19:15:14.073000
@ -290767,7 +290767,7 @@ CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1ab
CVE-2025-2960,0,0,e6638852c7dc5cb172f70523a23341e1d731eae62801514a81456c069a22e1b8,2025-04-15T18:28:01.283000
CVE-2025-29602,0,0,4fd178ff4781bafd4969f1e7b75fa655e8706b4619b3c93d994d5a9dda7b0878,2025-06-16T19:38:20.027000
CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000
CVE-2025-2962,1,1,ff2e47e7c969c4a58132f6606e8d8acd71e955fef27f5a87dc0a3c3dd6c0f969,2025-06-24T06:15:21.343000
CVE-2025-2962,0,0,ff2e47e7c969c4a58132f6606e8d8acd71e955fef27f5a87dc0a3c3dd6c0f969,2025-06-24T06:15:21.343000
CVE-2025-29621,0,0,ec760c23d2fabb446e49014ccdde725978a4daf486cfc90bdb12f94c16193f54,2025-04-23T14:08:13.383000
CVE-2025-29625,0,0,73b26f97a6b8558decaf6eed0f9b13ba9f48d01d2b9e64d5af7431112d3efd8e,2025-04-21T14:23:45.950000
CVE-2025-29627,0,0,f969e8270b331deaebee568722d538ad4623491af011f70293514741db585825,2025-06-12T16:06:47.857000
@ -291725,6 +291725,7 @@ CVE-2025-30896,0,0,8728a6521ef1a0c795e9da38f41a255c324d53449cb01c259dde3c916bf20
CVE-2025-30897,0,0,a17fa70fd152eac513bca9016d952476b5a5b72feb533d74a657916c7ba00fd4,2025-06-09T19:18:55.140000
CVE-2025-30898,0,0,322d192cedb82806acd3a2f77289969ccd2c366bf8e398c0df801a2354305a4c,2025-03-27T16:45:12.210000
CVE-2025-30899,0,0,73016cbbda013097d3b01f02dcd2534e5ebb1bc3ba59e10ee481e1fcf5abed17,2025-03-27T16:45:12.210000
CVE-2025-3090,1,1,538ef362447932803f81095557aa2ed9316fcecfcd55987c29c07d85bfdb1a69,2025-06-24T08:15:23.110000
CVE-2025-30900,0,0,a614192b4026cc4688874a3842501877f3bd90326aa62e5e1a319d29a474d4c5,2025-03-27T16:45:12.210000
CVE-2025-30901,0,0,d44b1676d3b3f75f6fec17a87a777e7bf68e628cfdbffdece1d18c8686fa84cd,2025-04-01T20:26:11.547000
CVE-2025-30902,0,0,9d4f561ef5e842a66a009ee1ebea03b01bcb47a9c6a614d5ab4fc5ac573b2117,2025-04-01T20:26:11.547000
@ -291735,6 +291736,7 @@ CVE-2025-30906,0,0,bfedb627274aa8b9f0732f272cd39734251b3e80595c032124d1d75f755bd
CVE-2025-30907,0,0,ab215138d6596b15037ec7b716f7a04cccd3c1fc43ceabe8e846d9a3644b806f,2025-03-27T16:45:12.210000
CVE-2025-30908,0,0,9b276b0c034acb2fea666f449773804545d4ecbec8d488d820b5f5566b3d4b5e,2025-04-07T14:18:34.453000
CVE-2025-30909,0,0,d25dbbefda6b252a2ba0c68cef8dd6e47d4e0e87574e1cf430b007aa59f10888,2025-03-27T16:45:12.210000
CVE-2025-3091,1,1,928dacca376f82aed3e64276649bfde88dd40245f8c9f936dfffc0f16d1c254e,2025-06-24T09:15:25.190000
CVE-2025-30910,0,0,16c1c60d3eeaf5436df2566d15920eed1ae357bbb4888adeb3690958a4783218,2025-04-01T20:26:11.547000
CVE-2025-30911,0,0,fd1209080c16944fadf23cbbe36a25662222585c121fccd1af2f9ba2c8c9d124,2025-04-01T20:26:11.547000
CVE-2025-30912,0,0,fca46532d8975bb3997b3b5ef36e67af4b3247382151c6e6da33c3bcd4495c5a,2025-03-27T16:45:12.210000
@ -291745,6 +291747,7 @@ CVE-2025-30916,0,0,67962284e46acdf1fc92cd89be3f0f0a6e58e129d24a7def6ba505045ebf3
CVE-2025-30917,0,0,21d9c643ac11015461a07dc23f3a237b94855c30cb31324e3a617b89431047e6,2025-04-01T20:26:11.547000
CVE-2025-30918,0,0,957a7a0a1c0b4cffefaca20fa9b9595ccfd2697210a0fab47da603b7cb716787,2025-03-27T16:45:12.210000
CVE-2025-30919,0,0,6f14544f37a1764de5c28c68ff26f4c3193600030d68c49cbbb4ef867f1a1d6a,2025-03-27T16:45:12.210000
CVE-2025-3092,1,1,4620b04d256ca5582aca31d5bab2d08f5a15f259698a7080cb658c7e2e8590dc,2025-06-24T09:15:25.407000
CVE-2025-30920,0,0,67b52e8625e5f13c5e3105ca98f049b13c07f1eaf4ace7c6d45af6672ce9ddae,2025-03-27T16:45:12.210000
CVE-2025-30921,0,0,0f49c6a76231945cfa45ff97ac30f85385ce79f7b853b4f89aa238944aeb0521,2025-03-27T16:45:12.210000
CVE-2025-30922,0,0,9ff4dd0946f44b4c7c54a61d5993f66f06f3cb56f15e96b4e5bc278cdcc10d45,2025-03-27T16:45:12.210000
@ -293841,7 +293844,7 @@ CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fd
CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000
CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000
CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000
CVE-2025-3576,0,1,bc2f6624906aee44a0e43d8d6cddf30694da6266cedaaa8bd06fc5639776d44e,2025-06-24T07:15:26.157000
CVE-2025-3576,0,0,bc2f6624906aee44a0e43d8d6cddf30694da6266cedaaa8bd06fc5639776d44e,2025-06-24T07:15:26.157000
CVE-2025-3577,0,0,56629bd7e990c7a0d492f7fcbfe38c7580cf294d9e5db776d3fa189b9e593731,2025-06-23T19:29:59.393000
CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000
CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000
@ -298057,6 +298060,7 @@ CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245
CVE-2025-50200,0,0,b04b8a83061873d5a6a0dfbc2d26e36b23b8e421c71e6c73bb812e0e2b22ba3b,2025-06-23T20:16:59.783000
CVE-2025-50201,0,0,e397412bd6740556a32b6ef41171e688861c9a78331735a48e0e16a19730511a,2025-06-23T20:16:59.783000
CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000
CVE-2025-50213,1,1,3642c7e07e854204bfc37cba9de15afc0dad878f0c910586fa17fc3bf3b6cc03,2025-06-24T08:15:24.253000
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000
CVE-2025-5026,0,0,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000
@ -298272,6 +298276,7 @@ CVE-2025-52568,0,0,c5c4449512757bdbf87c08ff7aa03ea210585f8118654ad489df4eddb6c07
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000
CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000
CVE-2025-5258,1,1,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000
CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000
@ -298973,6 +298978,7 @@ CVE-2025-6193,0,0,8f7cbe3660433ebbbde46b01965a942eccd778d0ad783408ec78638602642a
CVE-2025-6196,0,0,a443edb8dad0601e0cbd1385e8a473b74e22417d0a97c7514592b470b58b5b60,2025-06-17T20:50:23.507000
CVE-2025-6199,0,0,8b74f0ab0d170aa7cc558f1e79481a7093394c0368bbc35b907707db4c26f548,2025-06-17T20:50:23.507000
CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000
CVE-2025-6206,1,1,f095e462b0f9c530be73de1fe9b71847681b1cb490797f58b1dc23dd20a548bf,2025-06-24T09:15:25.653000
CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000
CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000
CVE-2025-6218,0,0,60b93bf2429df4a16c19e53a62f3b21ec7d5bb0d9d051ec79f965362e4984c0c,2025-06-23T20:16:21.633000

Can't render this file because it is too large.