diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3090.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3090.json new file mode 100644 index 00000000000..960f9a12ca3 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3090.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3090", + "sourceIdentifier": "info@cert.vde.com", + "published": "2025-06-24T08:15:23.110", + "lastModified": "2025-06-24T08:15:23.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated remote attacker can obtain limited sensitive information and/or DoS the device due to missing authentication for critical function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-034", + "source": "info@cert.vde.com" + }, + { + "url": "https://certvde.com/en/advisories/VDE-2025-037", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3091.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3091.json new file mode 100644 index 00000000000..e0ede589fdb --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3091.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3091", + "sourceIdentifier": "info@cert.vde.com", + "published": "2025-06-24T09:15:25.190", + "lastModified": "2025-06-24T09:15:25.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-035", + "source": "info@cert.vde.com" + }, + { + "url": "https://certvde.com/en/advisories/VDE-2025-038", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3092.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3092.json new file mode 100644 index 00000000000..1120c84d5f5 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3092.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3092", + "sourceIdentifier": "info@cert.vde.com", + "published": "2025-06-24T09:15:25.407", + "lastModified": "2025-06-24T09:15:25.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/advisories/VDE-2025-035", + "source": "info@cert.vde.com" + }, + { + "url": "https://certvde.com/en/advisories/VDE-2025-038", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-502xx/CVE-2025-50213.json b/CVE-2025/CVE-2025-502xx/CVE-2025-50213.json new file mode 100644 index 00000000000..7709e3fc441 --- /dev/null +++ b/CVE-2025/CVE-2025-502xx/CVE-2025-50213.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-50213", + "sourceIdentifier": "security@apache.org", + "published": "2025-06-24T08:15:24.253", + "lastModified": "2025-06-24T08:15:24.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) vulnerability in Apache Airflow Providers Snowflake.\n\nThis issue affects Apache Airflow Providers Snowflake: before 6.4.0.\n\nSanitation of table and stage parameters were added in\u00a0CopyFromExternalStageToSnowflakeOperator\u00a0to prevent\u00a0SQL injection\nUsers are recommended to upgrade to version 6.4.0, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/airflow/pull/51734", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/2kqfmyt2pghg5f6797g8hzvq331v8qx3", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5258.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5258.json new file mode 100644 index 00000000000..4b85773debf --- /dev/null +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5258.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-5258", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-24T08:15:24.397", + "lastModified": "2025-06-24T08:15:24.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Conference Scheduler plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018className\u2019 parameter in all versions up to, and including, 2.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/conference-scheduler/trunk/conf-scheduler.php#L1703", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3316436/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/conference-scheduler/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d0a03e5-b09c-430d-aa65-8ef9e01cf241?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6206.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6206.json new file mode 100644 index 00000000000..3441e387624 --- /dev/null +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6206.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6206", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-24T09:15:25.653", + "lastModified": "2025-06-24T09:15:25.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://codecanyon.net/item/aiomatic-automatic-ai-content-writer/38877369#item-description__changelog", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e0ff2d6-65d2-4a54-b3e5-64b424013313?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3078c2ab29e..871de902ff4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-24T08:00:19.446543+00:00 +2025-06-24T10:00:36.318656+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-24T07:15:26.157000+00:00 +2025-06-24T09:15:25.653000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299179 +299185 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `6` -- [CVE-2025-2962](CVE-2025/CVE-2025-29xx/CVE-2025-2962.json) (`2025-06-24T06:15:21.343`) +- [CVE-2025-3090](CVE-2025/CVE-2025-30xx/CVE-2025-3090.json) (`2025-06-24T08:15:23.110`) +- [CVE-2025-3091](CVE-2025/CVE-2025-30xx/CVE-2025-3091.json) (`2025-06-24T09:15:25.190`) +- [CVE-2025-3092](CVE-2025/CVE-2025-30xx/CVE-2025-3092.json) (`2025-06-24T09:15:25.407`) +- [CVE-2025-50213](CVE-2025/CVE-2025-502xx/CVE-2025-50213.json) (`2025-06-24T08:15:24.253`) +- [CVE-2025-5258](CVE-2025/CVE-2025-52xx/CVE-2025-5258.json) (`2025-06-24T08:15:24.397`) +- [CVE-2025-6206](CVE-2025/CVE-2025-62xx/CVE-2025-6206.json) (`2025-06-24T09:15:25.653`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `0` -- [CVE-2024-10306](CVE-2024/CVE-2024-103xx/CVE-2024-10306.json) (`2025-06-24T07:15:25.567`) -- [CVE-2024-13484](CVE-2024/CVE-2024-134xx/CVE-2024-13484.json) (`2025-06-24T07:15:25.973`) -- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-06-24T07:15:26.157`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2caac19e917..eabf42b04b3 100644 --- a/_state.csv +++ b/_state.csv @@ -245683,7 +245683,7 @@ CVE-2024-1030,0,0,6d2d82ef3072f02e7c34d7489d5c3e0649bc9fdc5d37c6ed18885f5f961ee1 CVE-2024-10300,0,0,71f89392a82bac9e3a1118d602fedad5aa8e35f49fa5cc5e5782fb8c6482f21b,2024-10-25T18:49:01.953000 CVE-2024-10301,0,0,3d2ee5c748542f3efcde40d90c311550627d3156c0575f82911af7d8dec82c11,2024-10-25T18:47:54.033000 CVE-2024-10305,0,0,c796e0a9a1f8c346431dc8391644400d6ff87d94b0f13883aeae274109208b98,2025-02-11T02:15:33.200000 -CVE-2024-10306,0,1,fa45917d64481b0737b083d2e091cd946005e48c194b6f6cf4c0627d5be06569,2025-06-24T07:15:25.567000 +CVE-2024-10306,0,0,fa45917d64481b0737b083d2e091cd946005e48c194b6f6cf4c0627d5be06569,2025-06-24T07:15:25.567000 CVE-2024-10307,0,0,b3c6596e9363272e01afbca3eda91cdf366d6168437cf679755595a795028a90,2025-03-28T18:11:40.180000 CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b5ec,2025-01-09T20:30:43.060000 CVE-2024-10309,0,0,4b2759d257cfe7d5297e8d161cf11fe4adb179be4b097ccbd04ffe263460154b,2025-05-11T23:38:49.507000 @@ -248971,7 +248971,7 @@ CVE-2024-13480,0,0,d795c021708f83dec22e9e13f996cded557f5cce66508a10ed2f76476b1ec CVE-2024-13481,0,0,faf68721eb62de8d404b3d261838769471094d47ce2561943bdd3127715cccbb,2025-03-11T18:48:06.980000 CVE-2024-13482,0,0,a2acc7d4cc4c2d2d2b1e7200ac7741537bababd6959604e81d2dadb612cdb04a,2025-05-28T15:42:41.373000 CVE-2024-13483,0,0,8fcd5683bc938442ba2abb32ac7e5e9aae7129e271932e6cb40281e1f32606a8,2025-02-25T20:50:29.027000 -CVE-2024-13484,0,1,987633a49e97909fc954bebe70977c239f57ef9b756845565145e60ce2438244,2025-06-24T07:15:25.973000 +CVE-2024-13484,0,0,987633a49e97909fc954bebe70977c239f57ef9b756845565145e60ce2438244,2025-06-24T07:15:25.973000 CVE-2024-13485,0,0,13891a751ed33776eeacdce8cd7bb797159d0f76d2c0706f2beaac89a9870581,2025-02-25T20:53:34 CVE-2024-13486,0,0,b1619da4a8796b221f2e77fb01e4284176f5ee8dc676f15a0610812866c9508e,2025-05-28T15:42:32.340000 CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80844,2025-02-18T19:15:14.073000 @@ -290767,7 +290767,7 @@ CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1ab CVE-2025-2960,0,0,e6638852c7dc5cb172f70523a23341e1d731eae62801514a81456c069a22e1b8,2025-04-15T18:28:01.283000 CVE-2025-29602,0,0,4fd178ff4781bafd4969f1e7b75fa655e8706b4619b3c93d994d5a9dda7b0878,2025-06-16T19:38:20.027000 CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000 -CVE-2025-2962,1,1,ff2e47e7c969c4a58132f6606e8d8acd71e955fef27f5a87dc0a3c3dd6c0f969,2025-06-24T06:15:21.343000 +CVE-2025-2962,0,0,ff2e47e7c969c4a58132f6606e8d8acd71e955fef27f5a87dc0a3c3dd6c0f969,2025-06-24T06:15:21.343000 CVE-2025-29621,0,0,ec760c23d2fabb446e49014ccdde725978a4daf486cfc90bdb12f94c16193f54,2025-04-23T14:08:13.383000 CVE-2025-29625,0,0,73b26f97a6b8558decaf6eed0f9b13ba9f48d01d2b9e64d5af7431112d3efd8e,2025-04-21T14:23:45.950000 CVE-2025-29627,0,0,f969e8270b331deaebee568722d538ad4623491af011f70293514741db585825,2025-06-12T16:06:47.857000 @@ -291725,6 +291725,7 @@ CVE-2025-30896,0,0,8728a6521ef1a0c795e9da38f41a255c324d53449cb01c259dde3c916bf20 CVE-2025-30897,0,0,a17fa70fd152eac513bca9016d952476b5a5b72feb533d74a657916c7ba00fd4,2025-06-09T19:18:55.140000 CVE-2025-30898,0,0,322d192cedb82806acd3a2f77289969ccd2c366bf8e398c0df801a2354305a4c,2025-03-27T16:45:12.210000 CVE-2025-30899,0,0,73016cbbda013097d3b01f02dcd2534e5ebb1bc3ba59e10ee481e1fcf5abed17,2025-03-27T16:45:12.210000 +CVE-2025-3090,1,1,538ef362447932803f81095557aa2ed9316fcecfcd55987c29c07d85bfdb1a69,2025-06-24T08:15:23.110000 CVE-2025-30900,0,0,a614192b4026cc4688874a3842501877f3bd90326aa62e5e1a319d29a474d4c5,2025-03-27T16:45:12.210000 CVE-2025-30901,0,0,d44b1676d3b3f75f6fec17a87a777e7bf68e628cfdbffdece1d18c8686fa84cd,2025-04-01T20:26:11.547000 CVE-2025-30902,0,0,9d4f561ef5e842a66a009ee1ebea03b01bcb47a9c6a614d5ab4fc5ac573b2117,2025-04-01T20:26:11.547000 @@ -291735,6 +291736,7 @@ CVE-2025-30906,0,0,bfedb627274aa8b9f0732f272cd39734251b3e80595c032124d1d75f755bd CVE-2025-30907,0,0,ab215138d6596b15037ec7b716f7a04cccd3c1fc43ceabe8e846d9a3644b806f,2025-03-27T16:45:12.210000 CVE-2025-30908,0,0,9b276b0c034acb2fea666f449773804545d4ecbec8d488d820b5f5566b3d4b5e,2025-04-07T14:18:34.453000 CVE-2025-30909,0,0,d25dbbefda6b252a2ba0c68cef8dd6e47d4e0e87574e1cf430b007aa59f10888,2025-03-27T16:45:12.210000 +CVE-2025-3091,1,1,928dacca376f82aed3e64276649bfde88dd40245f8c9f936dfffc0f16d1c254e,2025-06-24T09:15:25.190000 CVE-2025-30910,0,0,16c1c60d3eeaf5436df2566d15920eed1ae357bbb4888adeb3690958a4783218,2025-04-01T20:26:11.547000 CVE-2025-30911,0,0,fd1209080c16944fadf23cbbe36a25662222585c121fccd1af2f9ba2c8c9d124,2025-04-01T20:26:11.547000 CVE-2025-30912,0,0,fca46532d8975bb3997b3b5ef36e67af4b3247382151c6e6da33c3bcd4495c5a,2025-03-27T16:45:12.210000 @@ -291745,6 +291747,7 @@ CVE-2025-30916,0,0,67962284e46acdf1fc92cd89be3f0f0a6e58e129d24a7def6ba505045ebf3 CVE-2025-30917,0,0,21d9c643ac11015461a07dc23f3a237b94855c30cb31324e3a617b89431047e6,2025-04-01T20:26:11.547000 CVE-2025-30918,0,0,957a7a0a1c0b4cffefaca20fa9b9595ccfd2697210a0fab47da603b7cb716787,2025-03-27T16:45:12.210000 CVE-2025-30919,0,0,6f14544f37a1764de5c28c68ff26f4c3193600030d68c49cbbb4ef867f1a1d6a,2025-03-27T16:45:12.210000 +CVE-2025-3092,1,1,4620b04d256ca5582aca31d5bab2d08f5a15f259698a7080cb658c7e2e8590dc,2025-06-24T09:15:25.407000 CVE-2025-30920,0,0,67b52e8625e5f13c5e3105ca98f049b13c07f1eaf4ace7c6d45af6672ce9ddae,2025-03-27T16:45:12.210000 CVE-2025-30921,0,0,0f49c6a76231945cfa45ff97ac30f85385ce79f7b853b4f89aa238944aeb0521,2025-03-27T16:45:12.210000 CVE-2025-30922,0,0,9ff4dd0946f44b4c7c54a61d5993f66f06f3cb56f15e96b4e5bc278cdcc10d45,2025-03-27T16:45:12.210000 @@ -293841,7 +293844,7 @@ CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fd CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000 CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000 CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000 -CVE-2025-3576,0,1,bc2f6624906aee44a0e43d8d6cddf30694da6266cedaaa8bd06fc5639776d44e,2025-06-24T07:15:26.157000 +CVE-2025-3576,0,0,bc2f6624906aee44a0e43d8d6cddf30694da6266cedaaa8bd06fc5639776d44e,2025-06-24T07:15:26.157000 CVE-2025-3577,0,0,56629bd7e990c7a0d492f7fcbfe38c7580cf294d9e5db776d3fa189b9e593731,2025-06-23T19:29:59.393000 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 @@ -298057,6 +298060,7 @@ CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245 CVE-2025-50200,0,0,b04b8a83061873d5a6a0dfbc2d26e36b23b8e421c71e6c73bb812e0e2b22ba3b,2025-06-23T20:16:59.783000 CVE-2025-50201,0,0,e397412bd6740556a32b6ef41171e688861c9a78331735a48e0e16a19730511a,2025-06-23T20:16:59.783000 CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000 +CVE-2025-50213,1,1,3642c7e07e854204bfc37cba9de15afc0dad878f0c910586fa17fc3bf3b6cc03,2025-06-24T08:15:24.253000 CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000 CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000 CVE-2025-5026,0,0,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000 @@ -298272,6 +298276,7 @@ CVE-2025-52568,0,0,c5c4449512757bdbf87c08ff7aa03ea210585f8118654ad489df4eddb6c07 CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000 CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000 +CVE-2025-5258,1,1,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000 CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000 CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000 CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000 @@ -298973,6 +298978,7 @@ CVE-2025-6193,0,0,8f7cbe3660433ebbbde46b01965a942eccd778d0ad783408ec78638602642a CVE-2025-6196,0,0,a443edb8dad0601e0cbd1385e8a473b74e22417d0a97c7514592b470b58b5b60,2025-06-17T20:50:23.507000 CVE-2025-6199,0,0,8b74f0ab0d170aa7cc558f1e79481a7093394c0368bbc35b907707db4c26f548,2025-06-17T20:50:23.507000 CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000 +CVE-2025-6206,1,1,f095e462b0f9c530be73de1fe9b71847681b1cb490797f58b1dc23dd20a548bf,2025-06-24T09:15:25.653000 CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000 CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000 CVE-2025-6218,0,0,60b93bf2429df4a16c19e53a62f3b21ec7d5bb0d9d051ec79f965362e4984c0c,2025-06-23T20:16:21.633000