diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25112.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25112.json index 6693b338f7e..92f033e1fce 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25112.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25112.json @@ -2,13 +2,17 @@ "id": "CVE-2018-25112", "sourceIdentifier": "info@cert.vde.com", "published": "2025-06-04T10:15:20.380", - "lastModified": "2025-06-04T10:15:20.380", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device." + }, + { + "lang": "es", + "value": "Un atacante remoto no autenticado podr\u00eda consumir recursos descontroladamente en el programa IEC 61131 de los productos afectados, generando grandes cantidades de tr\u00e1fico de red que el ILC debe gestionar. Esto provoca una denegaci\u00f3n de servicio del dispositivo." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36603.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36603.json index 0024c714f95..18beadfb562 100644 --- a/CVE-2020/CVE-2020-366xx/CVE-2020-36603.json +++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36603.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36603", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-14T22:15:11.177", - "lastModified": "2024-11-21T05:29:52.383", + "lastModified": "2025-06-04T15:15:21.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4422.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4422.json index efa40f36419..e133336d496 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4422.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4422.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4422", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-12T07:15:09.997", - "lastModified": "2024-11-21T06:37:41.330", + "lastModified": "2025-06-04T15:05:06.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.0.20", - "matchCriteriaId": "D3612D88-8DF0-4960-BB19-937CA7D3B46D" + "matchCriteriaId": "C365E2DD-CEF9-419F-917D-2EE9F6F5BEF4" } ] } diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25708.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25708.json index b0dbb4bb207..8468a8cdc2c 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25708.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25708.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25708", "sourceIdentifier": "product-security@qualcomm.com", "published": "2022-09-16T06:15:11.473", - "lastModified": "2024-11-21T06:52:46.613", + "lastModified": "2025-06-04T15:15:23.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3082.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3082.json index b5e541fd4bb..a43b5c38b99 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3082.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3082.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3082", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-12T05:15:09.677", - "lastModified": "2024-11-21T08:16:24.297", + "lastModified": "2025-06-04T15:05:06.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -64,9 +64,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.5.8", - "matchCriteriaId": "BECABCB4-7E6C-41BC-8291-5B7B2823CE01" + "matchCriteriaId": "7AC67537-665D-4146-94C5-FF797BF94015" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3179.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3179.json index 49aa9d163b4..28efa505f4e 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3179.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3179.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3179", "sourceIdentifier": "contact@wpscan.com", "published": "2023-07-17T14:15:10.843", - "lastModified": "2024-11-21T08:16:38.150", + "lastModified": "2025-06-04T15:05:06.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.5.7", - "matchCriteriaId": "BEDAD609-58E9-4841-A9C9-2CF8935580CA" + "matchCriteriaId": "AACA58B5-42D5-4C1F-8B91-80569638003E" } ] } diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json index 10df2a8f9e1..b7ab65dc99e 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48677.json @@ -2,13 +2,13 @@ "id": "CVE-2023-48677", "sourceIdentifier": "security@acronis.com", "published": "2023-12-12T09:15:08.383", - "lastModified": "2025-01-31T13:15:26.723", + "lastModified": "2025-06-04T14:15:25.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378." + "value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378, Acronis Cyber Protect 16 (Windows) before build 39938." }, { "lang": "es", @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52233.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52233.json index 90ed8b8c920..a42d3c777b9 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52233.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52233.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52233", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-11T16:15:16.757", - "lastModified": "2024-11-21T08:39:27.173", + "lastModified": "2025-06-04T15:05:06.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.7", - "matchCriteriaId": "DAE21F17-BC0F-4051-9754-6CAAEF59A010" + "matchCriteriaId": "00068F78-E905-4A92-8286-F98BDBD96103" } ] } diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5958.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5958.json index f7d4b05ed83..b246de8adbc 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5958.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5958.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5958", "sourceIdentifier": "contact@wpscan.com", "published": "2023-11-27T17:15:09.623", - "lastModified": "2024-11-21T08:42:51.820", + "lastModified": "2025-06-04T15:05:06.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.7.1", - "matchCriteriaId": "E40A03E0-E94A-431E-8C67-039F96A535BE" + "matchCriteriaId": "0388D55E-C715-40AB-81C3-35A193C417A2" } ] } diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6620.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6620.json index 4cdaf57a799..52ca83a49e6 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6620.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6620.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6620", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-15T16:15:12.513", - "lastModified": "2024-11-21T08:44:13.107", + "lastModified": "2025-06-04T15:05:06.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.7", - "matchCriteriaId": "DAE21F17-BC0F-4051-9754-6CAAEF59A010" + "matchCriteriaId": "00068F78-E905-4A92-8286-F98BDBD96103" } ] } diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json index 3ef7d3a3cf1..db20c7b441a 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6875.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6875", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-11T09:15:52.773", - "lastModified": "2025-06-03T14:15:41.283", + "lastModified": "2025-06-04T15:05:06.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.8.7", - "matchCriteriaId": "69EA3FC7-5A83-43E1-A957-885559CA5C91" + "matchCriteriaId": "B9580B8D-CECD-4DBB-9566-95A339FFD67A" } ] } diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json index 7ca0e552171..14d4853a237 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12718.json @@ -2,13 +2,17 @@ "id": "CVE-2024-12718", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.183", - "lastModified": "2025-06-03T21:15:20.857", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allows modifying some file metadata (e.g. last modified) with filter=\"data\"\u00a0or file permissions (chmod) with filter=\"tar\"\u00a0of files outside the extraction directory.\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links." + }, + { + "lang": "es", + "value": "Permite modificar algunos metadatos de archivo (p. ej., la \u00faltima modificaci\u00f3n) con filter=\"data\" o permisos de archivo (chmod) con filter=\"tar\" de archivos fuera del directorio de extracci\u00f3n. Esta vulnerabilidad afecta al usar el m\u00f3dulo tarfile para extraer archivos tar no confiables mediante TarFile.extractall() o TarFile.extract() y el par\u00e1metro filter= con el valor \"data\" o \"tar\". Consulte la documentaci\u00f3n sobre filtros de extracci\u00f3n de archivos tar (https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter) para obtener m\u00e1s informaci\u00f3n. Estas vulnerabilidades solo afectan a las versiones de Python 3.12 o posteriores; las versiones anteriores no incluyen la funci\u00f3n de filtro de extracci\u00f3n. Tenga en cuenta que para Python 3.14 o posteriores, el valor predeterminado de filter= cambi\u00f3 de \"sin filtrado\" a \"data\", por lo que si utiliza este nuevo comportamiento predeterminado, su uso tambi\u00e9n se ver\u00e1 afectado. Tenga en cuenta que ninguna de estas vulnerabilidades afecta significativamente la instalaci\u00f3n de distribuciones fuente que son archivos tar, ya que estas permiten la ejecuci\u00f3n de c\u00f3digo arbitrario durante el proceso de compilaci\u00f3n. Sin embargo, al evaluar distribuciones fuente, es importante evitar instalar distribuciones fuente con enlaces sospechosos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13246.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13246.json index 71484db57b2..55402e4fc73 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13246.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13246.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13246", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.497", - "lastModified": "2025-01-10T20:15:30.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:18:56.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-282" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:node_access_rebuild_progressive_project:node_access_rebuild_progressive:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "2.0.2", + "matchCriteriaId": "645C1D5A-9814-41BC-974C-D3047A53CBF2" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-010", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json index e87d73a2e1b..89a210ae4e8 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13247", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.610", - "lastModified": "2025-01-09T21:15:25.443", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:23:03.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,44 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coffee_project:coffee:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-1.0", + "versionEndExcluding": "8.x-1.4", + "matchCriteriaId": "7A3CF56C-985A-4ACA-B504-597F0554A2EC" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-011", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13248.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13248.json index 7f84a301e8c..9c9374b9d52 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13248.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13248", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.730", - "lastModified": "2025-01-10T22:15:25.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:58:13.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-266" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:private_content_project:private_content:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "8.x-2.1", + "matchCriteriaId": "64751EE0-3530-4947-8907-0C1F3C0E5142" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-012", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13249.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13249.json index 78b528c0d54..83fbb153a16 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13249.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13249", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:18.857", - "lastModified": "2025-01-10T22:15:25.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:59:26.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,44 @@ "value": "CWE-282" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:node_access_rebuild_progressive_project:node_access_rebuild_progressive:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-1.0", + "versionEndExcluding": "7.x-1.2", + "matchCriteriaId": "92E6F480-064E-472A-8B32-AB1A87018095" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-013", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13256.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13256.json index d38bf9871f6..e03a21d8fa6 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13256.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13256.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13256", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.660", - "lastModified": "2025-01-10T17:15:13.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:09:20.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-1220" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:email_contact_project:email_contact:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "2.0.4", + "matchCriteriaId": "AAB8BD90-BCAB-4F9B-93DF-6996667CB111" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-020", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13257.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13257.json index 8b82efaeffc..7fba583fe30 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13257.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13257", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.773", - "lastModified": "2025-01-10T17:15:13.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:09:44.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:commerce_view_receipt_project:commerce_view_receipt:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "1.0.3", + "matchCriteriaId": "479E4DD2-1943-4985-8AAF-92F7AB9B3B1D" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-021", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13258.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13258.json index 6157d5147ff..3fe561ead9f 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13258.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13258.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13258", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.887", - "lastModified": "2025-01-10T17:15:13.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:11:56.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rest_\\&_json_api_authentication_project:rest_\\&_json_api_authentication:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "2.0.13", + "matchCriteriaId": "B171654A-766C-4291-9BC2-8BB31C647E92" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-022", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13259.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13259.json index fe24940a065..541fc1b6ccf 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13259.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13259", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T19:15:19.997", - "lastModified": "2025-01-10T17:15:13.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:12:41.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-201" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:image_sizes_project:image_sizes:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "3.0.2", + "matchCriteriaId": "46EA3A66-4866-451B-862E-611ACB1CD6AC" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-023", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13260.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13260.json index b159d6555ad..ff240ca2661 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13260.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13260.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13260", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:34.650", - "lastModified": "2025-01-10T17:15:14.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:13:24.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:migrate_queue_importer_project:migrate_queue_importer:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "2.1.1", + "matchCriteriaId": "2A186C1F-492E-4940-A32E-0EF277BD626D" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2024-024", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13967.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13967.json index a0bb10782aa..d94b49eeedf 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13967.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13967.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13967", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-06-04T08:15:21.367", - "lastModified": "2025-06-04T08:15:21.367", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability allows the successful attacker to gain unauthorized access to a \nconfiguration web page delivered by the integrated web Server of EIBPORT.\n\nThis issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad permite al atacante obtener acceso no autorizado a una p\u00e1gina web de configuraci\u00f3n proporcionada por el servidor web integrado de EIBPORT. Este problema afecta a EIBPORT V3 KNX (hasta la versi\u00f3n 3.9.8) y EIBPORT V3 KNX GSM (hasta la versi\u00f3n 3.9.8)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23899.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23899.json index fe310aa6527..bbcda0cb8b5 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23899.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23899.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23899", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-01-24T18:15:09.467", - "lastModified": "2024-11-21T08:58:40.040", + "lastModified": "2025-06-04T15:15:23.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31127.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31127.json index 6aebc794968..a04b0ca95f8 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31127.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31127.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31127", "sourceIdentifier": "cve@zscaler.com", "published": "2025-06-04T05:15:21.870", - "lastModified": "2025-06-04T05:15:21.870", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper verification of a loaded library in Zscaler Client Connector on Mac < 4.2.0.241 may allow a local attacker to elevate their privileges." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n incorrecta de una librer\u00eda cargada en Zscaler Client Connector en Mac < 4.2.0.241 puede permitir que un atacante local eleve sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json index e7ff734e908..2c91bb0a051 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36486", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:20.657", - "lastModified": "2025-06-03T14:15:47.160", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45655.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45655.json index 5a2e58d3c0d..f535a935dc4 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45655.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45655.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45655", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-03T15:15:58.093", - "lastModified": "2025-06-03T15:15:58.093", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Application Gateway 19.12 through 24.09 could allow a local privileged user to perform unauthorized actions due to incorrect permissions assignment." + }, + { + "lang": "es", + "value": "IBM Application Gateway 19.12 a 24.09 podr\u00eda permitir que un usuario privilegiado local realice acciones no autorizadas debido a una asignaci\u00f3n de permisos incorrecta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json index 5c834536c63..6d1b7b4b686 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52561", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:21.857", - "lastModified": "2025-06-03T14:15:47.283", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53010.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53010.json index cfed296dfcf..6c3d05ce71e 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53010.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53010.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53010", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:23.887", - "lastModified": "2025-06-03T06:15:23.887", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur while attaching VM when the HLOS retains access to VM." + }, + { + "lang": "es", + "value": "Puede ocurrir corrupci\u00f3n de memoria al conectar una m\u00e1quina virtual cuando el HLOS retiene el acceso a la m\u00e1quina virtual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53013.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53013.json index f3ece981352..4686eb78792 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53013.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53013.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53013", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:24.160", - "lastModified": "2025-06-03T06:15:24.160", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur while processing voice call registration with user." + }, + { + "lang": "es", + "value": "Puede ocurrir corrupci\u00f3n en la memoria mientras se procesa el registro de llamadas de voz con el usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53015.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53015.json index 4b5f235f93d..5e531369aa1 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53015.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53015.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53015", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:24.350", - "lastModified": "2025-06-03T06:15:24.350", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing IOCTL command to handle buffers associated with a session." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar el comando IOCTL para manejar los b\u00faferes asociados con una sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53016.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53016.json index b6f0999be5c..c1a6147badf 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53016.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53016.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53016", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:24.580", - "lastModified": "2025-06-03T06:15:24.580", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing I2C settings in Camera driver." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar configuraciones I2C en el controlador de la c\u00e1mara." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53017.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53017.json index 2be6786816c..89845e18915 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53017.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53017.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53017", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:24.793", - "lastModified": "2025-06-03T06:15:24.793", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while handling test pattern generator IOCTL command." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el manejo del comando IOCTL del generador de patrones de prueba." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53018.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53018.json index 3e74664a19f..2fd2548608f 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53018.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53018.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53018", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:24.963", - "lastModified": "2025-06-03T06:15:24.963", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur while processing the OIS packet parser." + }, + { + "lang": "es", + "value": "Puede ocurrir corrupci\u00f3n de memoria mientras se procesa el analizador de paquetes OIS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53019.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53019.json index a08bbd272ca..28fe6b90465 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53019.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53019.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53019", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:25.147", - "lastModified": "2025-06-03T06:15:25.147", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure may occur while decoding the RTP packet with improper header length for number of contributing sources." + }, + { + "lang": "es", + "value": "Puede ocurrir una divulgaci\u00f3n de informaci\u00f3n mientras se decodifica el paquete RTP con una longitud de encabezado inadecuada para la cantidad de fuentes contribuyentes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53020.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53020.json index c798be18cb9..dba28ae24f5 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53020.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53020.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53020", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:25.347", - "lastModified": "2025-06-03T06:15:25.347", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure may occur while decoding the RTP packet with invalid header extension from network." + }, + { + "lang": "es", + "value": "Puede ocurrir una divulgaci\u00f3n de informaci\u00f3n mientras se decodifica el paquete RTP con una extensi\u00f3n de encabezado no v\u00e1lida de la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53021.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53021.json index b92b543421b..6597420b4c7 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53021.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53021.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53021", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:25.560", - "lastModified": "2025-06-03T06:15:25.560", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure may occur while processing goodbye RTCP packet from network." + }, + { + "lang": "es", + "value": "Puede ocurrir una divulgaci\u00f3n de informaci\u00f3n mientras se procesa el paquete RTCP de despedida de la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53026.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53026.json index 32e7444117f..aa21d53d8a7 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53026.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53026.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53026", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:25.780", - "lastModified": "2025-06-03T06:15:25.780", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n cuando se recibe un paquete RTCP no v\u00e1lido durante una llamada IMS VoLTE/VoWiFi." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54020.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54020.json index 475cf97c8f5..9917a50f7e0 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54020.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54020", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-05-28T08:15:20.043", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:34:54.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.8", + "matchCriteriaId": "F5248A7F-5122-4C07-8A4C-FE7A0BA07CF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "C654DFBA-E3B0-4865-9088-13385A428E78" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-023", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json index 7f399781ae3..fe33fb8729a 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54189", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:22.040", - "lastModified": "2025-06-03T14:15:47.803", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json index 90416cb4421..479930be96d 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json @@ -2,13 +2,13 @@ "id": "CVE-2024-55539", "sourceIdentifier": "security@acronis.com", "published": "2024-12-23T14:15:06.270", - "lastModified": "2025-01-09T17:15:16.057", + "lastModified": "2025-06-04T14:15:26.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185." + "value": "Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185, Acronis Cyber Protect 16 (Linux) before build 39938." }, { "lang": "es", @@ -16,28 +16,6 @@ } ], "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", - "baseScore": 2.5, - "baseSeverity": "LOW", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.0, - "impactScore": 1.4 - } - ], "cvssMetricV30": [ { "source": "security@acronis.com", diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1051.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1051.json index e4b34b0a510..258fed072b9 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1051.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1051.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1051", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-06-02T19:15:25.740", - "lastModified": "2025-06-02T19:15:25.740", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of ALAC data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25865." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en mont\u00f3n en Sonos Era 300. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en los altavoces Sonos Era 300 afectados. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en el procesamiento de datos ALAC. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en mont\u00f3n. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario anacapa. Era ZDI-CAN-25865." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1334.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1334.json index 0a3fa24aa44..c1def9f2915 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1334.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1334.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1334", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-03T16:15:22.983", - "lastModified": "2025-06-03T16:15:22.983", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 allows web pages to be stored locally which can be read by another user on the system." + }, + { + "lang": "es", + "value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 permiten almacenar p\u00e1ginas web localmente para que otro usuario del sistema pueda leerlas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1701.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1701.json new file mode 100644 index 00000000000..53e86f2c2e5 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1701.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-1701", + "sourceIdentifier": "security@mimsoftware.com", + "published": "2025-06-04T14:15:27.050", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running. From there, attackers with sufficient knowledge of MIM's implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges.\n\nUsers of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client.\n\n\n\nThis issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@mimsoftware.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@mimsoftware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://www.mimsoftware.com/cve-2025-1701", + "source": "security@mimsoftware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1725.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1725.json index 28a1ecbb4fc..53ee01fc1fe 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1725.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1725.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1725", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T09:15:22.487", - "lastModified": "2025-06-03T09:15:22.487", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor para WordPress es vulnerable a Cross-Site Scripting Almacenado al subir archivos SVG en todas las versiones hasta la 6.7 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario al archivo SVG." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json index afc55f8291a..a01d4f6f879 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json @@ -2,7 +2,7 @@ "id": "CVE-2025-20188", "sourceIdentifier": "psirt@cisco.com", "published": "2025-05-07T18:15:38.617", - "lastModified": "2025-05-08T14:39:09.683", + "lastModified": "2025-06-04T14:15:27.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC", "source": "psirt@cisco.com" + }, + { + "url": "https://horizon3.ai/attack-research/attack-blogs/cisco-ios-xe-wlc-arbitrary-file-upload-vulnerability-cve-2025-20188-analysis/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20297.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20297.json index 8073127aeb2..cf0d2374746 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20297.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20297.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20297", "sourceIdentifier": "psirt@cisco.com", "published": "2025-06-02T18:15:23.360", - "lastModified": "2025-06-02T18:15:23.360", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Splunk Enterprise versions below 9.4.2, 9.3.4 and 9.2.6, and Splunk Cloud Platform versions below 9.3.2411.102, 9.3.2408.111 and 9.2.2406.118, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through the pdfgen/render REST endpoint that could result in execution of unauthorized JavaScript code in the browser of a user." + }, + { + "lang": "es", + "value": "En las versiones de Splunk Enterprise anteriores a 9.4.2, 9.3.4 y 9.2.6, y en las versiones de Splunk Cloud Platform anteriores a 9.3.2411.102, 9.3.2408.111 y 9.2.2406.118, un usuario con privilegios bajos que no tenga los roles de \"admin\" o \"power\" de Splunk podr\u00eda manipular un payload malicioso a trav\u00e9s del endpoint REST pdfgen/render que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo JavaScript no autorizado en el navegador de un usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20298.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20298.json index 7c419e42e04..00dc03a0d07 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20298.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20298.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20298", "sourceIdentifier": "psirt@cisco.com", "published": "2025-06-02T18:15:23.560", - "lastModified": "2025-06-02T18:15:23.560", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory (by default, C:\\Program Files\\SplunkUniversalForwarder). This lets non-administrator users on the machine access the directory and all its contents." + }, + { + "lang": "es", + "value": "En versiones de Universal Forwarder para Windows anteriores a 9.4.2, 9.3.4, 9.2.6 y 9.1.9, una nueva instalaci\u00f3n o actualizaci\u00f3n a una versi\u00f3n afectada puede provocar una asignaci\u00f3n incorrecta de permisos en el directorio de instalaci\u00f3n de Universal Forwarder para Windows (por defecto, C:\\Program Files\\SplunkUniversalForwarder). Esto permite que usuarios sin privilegios de administrador accedan al directorio y a todo su contenido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20981.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20981.json index 8f05f1fdbe5..dd1ce1e88f0 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20981.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20981.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20981", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.073", - "lastModified": "2025-06-04T05:15:23.073", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in AudioService prior to SMR Jun-2025 Release 1 allows local attackers to access sensitive information." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en AudioService anterior a SMR Jun-2025 Release 1 permite que atacantes locales accedan a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20984.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20984.json index 643e2cc93af..10add7376d8 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20984.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20984.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20984", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.213", - "lastModified": "2025-06-04T05:15:23.213", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permission in Samsung Cloud for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to access data in Samsung Cloud for Galaxy Watch." + }, + { + "lang": "es", + "value": "El permiso predeterminado incorrecto en Samsung Cloud para Galaxy Watch anterior a SMR Jun-2025 Release 1 permite que atacantes locales accedan a datos en Samsung Cloud para Galaxy Watch." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20985.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20985.json index e97691bfe34..7441c852537 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20985.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20985.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20985", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.347", - "lastModified": "2025-06-04T05:15:23.347", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper privilege management in ThemeManager prior to SMR Jun-2025 Release 1 allows local privileged attackers to reuse trial items." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de privilegios en ThemeManager antes de la versi\u00f3n 1 de SMR de junio de 2025 permite que atacantes privilegiados locales reutilicen elementos de prueba." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20986.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20986.json index 494beada56c..9f28fcc2e94 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20986.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20986.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20986", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.483", - "lastModified": "2025-06-04T05:15:23.483", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in ScreenCapture for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to take screenshots." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en ScreenCapture para Galaxy Watch anterior a SMR Jun-2025 Release 1 permite que atacantes locales tomen capturas de pantalla." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20987.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20987.json index 20a13eb6e4f..7cfe244719c 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20987.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20987.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20987", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.603", - "lastModified": "2025-06-04T05:15:23.603", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to get a auth_token." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el trustlet de huellas dactilares anterior a la versi\u00f3n 1 de SMR de mayo de 2025 permite que atacantes privilegiados locales obtengan un auth_token." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20988.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20988.json index 7f3b3815137..48517091e8e 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20988.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20988.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20988", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.727", - "lastModified": "2025-06-04T05:15:23.727", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en el trustlet de huellas dactilares anterior a la versi\u00f3n 1 de SMR de mayo de 2025 permite que atacantes privilegiados locales lean memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20989.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20989.json index 0f67ad8d154..e8b5fc95c79 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20989.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20989.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20989", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.847", - "lastModified": "2025-06-04T05:15:23.847", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper logging in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to get a hmac_key." + }, + { + "lang": "es", + "value": "El inicio de sesi\u00f3n incorrecto en el trustlet de huellas dactilares anterior a la versi\u00f3n 1 de SMR de mayo de 2025 permite que atacantes privilegiados locales obtengan una hmac_key." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20991.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20991.json index 248003110d2..5e764c079cc 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20991.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20991.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20991", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:23.970", - "lastModified": "2025-06-04T05:15:23.970", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper export of Android application components in Bluetooth prior to SMR Jun-2025 Release 1 allows local attackers to make devices discoverable." + }, + { + "lang": "es", + "value": "La exportaci\u00f3n incorrecta de componentes de aplicaciones de Android en Bluetooth antes de la versi\u00f3n 1 de SMR de junio de 2025 permite que atacantes locales hagan que los dispositivos sean detectables." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20992.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20992.json index e333e104696..d04ca8f3293 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20992.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20992.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20992", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:24.090", - "lastModified": "2025-06-04T05:15:24.090", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bound read in libsecimaging.camera.samsung.so prior to SMR Feb-2025 Release 1 allows local attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en libsecimaging.camera.samsung.so anterior a SMR Feb-2025 Release 1 permite que atacantes locales lean memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20993.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20993.json index 9fc40f21e10..2ea8174d745 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20993.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20993.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20993", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:24.223", - "lastModified": "2025-06-04T05:15:24.223", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in libsecimaging.camera.samsung.so prior to SMR Jun-2025 Release 1 allows local attackers to write out-of-bounds memory." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en libsecimaging.camera.samsung.so anterior a SMR Jun-2025 Release 1 permite que atacantes locales escriban en la memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20994.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20994.json index 6870fd8d9fd..57e3415be56 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20994.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20994.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20994", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:24.353", - "lastModified": "2025-06-04T05:15:24.353", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of insufficient permission in SyncClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to access read and write arbitrary files." + }, + { + "lang": "es", + "value": "El manejo inadecuado de permisos insuficientes en SyncClientProvider en Samsung Internet instalado en dispositivos que no son Samsung antes de la versi\u00f3n 28.0.0.59 permite a atacantes locales acceder a archivos arbitrarios de lectura y escritura." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20995.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20995.json index 0dad31ca4f9..853503b6efe 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20995.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20995.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20995", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:24.480", - "lastModified": "2025-06-04T05:15:24.480", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of insufficient permission in ClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to read and write arbitrary files." + }, + { + "lang": "es", + "value": "El manejo inadecuado de permisos insuficientes en ClientProvider en Samsung Internet instalado en dispositivos que no son Samsung antes de la versi\u00f3n 28.0.0.59 permite a atacantes locales leer y escribir archivos arbitrarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20996.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20996.json index e4456d5cff5..a203d371ac3 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20996.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20996.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20996", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-06-04T05:15:24.607", - "lastModified": "2025-06-04T05:15:24.607", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authorization in Smart Switch installed on non-Samsung Device prior to version 3.7.64.10 allows local attackers to read data with the privilege of Smart Switch. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "Una autorizaci\u00f3n incorrecta en Smart Switch instalado en dispositivos que no son Samsung (versi\u00f3n anterior a la 3.7.64.10) permite a atacantes locales leer datos con el privilegio de Smart Switch. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21463.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21463.json index 16f78444668..5f95dfbd190 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21463.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21463.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21463", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:25.983", - "lastModified": "2025-06-03T06:15:25.983", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS while processing the EHT operation IE in the received beacon frame." + }, + { + "lang": "es", + "value": "DOS transitorio durante el procesamiento de la operaci\u00f3n EHT IE en el beacon frame recibido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21479.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21479.json index a99c1b4fc95..1bd2fba80ad 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21479.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21479.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21479", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T07:15:20.933", - "lastModified": "2025-06-04T01:00:02.020", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21480.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21480.json index 61877fd3efb..cfb6edf4210 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21480.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21480.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21480", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:26.190", - "lastModified": "2025-06-04T01:00:02.020", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21485.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21485.json index 0f6bb2bf247..30bf9f647c5 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21485.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21485.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21485", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:26.423", - "lastModified": "2025-06-03T06:15:26.423", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing INIT and multimode invoke IOCTL calls on FastRPC." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de llamadas IOCTL de invocaci\u00f3n INIT y multimodo en FastRPC." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21486.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21486.json index 9c8c92fe9cd..6a1ea4b0e8d 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21486.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21486.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21486", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:26.590", - "lastModified": "2025-06-03T06:15:26.590", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption during dynamic process creation call when client is only passing address and length of shell binary." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante la llamada de creaci\u00f3n de proceso din\u00e1mico cuando el cliente solo pasa la direcci\u00f3n y la longitud del binario del shell." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22252.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22252.json index 176eb2522ef..77df29fb6a8 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22252.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22252.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22252", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-05-28T08:15:21.070", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:35:38.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C1A9E35E-AA55-44C4-BAAC-2E44E6DCE2EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8E5AF7C2-3954-4931-8929-7D1A3A9B4FAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.4", + "versionEndExcluding": "7.4.7", + "matchCriteriaId": "6E4A264B-EFE6-466C-8E86-3DA465C4751C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-472", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json index 8a34ddd3a33..7bda0be2896 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22777", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:12.900", - "lastModified": "2025-01-13T18:15:22.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:07:37.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.19.4", + "matchCriteriaId": "C250C56D-D7E5-4935-A7F8-CE82B3D141C5" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/give/vulnerability/wordpress-givewp-plugin-3-19-3-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://securityonline.info/cve-2025-22777-cvss-9-8-critical-security-alert-for-givewp-plugin-with-100000-active-installations/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json index 1dc71c16ef1..bcc33f7bfee 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22800", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:13.067", - "lastModified": "2025-01-13T14:15:13.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T14:37:20.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.9.12", + "matchCriteriaId": "4270D375-C4CB-4928-949E-0706E2E6E1F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/post-smtp/vulnerability/wordpress-post-smtp-plugin-2-9-11-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23095.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23095.json new file mode 100644 index 00000000000..c1abae4eddb --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23095.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-23095", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-04T15:15:23.760", + "lastModified": "2025-06-04T15:15:23.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. A Double Free in the mobile processor leads to privilege escalation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23095/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23096.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23096.json new file mode 100644 index 00000000000..f4a1351b58b --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23096.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-23096", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-04T15:15:23.860", + "lastModified": "2025-06-04T15:15:23.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. A Double Free in the mobile processor leads to privilege escalation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23096/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23097.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23097.json index 05068f5f4a6..d2ec4f5fee9 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23097.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23097.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23097", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T20:15:20.883", - "lastModified": "2025-06-03T20:15:20.883", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1380. The lack of a length check leads to out-of-bounds writes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1380. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23098.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23098.json index 2d2ce215f53..9e3d5f1ecb5 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23098.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23098.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23098", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T20:15:21.760", - "lastModified": "2025-06-03T20:15:21.760", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, 990, 1080, 2100, 1280, 2200, 1380. A Use-After-Free in the mobile processor leads to privilege escalation." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 980, 990, 1080, 2100, 1280, 2200, 1380. Un Use-After-Free en el procesador m\u00f3vil conduce a una escalada de privilegios." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json index 1c29dfd8dd5..433c3fce804 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23099", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T19:15:26.213", - "lastModified": "2025-06-03T03:15:26.790", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23100.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23100.json index ddcb1c41b63..35a4abc02ff 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23100.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23100.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23100", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T20:15:21.880", - "lastModified": "2025-06-03T20:15:21.880", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. The absence of a NULL check leads to a Denial of Service." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. La ausencia de una comprobaci\u00f3n NULL conduce a una denegaci\u00f3n de servicio." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23101.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23101.json new file mode 100644 index 00000000000..508d2ca546c --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23101.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-23101", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-04T15:15:23.960", + "lastModified": "2025-06-04T15:15:23.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor Exynos 1380. A Use-After-Free in the mobile processor leads to privilege escalation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23101/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23102.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23102.json index e719c9f9548..47204918a46 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23102.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23102.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23102", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T19:15:38.807", - "lastModified": "2025-06-03T19:15:38.807", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, and 1380. A Double Free in the mobile processor leads to privilege escalation." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200 y 1380. Una doble liberaci\u00f3n en el procesador m\u00f3vil conduce a una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23103.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23103.json index a005efc4c9d..04545d19b77 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23103.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23103.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23103", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T16:15:23.650", - "lastModified": "2025-06-03T16:15:23.650", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json index 05464617597..9b5510ddd69 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23104.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23104", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:23.770", - "lastModified": "2025-06-02T21:15:21.473", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json index 1d25eccba0d..25a91657dfe 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23105", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T19:15:26.913", - "lastModified": "2025-06-03T03:15:26.957", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 2200, 1480 y 2400. Un Use-After-Free en el procesador m\u00f3vil conduce a una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23107.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23107.json index 0ddde6c7ba6..3ccc884a587 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23107.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23107.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23107", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T17:15:21.327", - "lastModified": "2025-06-03T18:15:24.947", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La falta de una verificaci\u00f3n de longitud provoca escrituras fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json index 7b21c764af0..28eb9335def 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24015", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T23:15:20.633", - "lastModified": "2025-06-03T23:15:20.633", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Deno correctly threw errors in such cases, as does Node.js. Without authentication tag verification, AES-GCM degrades to essentially CTR mode, removing integrity protection. Authenticated data set with set_aad is also affected, as it is incorporated into the GCM hash (ghash) but this too is not validated, rendering AAD checks ineffective. Version 2.1.7 includes a patch that addresses this issue." + }, + { + "lang": "es", + "value": "Deno es un entorno de ejecuci\u00f3n de JavaScript, TypeScript y WebAssembly con valores predeterminados seguros. Las versiones 1.46.0 a 2.1.6 presentan un problema que afecta a AES-256-GCM y AES-128-GCM en Deno, donde la etiqueta de autenticaci\u00f3n no se valida. Esto implica que podr\u00edan no detectarse textos cifrados alterados o claves incorrectas, lo que incumple las garant\u00edas esperadas de AES-GCM. Las versiones anteriores de Deno, al igual que Node.js, generaban errores correctamente en estos casos. Sin la verificaci\u00f3n de la etiqueta de autenticaci\u00f3n, AES-GCM se degrada al modo CTR, eliminando la protecci\u00f3n de integridad. El conjunto de datos autenticado con set_aad tambi\u00e9n se ve afectado, ya que se incorpora al hash de GCM (ghash), pero este tampoco se valida, lo que inutiliza las comprobaciones de AAD. La versi\u00f3n 2.1.7 incluye un parche que soluciona este problema." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -85,6 +89,10 @@ { "url": "https://github.com/denoland/deno/security/advisories/GHSA-2x3r-hwv5-p32x", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/denoland/deno/security/advisories/GHSA-2x3r-hwv5-p32x", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24473.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24473.json index 7bfc66007b7..ce426ae9e6a 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24473.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24473.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24473", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-05-28T08:15:21.230", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:38:01.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-497" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "9E9DD222-9198-4E02-A086-2B24F06BBA53" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-548", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25019.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25019.json index 98dd2225c02..6319252b58f 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25019.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25019.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25019", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-03T16:15:23.960", - "lastModified": "2025-06-03T16:15:23.960", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system." + }, + { + "lang": "es", + "value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 no invalidan la sesi\u00f3n despu\u00e9s de un cierre de sesi\u00f3n, lo que podr\u00eda permitir que un usuario se haga pasar por otro usuario en el sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25020.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25020.json index 9df9d27f5dc..f55e71b23cd 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25020.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25020.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25020", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-03T16:15:24.123", - "lastModified": "2025-06-03T16:15:24.123", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an authenticated user to cause a denial of service due to improperly validating API data input." + }, + { + "lang": "es", + "value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 podr\u00edan permitir que un usuario autenticado provoque una denegaci\u00f3n de servicio debido a una validaci\u00f3n incorrecta de la entrada de datos de la API." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25021.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25021.json index f55ddabba04..a50d404e588 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25021.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25021.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25021", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-03T16:15:24.277", - "lastModified": "2025-06-03T16:15:24.277", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow a privileged execute code in case management script creation due to the improper generation of code." + }, + { + "lang": "es", + "value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 podr\u00edan permitir la ejecuci\u00f3n de c\u00f3digo privilegiado en la creaci\u00f3n de scripts de gesti\u00f3n de casos debido a la generaci\u00f3n incorrecta de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25022.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25022.json index 6991704dcc6..1f24c310a81 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25022.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25022.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25022", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-03T16:15:24.437", - "lastModified": "2025-06-03T16:15:24.437", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an unauthenticated user in the environment to obtain highly sensitive information in configuration files." + }, + { + "lang": "es", + "value": "IBM QRadar Suite Software 1.10.12.0 a 1.11.2.0 e IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 podr\u00edan permitir que un usuario no autenticado en el entorno obtenga informaci\u00f3n altamente confidencial en los archivos de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25025.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25025.json index 765db6d77b4..d8c0d2f1f9e 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25025.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25025.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25025", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T02:15:20.417", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:34:21.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234827", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25026.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25026.json index 3e17b97f6f3..56f65cf1af3 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25026.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25026.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25026", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T02:15:20.583", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:34:34.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234827", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25029.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25029.json index f7a7ee5adc7..55fc606f9c3 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25029.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25029.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25029", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T02:15:20.753", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:34:42.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7234827", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25251.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25251.json index f31a0c198be..b2892fc5d90 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25251.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25251.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25251", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-05-28T08:15:21.387", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:37:46.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.2.9", + "matchCriteriaId": "6C849529-C78C-4DE7-B2EA-FFF29FF9972F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.3", + "matchCriteriaId": "96EF5BCC-56D3-4218-80A2-085F8B63D83A" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-016", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json index aa6fc50060e..a555a6effb8 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2678", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T03:15:14.573", - "lastModified": "2025-03-26T13:42:31.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:46:43.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -163,8 +163,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10" + "criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233" } ] } @@ -177,8 +177,8 @@ "source": "cna@vuldb.com", "tags": [ "Exploit", - "Third Party Advisory", - "Issue Tracking" + "Issue Tracking", + "Third Party Advisory" ] }, { @@ -200,16 +200,16 @@ "url": "https://vuldb.com/?id.300695", "source": "cna@vuldb.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://vuldb.com/?submit.521445", "source": "cna@vuldb.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json index d0041b01f1b..19eee13c84a 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2679", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T03:15:15.553", - "lastModified": "2025-03-26T13:35:46.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:19:35.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -163,8 +163,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10" + "criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233" } ] } @@ -177,7 +177,8 @@ "source": "cna@vuldb.com", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "Issue Tracking" ] }, { @@ -207,8 +208,8 @@ "url": "https://vuldb.com/?submit.521447", "source": "cna@vuldb.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json index 31d43225508..1192c7800ff 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2680", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T03:15:15.727", - "lastModified": "2025-03-26T13:23:41.867", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:16:46.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -163,8 +163,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10" + "criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233" } ] } @@ -177,8 +177,8 @@ "source": "cna@vuldb.com", "tags": [ "Exploit", - "Third Party Advisory", - "Issue Tracking" + "Issue Tracking", + "Third Party Advisory" ] }, { @@ -208,8 +208,8 @@ "url": "https://vuldb.com/?submit.521448", "source": "cna@vuldb.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27029.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27029.json index 18b8971c719..dbf502dde3b 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27029.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27029.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27029", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:26.777", - "lastModified": "2025-06-03T06:15:26.777", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS while processing the tone measurement response buffer when the response buffer is out of range." + }, + { + "lang": "es", + "value": "DOS transitorio durante el procesamiento del b\u00fafer de respuesta de medici\u00f3n de tono cuando el b\u00fafer de respuesta est\u00e1 fuera de rango." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27031.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27031.json index 2e092bbec77..74baf109e6b 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27031.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27031.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27031", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:26.960", - "lastModified": "2025-06-03T06:15:26.960", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "memory corruption while processing IOCTL commands, when the buffer in write loopback mode is accessed after being freed." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de comandos IOCTL, cuando se accede al b\u00fafer en modo de bucle invertido de escritura despu\u00e9s de ser liberado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27038.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27038.json index c294061395d..5132538e88a 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27038.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27038.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27038", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-06-03T06:15:27.133", - "lastModified": "2025-06-04T01:00:02.020", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json index abc9065179f..fbfa1a9ec03 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json @@ -2,16 +2,43 @@ "id": "CVE-2025-27444", "sourceIdentifier": "security@joomla.org", "published": "2025-06-04T08:15:21.613", - "lastModified": "2025-06-04T08:15:21.613", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected XSS vulnerability in RSform!Pro component 3.0.0 - 3.3.13 for Joomla was discovered. The issue arises from the improper handling of the filter[dateFrom] GET parameter, which is reflected unescaped in the administrative backend interface. This allows an authenticated attacker with admin or editor privileges to inject arbitrary JavaScript code by crafting a malicious URL." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad XSS reflejado en el componente RSform!Pro 3.0.0 - 3.3.13 para Joomla. El problema surge del manejo incorrecto del par\u00e1metro GET filter[dateFrom], que se refleja sin escape en la interfaz administrativa del backend. Esto permite que un atacante autenticado con privilegios de administrador o editor inyecte c\u00f3digo JavaScript arbitrario manipulando una URL maliciosa." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27702.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27702.json index 40d01147912..3df5cd98f2c 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27702.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27702.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27702", "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2025-05-28T21:15:21.307", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:37:13.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.54", + "matchCriteriaId": "30A5DDF4-1B4A-4867-8F0B-9ECD4F5A538F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27702", - "source": "SecurityResponse@netmotionsoftware.com" + "source": "SecurityResponse@netmotionsoftware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27811.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27811.json new file mode 100644 index 00000000000..fba4ee6f759 --- /dev/null +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27811.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-27811", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-04T14:15:28.260", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local privilege escalation in the razer_elevation_service.exe in Razer Synapse 4 through 4.0.86.2502180127 allows a local attacker to escalate their privileges via a vulnerable COM interface in the target service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://app.inspectiv.com/#/submissions/EAEDG9ssRaTWKSJJ5Bbrt9", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/leonjza/829a98f6c0954d7cb3f6614d05f87f37", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json index 757500ccb67..1f7e9e612de 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27953.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27953", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:23.903", - "lastModified": "2025-06-03T14:15:48.417", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json index 3dfe0b67d77..cde5d59204f 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27954.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27954", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:24.030", - "lastModified": "2025-06-02T18:15:24.030", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Clinical Collaboration Platform 12.2.1.5 allows a remote attacker to obtain sensitive information and execute arbitrary code via the usertoken function of default.aspx." + }, + { + "lang": "es", + "value": "Un problema en Clinical Collaboration Platform 12.2.1.5 permite que un atacante remoto obtenga informaci\u00f3n confidencial y ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n usertoken de default.aspx." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27955.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27955.json index 6edb02a52cf..21dc1327ff3 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27955.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27955.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27955", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:24.143", - "lastModified": "2025-06-02T18:15:24.143", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Clinical Collaboration Platform 12.2.1.5 has a weak logout system where the session token remains valid after logout and allows a remote attacker to obtain sensitive information and execute arbitrary code." + }, + { + "lang": "es", + "value": "Clinical Collaboration Platform 12.2.1.5 tiene un sistema de cierre de sesi\u00f3n d\u00e9bil donde el token de sesi\u00f3n sigue siendo v\u00e1lido despu\u00e9s del cierre de sesi\u00f3n y permite que un atacante remoto obtenga informaci\u00f3n confidencial y ejecute c\u00f3digo arbitrario." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27956.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27956.json index ee07b39168d..7ff6e0c477f 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27956.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27956.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27956", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:24.257", - "lastModified": "2025-06-02T21:15:21.757", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2939.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2939.json index f5ac7302ba9..652451b4882 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2939.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2939.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2939", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T03:15:27.137", - "lastModified": "2025-06-03T03:15:27.137", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ninja Tables \u2013 Easy Data Table Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.0.18 via deserialization of untrusted input from the args[callback] parameter . This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary functions, though it does not allow user supplied parameters only single functions can be called so the impact is limited." + }, + { + "lang": "es", + "value": "El complemento Ninja Tables \u2013 Easy Data Table Builder para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 5.0.18 incluida, mediante la deserializaci\u00f3n de entradas no confiables del par\u00e1metro args[callback]. Esto permite a atacantes no autenticados inyectar un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes ejecutar funciones arbitrarias, aunque no permite par\u00e1metros proporcionados por el usuario; solo se pueden invocar funciones individuales, por lo que el impacto es limitado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30167.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30167.json index 64b2d967cfd..3bd5722a726 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30167.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30167.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30167", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T17:15:21.520", - "lastModified": "2025-06-03T17:15:21.520", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users; or as administrator, create the `%PROGRAMDATA%\\jupyter` directory with appropriately restrictive permissions; or as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user)." + }, + { + "lang": "es", + "value": "Jupyter Core es un paquete para la funcionalidad principal com\u00fan de los proyectos de Jupyter. Al usar Jupyter Core antes de la versi\u00f3n 5.8.0 en Windows, se buscan archivos de configuraci\u00f3n (`SYSTEM_CONFIG_PATH` y `SYSTEM_JUPYTER_PATH`) en el directorio compartido `%PROGRAMDATA%`, lo que puede permitir que los usuarios creen archivos de configuraci\u00f3n que afecten a otros usuarios. Solo se ven afectados los sistemas Windows compartidos con varios usuarios y `%PROGRAMDATA%` sin protecci\u00f3n. Los usuarios deben actualizar a Jupyter Core versi\u00f3n 5.8.0 o posterior para recibir un parche. Hay otras mitigaciones disponibles. Como administrador, modifique los permisos del directorio `%PROGRAMDATA%` para que usuarios no autorizados no puedan escribir en \u00e9l; o como administrador, cree el directorio `%PROGRAMDATA%\\jupyter` con los permisos restrictivos adecuados. o como usuario o administrador, configure la variable de entorno `%PROGRAMDATA%` en un directorio con permisos restrictivos apropiados (por ejemplo, controlado por administradores _o_ el usuario actual)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30359.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30359.json index e1d4cd617d1..afeeb66c17e 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30359.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30359.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30359", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T18:15:25.243", - "lastModified": "2025-06-03T18:15:25.243", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when they access a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. Note that the attacker has to know the port and the output entrypoint script path. Combined with prototype pollution, the attacker can get a reference to the webpack runtime variables. By using `Function::toString` against the values in `__webpack_modules__`, the attacker can get the source code. Version 5.2.1 contains a patch for the issue." + }, + { + "lang": "es", + "value": "webpack-dev-server permite a los usuarios usar webpack con un servidor de desarrollo que permite la recarga en tiempo real. Antes de la versi\u00f3n 5.2.1, el c\u00f3digo fuente de los usuarios de webpack-dev-server pod\u00eda ser robado al acceder a un sitio web malicioso. Dado que la solicitud de un script cl\u00e1sico mediante una etiqueta de script no est\u00e1 sujeta a la pol\u00edtica del mismo origen, un atacante puede inyectar un script malicioso en su sitio y ejecutarlo. Tenga en cuenta que el atacante debe conocer el puerto y la ruta del script del punto de entrada de salida. Combinando la contaminaci\u00f3n del prototipo, el atacante puede obtener una referencia a las variables de tiempo de ejecuci\u00f3n de webpack. Al usar `Function::toString` con los valores de `__webpack_modules__`, el atacante puede obtener el c\u00f3digo fuente. La versi\u00f3n 5.2.1 incluye un parche para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30360.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30360.json index c704b8e921d..b086c7eff28 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30360.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30360.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30360", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T18:15:25.410", - "lastModified": "2025-06-03T18:15:25.410", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue." + }, + { + "lang": "es", + "value": "webpack-dev-server permite a los usuarios usar webpack con un servidor de desarrollo que proporciona recarga en tiempo real. Antes de la versi\u00f3n 5.2.1, el c\u00f3digo fuente de los usuarios de webpack-dev-server pod\u00eda ser robado al acceder a un sitio web malicioso con un navegador que no fuera Chromium. El encabezado \"Origin\" se verifica para evitar el secuestro de WebSockets entre sitios, reportado por CVE-2018-14732. Sin embargo, webpack-dev-server siempre permite los encabezados \"Origin\" de direcciones IP. Esto permite que los sitios web que se sirven en direcciones IP se conecten a WebSockets. Un atacante puede obtener el c\u00f3digo fuente mediante un m\u00e9todo similar al utilizado para explotar CVE-2018-14732. La versi\u00f3n 5.2.1 incluye un parche para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30408.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30408.json index 0fc1d292742..1ad3200bb08 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30408.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30408.json @@ -2,13 +2,13 @@ "id": "CVE-2025-30408", "sourceIdentifier": "security@acronis.com", "published": "2025-04-24T14:15:58.550", - "lastModified": "2025-04-29T13:52:47.470", + "lastModified": "2025-06-04T14:15:28.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39904." + "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39904, Acronis Cyber Protect 16 (Windows) before build 39938." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json index 93158def759..36e7c11bc60 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30415", "sourceIdentifier": "security@acronis.com", "published": "2025-06-04T12:15:20.703", - "lastModified": "2025-06-04T12:15:20.703", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json index 0cd0ba489c2..5e43e63b2fa 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31359", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-06-03T10:15:22.240", - "lastModified": "2025-06-03T14:15:48.583", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json index db94eaa497c..b91e4c727d3 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31676", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-03-31T22:15:20.113", - "lastModified": "2025-04-29T16:15:31.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:03:00.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-1390" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:email_tfa_project:email_tfa:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "2.0.3", + "matchCriteriaId": "4F0AD24C-74B7-45CB-8839-FD247D8F5782" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-001", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json index 1c0e97f1935..71e34ff1ad7 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31677", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-03-31T22:15:20.227", - "lastModified": "2025-04-29T16:15:31.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:06:19.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,44 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artificial_intelligence_project:artificial_intelligence:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.0.2", + "matchCriteriaId": "F04A0B21-76A8-4301-9BE5-70553F7938FC" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-003", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json index a7cc04cadd4..3ca8c3618b1 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31678", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-03-31T22:15:20.330", - "lastModified": "2025-04-29T16:15:31.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:07:11.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artificial_intelligence_project:artificial_intelligence:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "1.0.3", + "matchCriteriaId": "92843E1F-674A-450C-8D86-D6644B8D68A1" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-004", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json index d1f71d65c0f..81d2d7072b9 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31679", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-03-31T22:15:20.440", - "lastModified": "2025-04-29T16:15:32.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T15:07:57.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ignition_error_pages_project:ignition_error_pages:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "A716AB82-CABC-4729-881C-96BE149F9A88" + } + ] + } + ] } ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-007", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json index e74e99494a8..a9bfe78a6f5 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31710", "sourceIdentifier": "security@unisoc.com", "published": "2025-06-03T06:15:27.310", - "lastModified": "2025-06-03T16:15:24.600", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json index 1ae13f2f820..62bb15543ab 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31711", "sourceIdentifier": "security@unisoc.com", "published": "2025-06-03T06:15:27.480", - "lastModified": "2025-06-03T16:15:24.717", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json index 9c97b558b7c..1cdebcaff02 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31712", "sourceIdentifier": "security@unisoc.com", "published": "2025-06-03T06:15:27.613", - "lastModified": "2025-06-03T16:15:24.823", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json index f552855019d..254b00ff955 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32105", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T17:15:21.720", - "lastModified": "2025-06-03T18:15:25.560", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in the the Sangoma IMG2020 HTTP server through 2.3.9.6 allows an unauthenticated user to achieve remote code execution." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer en el servidor HTTP Sangoma IMG2020 a trav\u00e9s de 2.3.9.6 permite que un usuario no autenticado logre la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json index 840b406f6bf..c718ed6fc6d 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32106", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T17:15:21.890", - "lastModified": "2025-06-03T18:15:25.737", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Audiocodes Mediapack MP-11x through 6.60A.369.002, a crafted POST request request may result in an unauthenticated remote user's ability to execute unauthorized code." + }, + { + "lang": "es", + "value": "En Audiocodes Mediapack MP-11x a 6.60A.369.002, una solicitud POST manipulada espec\u00edficamente puede provocar que un usuario remoto no autenticado pueda ejecutar c\u00f3digo no autorizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32598.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32598.json index f415bdb48e4..cdd3444b2c4 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32598.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32598.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32598", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-11T09:15:30.710", - "lastModified": "2025-04-15T15:16:09.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-04T14:25:34.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wptablebuilder:wp_table_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.6", + "matchCriteriaId": "0D288B02-DFED-4DE2-A018-FC42038EC997" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-table-builder/vulnerability/wordpress-wp-table-builder-plugin-2-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-350xx/CVE-2025-35036.json b/CVE-2025/CVE-2025-350xx/CVE-2025-35036.json index 04b39400369..f1d9b179615 100644 --- a/CVE-2025/CVE-2025-350xx/CVE-2025-35036.json +++ b/CVE-2025/CVE-2025-350xx/CVE-2025-35036.json @@ -2,13 +2,17 @@ "id": "CVE-2025-35036", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2025-06-03T20:15:21.993", - "lastModified": "2025-06-03T20:15:21.993", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hibernate Validator before 6.2.0 and 7.0.0, by default and depending how it is used, may interpolate user-supplied input in a constraint violation message with Expression Language. This could allow an attacker to access sensitive information or execute arbitrary Java code. Hibernate Validator as of 6.2.0 and 7.0.0 no longer interpolates custom constraint violation messages with Expression Language and strongly recommends not allowing user-supplied input in constraint violation messages. CVE-2020-5245 and CVE-2025-4428 are examples of related, downstream vulnerabilities involving Expression Language intepolation of user-supplied data." + }, + { + "lang": "es", + "value": "Hibernate Validator, en versiones anteriores a la 6.2.0 y la 7.0.0, puede, de forma predeterminada y seg\u00fan su uso, interpolar la informaci\u00f3n proporcionada por el usuario en un mensaje de violaci\u00f3n de restricciones con Expression Language. Esto podr\u00eda permitir a un atacante acceder a informaci\u00f3n confidencial o ejecutar c\u00f3digo Java arbitrario. Hibernate Validator, a partir de la 6.2.0 y la 7.0.0, ya no interpola mensajes personalizados de violaci\u00f3n de restricciones con Expression Language y recomienda encarecidamente no permitir la informaci\u00f3n proporcionada por el usuario en dichos mensajes. CVE-2020-5245 y CVE-2025-4428 son ejemplos de vulnerabilidades relacionadas con la interpolaci\u00f3n de datos proporcionados por el usuario en Expression Language." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3584.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3584.json index dad259089be..e910993d888 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3584.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3584.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3584", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-03T06:15:27.757", - "lastModified": "2025-06-03T16:15:24.937", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36564.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36564.json index f8b889fee7a..8c5409fcad6 100644 --- a/CVE-2025/CVE-2025-365xx/CVE-2025-36564.json +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36564.json @@ -2,13 +2,17 @@ "id": "CVE-2025-36564", "sourceIdentifier": "security_alert@emc.com", "published": "2025-06-03T15:15:58.600", - "lastModified": "2025-06-03T15:15:58.600", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Encryption Admin Utilities versions prior to 11.10.2 contain an Improper Link Resolution vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation." + }, + { + "lang": "es", + "value": "Las versiones de Dell Encryption Admin Utilities anteriores a la 11.10.2 contienen una vulnerabilidad de resoluci\u00f3n de enlace incorrecta. Un usuario malintencionado local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3662.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3662.json index 8fc191e3b7a..235f3545f91 100644 --- a/CVE-2025/CVE-2025-36xx/CVE-2025-3662.json +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3662.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3662", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-03T06:15:27.873", - "lastModified": "2025-06-03T16:15:25.073", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3919.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3919.json index b03a5f337af..8fb3a21bc0d 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3919.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3919.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3919", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-02T23:15:20.757", - "lastModified": "2025-06-02T23:15:20.757", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Comments Import & Export plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_settings function in all versions up to, and including, 2.4.3. Additionally, the plugin fails to properly sanitize and escape FTP settings parameters. \r\nThis makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts on the plugin settings page that will execute whenever an administrative user accesses an injected page.\r\nThe vulnerability was partially fixed in version 2.4.3 and fully fixed in version 2.4.4" + }, + { + "lang": "es", + "value": "El complemento WordPress Comments Import & Export de WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n save_settings en todas las versiones hasta la 2.4.3 incluida. Adem\u00e1s, el complemento no depura ni escapa correctamente los par\u00e1metros de configuraci\u00f3n FTP. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, inyectar scripts web arbitrarios en la p\u00e1gina de configuraci\u00f3n del complemento que se ejecutar\u00e1n cada vez que un usuario administrativo acceda a una p\u00e1gina inyectada. La vulnerabilidad se corrigi\u00f3 parcialmente en la versi\u00f3n 2.4.3 y completamente en la versi\u00f3n 2.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4047.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4047.json index ccb5870e13b..f94e9aa2262 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4047.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4047.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4047", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T03:15:27.910", - "lastModified": "2025-06-03T03:15:27.910", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Broken Link Checker plugin for WordPress is vulnerable to unauthorized data access due to a missing capability check on the ajax_full_status and ajax_dashboard_status functions in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view the plugin's status." + }, + { + "lang": "es", + "value": "El complemento Broken Link Checker para WordPress es vulnerable al acceso no autorizado a datos debido a la falta de comprobaci\u00f3n de las funciones ajax_full_status y ajax_dashboard_status en todas las versiones hasta la 2.4.4 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, vean el estado del complemento." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-414xx/CVE-2025-41428.json b/CVE-2025/CVE-2025-414xx/CVE-2025-41428.json index ecc16276721..d8a292a9e8f 100644 --- a/CVE-2025/CVE-2025-414xx/CVE-2025-41428.json +++ b/CVE-2025/CVE-2025-414xx/CVE-2025-41428.json @@ -2,13 +2,17 @@ "id": "CVE-2025-41428", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-06-03T08:15:19.467", - "lastModified": "2025-06-03T08:15:19.467", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker." + }, + { + "lang": "es", + "value": "Existe un problema de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\u00abPath Traversal\u00bb) en TimeWorks 10.0 a 10.3. Si se explota, un atacante remoto no autenticado podr\u00eda acceder a archivos JSON arbitrarios en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json index 5a6432e8917..3560e9b8096 100644 --- a/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4138.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4138", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.377", - "lastModified": "2025-06-03T21:15:22.687", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.\n\n\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links." + }, + { + "lang": "es", + "value": "Permite ignorar el filtro de extracci\u00f3n, lo que permite que los enlaces simb\u00f3licos apunten fuera del directorio de destino y la modificaci\u00f3n de algunos metadatos de archivo. Esta vulnerabilidad afecta al usar el m\u00f3dulo tarfile para extraer archivos tar no confiables mediante TarFile.extractall() o TarFile.extract() y el par\u00e1metro filter= con el valor \"data\" o \"tar\". Consulte la documentaci\u00f3n sobre filtros de extracci\u00f3n de archivos tar (https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter) para obtener m\u00e1s informaci\u00f3n. Solo las versiones de Python 3.12 o posteriores se ven afectadas por estas vulnerabilidades; las versiones anteriores no incluyen la funci\u00f3n de filtro de extracci\u00f3n. Tenga en cuenta que para Python 3.14 o posteriores, el valor predeterminado de filter= cambi\u00f3 de \"sin filtrado\" a \"data\", por lo que si utiliza este nuevo comportamiento predeterminado, su uso tambi\u00e9n se ver\u00e1 afectado. Tenga en cuenta que ninguna de estas vulnerabilidades afecta significativamente la instalaci\u00f3n de distribuciones de c\u00f3digo fuente que sean archivos tar, ya que estas permiten la ejecuci\u00f3n de c\u00f3digo arbitrario durante el proceso de compilaci\u00f3n. Sin embargo, al evaluar distribuciones de origen es importante evitar instalar distribuciones de origen con enlaces sospechosos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4205.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4205.json index 865d84ffab0..6f8fc9036e3 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4205.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4205.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4205", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T12:15:21.350", - "lastModified": "2025-06-03T12:15:21.350", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4224.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4224.json index b48c9d8b307..4977873a8ce 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4224.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4224.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4224", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T03:15:28.093", - "lastModified": "2025-06-03T03:15:28.093", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wpForo + wpForo Advanced Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via media upload names in all versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento wpForo + wpForo Advanced Attachments para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de nombres de carga de medios en todas las versiones hasta la 3.1.3 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de nivel personalizado o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json index 93fd3ffccaf..c8091ea188c 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json @@ -2,13 +2,17 @@ "id": "CVE-2025-43923", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T15:15:58.767", - "lastModified": "2025-06-03T15:15:58.767", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ReportController in Unicom Focal Point 7.6.1. A user who has administrative privilege in Focal Point can perform SQL injection via the image parameter during a delete report image operation." + }, + { + "lang": "es", + "value": "Se detect\u00f3 un problema en ReportController en Unicom Focal Point 7.6.1. Un usuario con privilegios administrativos en Focal Point puede realizar una inyecci\u00f3n SQL mediante el par\u00e1metro de imagen durante la eliminaci\u00f3n de una imagen de informe." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json index 5a99685a92d..d6979c857c1 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json @@ -2,13 +2,17 @@ "id": "CVE-2025-43924", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T15:15:58.883", - "lastModified": "2025-06-03T15:15:58.883", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability was discovered in Unicom Focal Point 7.6.1. The val parameter in SettingController (for /fp/admin/settings/loginpage) and the rootserviceurl parameter in FriendsController (for /fp/admin/settings/friends), entered by an admin, allow stored XSS." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de Cross-Site Scripting en Unicom Focal Point 7.6.1. El par\u00e1metro val en SettingController (para /fp/admin/settings/loginpage) y el par\u00e1metro rootserviceurl en FriendsController (para /fp/admin/settings/friends), introducidos por un administrador, permiten XSS Almacenado. " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43925.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43925.json index b62b8457097..8a2e9d6b263 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43925.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43925.json @@ -2,13 +2,17 @@ "id": "CVE-2025-43925", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T15:15:58.997", - "lastModified": "2025-06-03T19:15:38.960", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Unicom Focal Point 7.6.1. The database is encrypted with a hardcoded key, making it easier to recover the cleartext data." + }, + { + "lang": "es", + "value": "Se detect\u00f3 un problema en Unicom Focal Point 7.6.1. La base de datos est\u00e1 cifrada con una clave codificada, lo que facilita la recuperaci\u00f3n de datos en texto plano." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json index 56e5329cad2..315d16fd063 100644 --- a/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4330.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4330", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.503", - "lastModified": "2025-06-03T21:15:22.800", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.\n\n\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links." + }, + { + "lang": "es", + "value": "Permite ignorar el filtro de extracci\u00f3n, lo que permite que los enlaces simb\u00f3licos apunten fuera del directorio de destino y la modificaci\u00f3n de algunos metadatos de archivo. Esta vulnerabilidad afecta al usar el m\u00f3dulo tarfile para extraer archivos tar no confiables mediante TarFile.extractall() o TarFile.extract() y el par\u00e1metro filter= con el valor \"data\" o \"tar\". Consulte la documentaci\u00f3n sobre filtros de extracci\u00f3n de archivos tar (https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter) para obtener m\u00e1s informaci\u00f3n. Solo las versiones de Python 3.12 o posteriores se ven afectadas por estas vulnerabilidades; las versiones anteriores no incluyen la funci\u00f3n de filtro de extracci\u00f3n. Tenga en cuenta que para Python 3.14 o posteriores, el valor predeterminado de filter= cambi\u00f3 de \"sin filtrado\" a \"data\", por lo que si utiliza este nuevo comportamiento predeterminado, su uso tambi\u00e9n se ver\u00e1 afectado. Tenga en cuenta que ninguna de estas vulnerabilidades afecta significativamente la instalaci\u00f3n de distribuciones de c\u00f3digo fuente que sean archivos tar, ya que estas permiten la ejecuci\u00f3n de c\u00f3digo arbitrario durante el proceso de compilaci\u00f3n. Sin embargo, al evaluar distribuciones de origen es importante evitar instalar distribuciones de origen con enlaces sospechosos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4392.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4392.json index 163e53c80a5..01039268de4 100644 --- a/CVE-2025/CVE-2025-43xx/CVE-2025-4392.json +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4392.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4392", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T10:15:22.397", - "lastModified": "2025-06-03T10:15:22.397", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shared Files \u2013 Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via html File uploads in all versions up to, and including, 1.7.48 due to insufficient input sanitization and output escaping within the sanitize_file() function. This makes it possible for unauthenticated attackers to bypass the plugin\u2019s MIME-only checks and inject arbitrary web scripts in pages that will execute whenever a user accesses the html file." + }, + { + "lang": "es", + "value": "El complemento Shared Files \u2013 Frontend File Upload Form & Secure File Sharing para WordPress es vulnerable a Cross-Site Scripting Almacenado al subir archivos HTML en todas las versiones hasta la 1.7.48 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida dentro de la funci\u00f3n sanitize_file(). Esto permite a atacantes no autenticados eludir las comprobaciones de solo MIME del complemento e inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario al archivo HTML." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json index 6a3bbdb7a45..19644455d61 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json @@ -2,13 +2,17 @@ "id": "CVE-2025-44148", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T16:15:25.210", - "lastModified": "2025-06-03T16:15:25.210", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in MailEnable before v10 allows a remote attacker to execute arbitrary code via the failure.aspx component" + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Scripting (XSS) en MailEnable antes de v10 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del componente Failure.aspx." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4420.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4420.json index d389ef93ab9..7e1e95f0da6 100644 --- a/CVE-2025/CVE-2025-44xx/CVE-2025-4420.json +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4420.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4420", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T09:15:22.673", - "lastModified": "2025-06-03T09:15:22.673", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018containerWidth\u2019 parameter in all versions up to, and including, 1.3.1 due to a missing capability check on the vayu_blocks_option_panel_callback() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Vayu Blocks \u2013 Gutenberg Blocks para WordPress y WooCommerce es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'containerWidth' en todas las versiones hasta la 1.3.1 incluida, debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n vayu_blocks_option_panel_callback() y a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json index 06312949580..1534338cb7f 100644 --- a/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4435.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4435", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.630", - "lastModified": "2025-06-03T21:15:22.907", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When using a TarFile.errorlevel = 0\u00a0and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0\u00a0in affected versions is that the member would still be extracted and not skipped." + }, + { + "lang": "es", + "value": "Al usar TarFile.errorlevel = 0 y extraer con un filtro, el comportamiento documentado es que cualquier miembro filtrado se omite y no se extrae. Sin embargo, el comportamiento real de TarFile.errorlevel = 0 en las versiones afectadas es que el miembro se extrae y no se omite." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-453xx/CVE-2025-45387.json b/CVE-2025/CVE-2025-453xx/CVE-2025-45387.json index 6d988594983..bd7672d149a 100644 --- a/CVE-2025/CVE-2025-453xx/CVE-2025-45387.json +++ b/CVE-2025/CVE-2025-453xx/CVE-2025-45387.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45387", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T18:15:24.517", - "lastModified": "2025-06-02T21:15:21.913", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json index 6ea4452699d..d162fbed255 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json @@ -2,17 +2,41 @@ "id": "CVE-2025-45854", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T16:15:25.600", - "lastModified": "2025-06-03T16:15:25.600", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An arbitrary file upload vulnerability in the component /server/executeExec of JEHC-BPM v2.0.1 allows attackers to execute arbitrary code via uploading a crafted file." + "value": "/server/executeExec of JEHC-BPM 2.0.1 allows attackers to execute arbitrary code via execParams." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /server/executeExec de JEHC-BPM v2.0.1 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado." } ], "metrics": { "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,6 +89,10 @@ { "url": "https://gitee.com/jehc/JEHC-BPM", "source": "cve@mitre.org" + }, + { + "url": "https://web.archive.org/web/20250604134020/https://gist.github.com/Cafe-Tea/bc14b38f4bfd951de2979a24c3358460/revisions", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json index b16f322dda8..46243aa8495 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json @@ -2,13 +2,17 @@ "id": "CVE-2025-45855", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T14:15:48.750", - "lastModified": "2025-06-03T19:15:39.097", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the component /upload/GoodsCategory/image of erupt v1.12.19 allows attackers to execute arbitrary code via uploading a crafted file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /upload/GoodsCategory/image de erupt v1.12.19 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json index 4e4c4688d5f..f7190644b30 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4517.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4517", "sourceIdentifier": "cna@python.org", "published": "2025-06-03T13:15:20.837", - "lastModified": "2025-06-03T21:15:23.113", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allows arbitrary filesystem writes outside the extraction directory during extraction with filter=\"data\".\n\n\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links." + }, + { + "lang": "es", + "value": "Permite escrituras arbitrarias en el sistema de archivos fuera del directorio de extracci\u00f3n durante la extracci\u00f3n con filter=\"data\". Esta vulnerabilidad afecta al usuario si utiliza el m\u00f3dulo tarfile para extraer archivos tar no confiables mediante TarFile.extractall() o TarFile.extract() y el par\u00e1metro filter= con el valor \"data\" o \"tar\". Consulte la documentaci\u00f3n sobre filtros de extracci\u00f3n de archivos tar (https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter) para obtener m\u00e1s informaci\u00f3n. Solo las versiones de Python 3.12 o posteriores se ven afectadas por estas vulnerabilidades; las versiones anteriores no incluyen la funci\u00f3n de filtro de extracci\u00f3n. Tenga en cuenta que, para Python 3.14 o posteriores, el valor predeterminado de filter= cambi\u00f3 de \"sin filtrado\" a \"data\", por lo que si utiliza este nuevo comportamiento predeterminado, su uso tambi\u00e9n se ver\u00e1 afectado. Tenga en cuenta que ninguna de estas vulnerabilidades afecta significativamente la instalaci\u00f3n de distribuciones fuente que son archivos tar, ya que estas permiten la ejecuci\u00f3n de c\u00f3digo arbitrario durante el proceso de compilaci\u00f3n. Sin embargo, al evaluar distribuciones de origen es importante evitar instalar distribuciones de origen con enlaces sospechosos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4567.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4567.json index 61741854496..9b421c800c1 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4567.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4567.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4567", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-03T06:15:27.983", - "lastModified": "2025-06-03T16:15:26.270", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4578.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4578.json index df4957f2d04..23625169cd0 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4578.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4578.json @@ -2,16 +2,43 @@ "id": "CVE-2025-4578", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-04T06:15:21.673", - "lastModified": "2025-06-04T06:15:21.673", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection" + }, + { + "lang": "es", + "value": "El complemento File Provider de WordPress hasta la versi\u00f3n 1.2.3 no depura ni escapa correctamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que genera una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3aa76b96-40b7-4bde-a39c-c1aa6f8278fc/", diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4580.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4580.json index 44f0e798928..4065aeb3108 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4580.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4580.json @@ -2,16 +2,43 @@ "id": "CVE-2025-4580", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-04T06:15:21.800", - "lastModified": "2025-06-04T06:15:21.800", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The File Provider WordPress plugin through 1.2.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento File Provider de WordPress hasta la versi\u00f3n 1.2.3 no tiene una comprobaci\u00f3n CSRF activada al actualizar sus configuraciones, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n las cambie mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8741353a-2a7f-4dee-b62d-7f5fe435f1a1/", diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json index f8393b210ee..4a4d57891d9 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46154", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T14:15:48.880", - "lastModified": "2025-06-03T14:15:48.880", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Foxcms v1.25 has a SQL time injection in the $_POST['dbname'] parameter of installdb.php." + }, + { + "lang": "es", + "value": "Foxcms v1.25 tiene una inyecci\u00f3n de tiempo SQL en el par\u00e1metro $_POST['dbname'] de installdb.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46355.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46355.json index adb81e53426..69a05640b94 100644 --- a/CVE-2025/CVE-2025-463xx/CVE-2025-46355.json +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46355.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46355", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-06-03T08:15:19.813", - "lastModified": "2025-06-03T08:15:19.813", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker." + }, + { + "lang": "es", + "value": "Problema con permisos predeterminados incorrectos en PC Time Tracer anterior a la versi\u00f3n 5.2. Si se explota, un atacante local autenticado podr\u00eda ejecutar c\u00f3digo arbitrario con privilegios de SYSTEM en sistemas Windows donde se ejecuta el producto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46548.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46548.json index b88b0184c94..36511814f77 100644 --- a/CVE-2025/CVE-2025-465xx/CVE-2025-46548.json +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46548.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46548", "sourceIdentifier": "security@apache.org", "published": "2025-06-03T15:15:59.110", - "lastModified": "2025-06-03T18:15:25.910", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "If you enable Basic Authentication in Pekko Management using the Java DSL, the authenticator may not be properly applied.\n\n\nUsers that rely on authentication instead of making sure the Management API ports are only available to trusted users are recommended to upgrade to version 1.1.1, which fixes this issue." + }, + { + "lang": "es", + "value": "Si habilita la autenticaci\u00f3n b\u00e1sica en Pekko Management mediante el DSL de Java, es posible que el autenticador no se aplique correctamente. Se recomienda a los usuarios que dependen de la autenticaci\u00f3n en lugar de asegurarse de que los puertos de la API de administraci\u00f3n solo est\u00e9n disponibles para usuarios de confianza que actualicen a la versi\u00f3n 1.1.1, que soluciona este problema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46777.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46777.json index b3c3e6c291e..0a794d140f8 100644 --- a/CVE-2025/CVE-2025-467xx/CVE-2025-46777.json +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46777.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46777", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-05-28T08:15:22.443", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:37:37.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 } ] }, @@ -51,10 +71,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.10", + "matchCriteriaId": "04BC3F4E-BCFF-4C13-9922-94BC08D55E0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.6", + "matchCriteriaId": "BA765E03-8943-42BB-AACC-F3C918B8F2EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiportal:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "957DAED4-8BE8-49A8-BEFA-2C419824895A" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-380", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4671.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4671.json index e2d3927fa94..2d04b674577 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4671.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4671.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4671", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T12:15:22.443", - "lastModified": "2025-06-03T12:15:22.443", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47294.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47294.json index 59fe416ea46..54f521b8bda 100644 --- a/CVE-2025/CVE-2025-472xx/CVE-2025-47294.json +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47294.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47294", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-05-28T08:15:22.597", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:37:29.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,10 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndExcluding": "7.0.15", + "matchCriteriaId": "C8185801-97AD-48F2-8275-A54D5D81C048" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.8", + "matchCriteriaId": "A6D2A14F-3916-45A0-AD4D-27C60E00AEC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-388", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47295.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47295.json index f254cad46e6..76cb6c43f6f 100644 --- a/CVE-2025/CVE-2025-472xx/CVE-2025-47295.json +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47295.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47295", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-05-28T08:15:22.747", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:37:21.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, @@ -49,12 +69,58 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndExcluding": "7.0.15", + "matchCriteriaId": "C8185801-97AD-48F2-8275-A54D5D81C048" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.8", + "matchCriteriaId": "A6D2A14F-3916-45A0-AD4D-27C60E00AEC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.4", + "matchCriteriaId": "1FDDB5F3-D229-4208-9110-8860A03C8B59" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-381", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-475xx/CVE-2025-47585.json b/CVE-2025/CVE-2025-475xx/CVE-2025-47585.json index 57a9dd226b0..2c58bb38cd4 100644 --- a/CVE-2025/CVE-2025-475xx/CVE-2025-47585.json +++ b/CVE-2025/CVE-2025-475xx/CVE-2025-47585.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47585", "sourceIdentifier": "audit@patchstack.com", "published": "2025-06-02T20:15:22.780", - "lastModified": "2025-06-02T20:15:22.780", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Mage people team Booking and Rental Manager allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Booking and Rental Manager: from n/a through 2.3.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Mage people team Booking and Rental Manager permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Booking and Rental Manager: desde n/d hasta 2.3.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47724.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47724.json index cf219479108..581d1bc6d3f 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47724.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47724.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47724", "sourceIdentifier": "759f5e80-c8e1-4224-bead-956d7b33c98b", "published": "2025-06-04T08:15:21.867", - "lastModified": "2025-06-04T08:15:21.867", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft\u00a0lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft no valida adecuadamente el archivo proporcionado por el usuario. Si un usuario abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47725.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47725.json index 68cc79e13a1..23312658536 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47725.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47725.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47725", "sourceIdentifier": "759f5e80-c8e1-4224-bead-956d7b33c98b", "published": "2025-06-04T08:15:22.057", - "lastModified": "2025-06-04T08:15:22.057", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft\u00a0lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft no valida adecuadamente el archivo proporcionado por el usuario. Si un usuario abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47726.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47726.json index 6a4b79e1b38..2068fe0b192 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47726.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47726.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47726", "sourceIdentifier": "759f5e80-c8e1-4224-bead-956d7b33c98b", "published": "2025-06-04T08:15:22.190", - "lastModified": "2025-06-04T08:15:22.190", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft\u00a0lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft no valida adecuadamente el archivo proporcionado por el usuario. Si un usuario abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47727.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47727.json index ce4238c69f3..38e562865b6 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47727.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47727.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47727", "sourceIdentifier": "759f5e80-c8e1-4224-bead-956d7b33c98b", "published": "2025-06-04T08:15:22.320", - "lastModified": "2025-06-04T08:15:22.320", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft\u00a0lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft no valida adecuadamente el archivo proporcionado por el usuario. Si un usuario abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47728.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47728.json index c2e6588609f..b02c19933ff 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47728.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47728.json @@ -2,13 +2,17 @@ "id": "CVE-2025-47728", "sourceIdentifier": "759f5e80-c8e1-4224-bead-956d7b33c98b", "published": "2025-06-04T08:15:22.453", - "lastModified": "2025-06-04T08:15:22.453", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft-G2\u00a0lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de la validaci\u00f3n adecuada del archivo proporcionado por el usuario. Si un usuario abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4797.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4797.json index 3aecb023dfa..9ee964a403d 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4797.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4797.json @@ -2,13 +2,17 @@ "id": "CVE-2025-4797", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T05:15:20.323", - "lastModified": "2025-06-03T05:15:20.323", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Golo - City Travel Guide WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.7.0. This is due to the plugin not properly validating a user's identity prior to setting an authorization cookie. This makes it possible for unauthenticated attackers to log in as any user, including administrators, provided they know the user's email address." + }, + { + "lang": "es", + "value": "El tema Golo - City Travel Guide WordPress Theme para WordPress es vulnerable a la escalada de privilegios mediante robo de cuenta en todas las versiones hasta la 1.7.0 incluida. Esto se debe a que el complemento no valida correctamente la identidad del usuario antes de configurar una cookie de autorizaci\u00f3n. Esto permite que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario, incluidos administradores, siempre que conozcan su direcci\u00f3n de correo electr\u00f3nico." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-483xx/CVE-2025-48387.json b/CVE-2025/CVE-2025-483xx/CVE-2025-48387.json index 3d6667ca574..9d2722c3f62 100644 --- a/CVE-2025/CVE-2025-483xx/CVE-2025-48387.json +++ b/CVE-2025/CVE-2025-483xx/CVE-2025-48387.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48387", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-02T20:15:22.930", - "lastModified": "2025-06-02T20:15:22.930", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.0.9, 2.1.3, and 1.16.5 have an issue where an extract can write outside the specified dir with a specific tarball. This has been patched in versions 3.0.9, 2.1.3, and 1.16.5. As a workaround, use the ignore option to ignore non files/directories." + }, + { + "lang": "es", + "value": "tar-fs proporciona enlaces de sistema de archivos para tar-stream. Las versiones anteriores a 3.0.9, 2.1.3 y 1.16.5 presentan un problema que permite que un extracto escriba fuera del directorio especificado con un archivo tar espec\u00edfico. Esto se ha corregido en las versiones 3.0.9, 2.1.3 y 1.16.5. Como workaround, utilice la opci\u00f3n ignorar para ignorar archivos o directorios que no sean archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48476.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48476.json index decd41e5b59..4b11a972fa5 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48476.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48476.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48476", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:21.437", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:36:28.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-841" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7h5m-q39p-h849", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48477.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48477.json index 3a43d7a6ab4..7cf08f2e021 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48477.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48477.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48477", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:22.283", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:36:20.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-841" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2c82-qx7x-35h8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48478.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48478.json index be3330241a0..51e10da0ce6 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48478.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48478.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48478", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:22.460", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:36:13.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,16 +93,51 @@ "value": "CWE-841" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/commit/d2048f59a899dbcfc9a71bb98549ead81cdb62a5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-fqjj-79j2-8qx6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48479.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48479.json index 23779b4052b..b6b1df0ecb1 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48479.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48479.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48479", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:22.630", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:36:04.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-841" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-627h-pc3c-w68h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48480.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48480.json index eee0e455fe6..47ce67f0cbf 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48480.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48480.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48480", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:22.800", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:35:54.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-841" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-pfjf-43mp-3gp2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48481.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48481.json index 04c74c9aa81..6acfc7af988 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48481.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48481.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48481", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:22.973", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:35:47.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-841" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jgj2-x749-5wc7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48482.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48482.json index e7fc3005c3d..97ec6133d72 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48482.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48482.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48482", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:23.160", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:35:32.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-841" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7fjp-538q-9vrf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48483.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48483.json index 879552b4711..ab1b556df4a 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48483.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48483.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48483", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:23.330", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:35:21.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-g2vq-qwx2-pc2m", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48484.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48484.json index f8a622fa5de..a95700c915e 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48484.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48484.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48484", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T05:15:23.513", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:34:51.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -71,12 +93,44 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.178", + "matchCriteriaId": "8E0D2641-4473-4694-A5CA-F58375E5B731" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-w3j9-7fhq-m8x7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48485.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48485.json index d22608bae49..3b4734bd66b 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48485.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48485.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48485", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T07:15:22.857", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:32:26.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.180", + "matchCriteriaId": "68F8F94A-40CE-4D87-9119-D849531E7D48" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-556q-w535-xxg8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48710.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48710.json index deb83eb6829..68aa0d2ad60 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48710.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48710.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48710", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-04T06:15:21.390", - "lastModified": "2025-06-04T06:15:21.390", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes." + }, + { + "lang": "es", + "value": "kro (Kube Resource Orchestrator) 0.1.0 anterior a 0.2.1 permite a los usuarios (con permiso para crear o modificar recursos ResourceGraphDefinition) proporcionar im\u00e1genes de contenedor arbitrarias. Esto puede generar un escenario de subordinaci\u00f3n confusa donde los controladores de kro implementan y ejecutan im\u00e1genes controladas por atacantes, lo que resulta en la ejecuci\u00f3n remota de c\u00f3digo no autenticado en los nodos del cl\u00faster." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48950.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48950.json index 1e18e397636..1dc1551327c 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48950.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48950.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48950", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T19:15:39.230", - "lastModified": "2025-06-03T19:15:39.230", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MaxKB is an open-source AI assistant for enterprise. Prior to version 1.10.8-lts, Sandbox only restricts the execution permissions of binary files in common directories, such as `/bin,/usr/bin`, etc. Therefore, attackers can exploit some files with execution permissions in non blacklisted directories to carry out attacks. Version 1.10.8-lts fixes the issue." + }, + { + "lang": "es", + "value": "MaxKB es un asistente de IA de c\u00f3digo abierto para empresas. Antes de la versi\u00f3n 1.10.8-lts, la sandbox solo restring\u00eda los permisos de ejecuci\u00f3n de archivos binarios en directorios comunes, como `/bin,/usr/bin`, etc. Por lo tanto, los atacantes pueden explotar algunos archivos con permisos de ejecuci\u00f3n en directorios no incluidos en la lista negra para llevar a cabo ataques. La versi\u00f3n 1.10.8-lts corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48951.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48951.json index de817c0b134..91c2b42deb6 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48951.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48951.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48951", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T21:15:21.840", - "lastModified": "2025-06-03T21:15:21.840", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. Versions 8.0.0-BETA3 prior to 8.14.0 contain a vulnerability due to insecure deserialization of cookie data. If exploited, since SDKs process cookie content without prior authentication, a threat actor could send a specially crafted cookie containing malicious serialized data. Applications using the Auth0-PHP SDK are affected, as are applications using the Auth0/symfony, Auth0/laravel-auth0, or Auth0/wordpress SDKs, because those SDKsrely on the Auth0-PHP SDK versions from 8.0.0-BETA3 until 8.14.0. Version 8.14.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "Auth0-PHP es un SDK de PHP para las API de autenticaci\u00f3n y administraci\u00f3n de Auth0. Las versiones 8.0.0-BETA3 anteriores a la 8.14.0 contienen una vulnerabilidad debido a la deserializaci\u00f3n insegura de los datos de las cookies. Si se explota, dado que los SDK procesan el contenido de las cookies sin autenticaci\u00f3n previa, un atacante podr\u00eda enviar una cookie especialmente dise\u00f1ada con datos serializados maliciosos. Las aplicaciones que utilizan el SDK de Auth0-PHP se ven afectadas, al igual que las aplicaciones que utilizan los SDK de Auth0/Symfony, Auth0/Laravel-auth0 o Auth0/WordPress, ya que estos SDK dependen de las versiones 8.0.0-BETA3 a 8.14.0 del SDK de Auth0-PHP. La versi\u00f3n 8.14.0 incluye un parche para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48953.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48953.json index 91769e25c6c..5598deff66c 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48953.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48953.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48953", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T19:15:39.423", - "lastModified": "2025-06-03T19:15:39.423", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Umbraco is an ASP.NET content management system (CMS). Starting in version 14.0.0 and prior to versions 15.4.2 and 16.0.0, it's possible to upload a file that doesn't adhere with the configured allowable file extensions via a manipulated API request. The issue is patched in versions 15.4.2 and 16.0.0. No known workarounds are available." + }, + { + "lang": "es", + "value": "Umbraco es un sistema de gesti\u00f3n de contenido (CMS) ASP.NET. A partir de la versi\u00f3n 14.0.0 y anteriores a las versiones 15.4.2 y 16.0.0, es posible cargar un archivo que no cumple con las extensiones permitidas configuradas mediante una solicitud de API manipulada. El problema se solucion\u00f3 en las versiones 15.4.2 y 16.0.0. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json index 89d046c8269..0f47bff94ce 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48959", "sourceIdentifier": "security@acronis.com", "published": "2025-06-04T12:15:20.880", - "lastModified": "2025-06-04T12:15:20.880", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48960.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48960.json new file mode 100644 index 00000000000..2728187bf9a --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48960.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48960", + "sourceIdentifier": "security@acronis.com", + "published": "2025-06-04T14:15:29.680", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak server key used for TLS encryption. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@acronis.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@acronis.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "references": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-6403", + "source": "security@acronis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48961.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48961.json new file mode 100644 index 00000000000..56c1938d4be --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48961.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48961", + "sourceIdentifier": "security@acronis.com", + "published": "2025-06-04T14:15:29.833", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39938." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@acronis.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@acronis.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-8000", + "source": "security@acronis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48962.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48962.json new file mode 100644 index 00000000000..17c55947b40 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48962.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-48962", + "sourceIdentifier": "security@acronis.com", + "published": "2025-06-04T14:15:29.983", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@acronis.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@acronis.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-8514", + "source": "security@acronis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48996.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48996.json index 50a183f9fda..3aabad4dd02 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48996.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48996.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48996", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-02T20:15:23.063", - "lastModified": "2025-06-02T20:15:23.063", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HAX open-apis provides microservice apis for HAX webcomponents repo that are shared infrastructure calls. An unauthenticated information disclosure vulnerability exists in the Penn State University deployment of the HAX content management system via the `haxPsuUsage` API endpoint, related to a flat present in open-apis versions up to and including 10.0.2. This allows any remote unauthenticated user to retrieve a full list of PSU websites hosted on HAX CMS. When chained with other authorization issues (e.g., HAX-3), this could assist in targeted attacks such as unauthorized content modification or deletion. Commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7 patches the vulnerability." + }, + { + "lang": "es", + "value": "HAX open-apis proporciona API de microservicios para el repositorio de componentes web HAX, que son llamadas de infraestructura compartida. Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n no autenticada en la implementaci\u00f3n del sistema de gesti\u00f3n de contenido HAX de la Universidad Estatal de Pensilvania a trav\u00e9s del endpoint de la API `haxPsuUsage`, relacionada con un error presente en las versiones de open-apis hasta la 10.0.2 incluida. Esto permite a cualquier usuario remoto no autenticado obtener una lista completa de sitios web de la PSU alojados en HAX CMS. En combinaci\u00f3n con otros problemas de autorizaci\u00f3n (p. ej., HAX-3), esto podr\u00eda facilitar ataques dirigidos, como la modificaci\u00f3n o eliminaci\u00f3n no autorizada de contenido. El commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7 corrige la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48997.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48997.json index 867a1878a58..42a4d2d50c3 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48997.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48997.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48997", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T19:15:39.577", - "lastModified": "2025-06-03T19:15:39.577", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to `2.0.1` to receive a patch. No known workarounds are available." + }, + { + "lang": "es", + "value": "Multer es un middleware de Node.js para gestionar `multipart/form-data`. Una vulnerabilidad presente a partir de la versi\u00f3n 1.4.4-lts.1 y anteriores a la 2.0.1 permite a un atacante activar una denegaci\u00f3n de servicio (DoS) al enviar una solicitud de carga de archivo con un nombre de campo de cadena vac\u00edo. Esta solicitud provoca una excepci\u00f3n no controlada, lo que provoca un bloqueo del proceso. Los usuarios deben actualizar a la versi\u00f3n 2.0.1 para recibir un parche. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json index 87c39cb6094..eb9629f0c4b 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48998", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T19:15:39.727", - "lastModified": "2025-06-03T21:15:21.997", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.6, a bypass of the patch for CVE-2025-27103 allows authenticated users to read and deserialize arbitrary files through the background JDBC connection. The vulnerability has been fixed in v2.10.10. No known workarounds are available." + }, + { + "lang": "es", + "value": "DataEase es una herramienta de c\u00f3digo abierto de inteligencia empresarial y visualizaci\u00f3n de datos. Antes de la versi\u00f3n 2.10.6, una omisi\u00f3n del parche para CVE-2025-27103 permit\u00eda a los usuarios autenticados leer y deserializar archivos arbitrarios mediante la conexi\u00f3n JDBC en segundo plano. La vulnerabilidad se ha corregido en la versi\u00f3n 2.10.10. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48999.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48999.json index 04495a7e07a..d16e78ea76a 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48999.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48999.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48999", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T21:15:22.107", - "lastModified": "2025-06-03T21:15:22.107", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue." + }, + { + "lang": "es", + "value": "DataEase es una herramienta de c\u00f3digo abierto para inteligencia empresarial y visualizaci\u00f3n de datos. Existe una soluci\u00f3n para eludir el parche CVE-2025-46566 en versiones anteriores a la 2.10.10. En una carga \u00fatil maliciosa, `getUrlType()` recupera `hostName`. Dado que la sentencia de juicio devuelve falso, no se incluir\u00e1 en la sentencia if y no se filtrar\u00e1. El payload se puede concatenar directamente en la ubicaci\u00f3n de reemplazo para construir una sentencia JDBC maliciosa. La versi\u00f3n 2.10.10 incluye un parche para este problema." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -81,6 +85,10 @@ { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49000.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49000.json index e8efe1ffe2b..ea4b8a8ebe0 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49000.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49000.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49000", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T21:15:22.250", - "lastModified": "2025-06-03T21:15:22.250", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InvenTree is an Open Source Inventory Management System. Prior to version 0.17.13, the skip field in the built-in `label-sheet` plugin lacks an upper bound, so a large value forces the server to allocate an enormous Python list. This lets any authenticated label-printing user trigger a denial-of-service via memory exhaustion. the issue is fixed in versions 0.17.13 and higher. No workaround is available aside from upgrading to the patched version." + }, + { + "lang": "es", + "value": "InvenTree es un sistema de gesti\u00f3n de inventario de c\u00f3digo abierto. Antes de la versi\u00f3n 0.17.13, el campo de omisi\u00f3n del complemento integrado `label-sheet` no ten\u00eda l\u00edmite superior, por lo que un valor alto obligaba al servidor a asignar una enorme lista de Python. Esto permit\u00eda a cualquier usuario autenticado que imprimiera etiquetas activar una denegaci\u00f3n de servicio por agotamiento de memoria. El problema se solucion\u00f3 en las versiones 0.17.13 y posteriores. No hay workaround aparte de actualizar a la versi\u00f3n parcheada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49001.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49001.json index 103a853248f..3a129733c9d 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49001.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49001.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49001", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T21:15:22.410", - "lastModified": "2025-06-03T21:15:22.410", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.10, secret verification does not take effect successfully, so a user can use any secret to forge a JWT token. The vulnerability has been fixed in v2.10.10. No known workarounds are available." + }, + { + "lang": "es", + "value": "DataEase es una herramienta de c\u00f3digo abierto de inteligencia empresarial y visualizaci\u00f3n de datos. Antes de la versi\u00f3n 2.10.10, la verificaci\u00f3n de secretos no se realizaba correctamente, por lo que un usuario pod\u00eda usar cualquier secreto para falsificar un token JWT. La vulnerabilidad se ha corregido en la versi\u00f3n 2.10.10. No se conocen workarounds." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,6 +77,10 @@ { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-xx2m-gmwg-mf3r", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dataease/dataease/security/advisories/GHSA-xx2m-gmwg-mf3r", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49002.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49002.json index 7d58c09b714..0b25534f593 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49002.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49002.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49002", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T21:15:22.550", - "lastModified": "2025-06-03T21:15:22.550", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DataEase is an open source business intelligence and data visualization tool. Versions prior to version 2.10.10 have a flaw in the patch for CVE-2025-32966 that allow the patch to be bypassed through case insensitivity because INIT and RUNSCRIPT are prohibited. The vulnerability has been fixed in v2.10.10. No known workarounds are available." + }, + { + "lang": "es", + "value": "DataEase es una herramienta de c\u00f3digo abierto para inteligencia empresarial y visualizaci\u00f3n de datos. Las versiones anteriores a la 2.10.10 presentan una vulnerabilidad en el parche para CVE-2025-32966 que permite omitir el parche mediante la insensibilidad a may\u00fasculas y min\u00fasculas, ya que INIT y RUNSCRIPT est\u00e1n prohibidos. Esta vulnerabilidad se ha corregido en la versi\u00f3n 2.10.10. No se conocen workarounds." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +81,10 @@ { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-4j78-cvc7", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-4j78-cvc7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49069.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49069.json index 4cb92dc30f3..d1c2ca27486 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49069.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49069.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49069", "sourceIdentifier": "audit@patchstack.com", "published": "2025-06-02T19:15:28.680", - "lastModified": "2025-06-02T19:15:28.680", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Cross Site Request Forgery.This issue affects Contact Forms by Cimatti: from n/a through 1.9.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Cimatti Consulting Contact Forms by Cimatti permite Cross-Site Request Forgery. Este problema afecta a los formularios de contacto de Cimatti: desde n/a hasta 1.9.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49162.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49162.json index 9a81b834a26..9c05d8ee80f 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49162.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49162.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49162", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T00:15:20.103", - "lastModified": "2025-06-03T00:15:20.103", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename." + }, + { + "lang": "es", + "value": "Los dispositivos Arris VIP1113 hasta el 30/05/2025 con KreaTV SDK permiten la sobrescritura de archivos a trav\u00e9s de TFTP porque un nombre de archivo remoto con un car\u00e1cter de espacio permite que un atacante controle el nombre de archivo local." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49163.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49163.json index 1f24d93f7d3..1a3dc5278fe 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49163.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49163.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49163", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T00:15:20.583", - "lastModified": "2025-06-03T00:15:20.583", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow booting an arbitrary image via a crafted /usr/bin/gunzip file." + }, + { + "lang": "es", + "value": "Los dispositivos Arris VIP1113 hasta el 30/05/2025 con KreaTV SDK permiten arrancar una imagen arbitraria a trav\u00e9s de un archivo /usr/bin/gunzip manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49164.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49164.json index 4c8ba435e58..259f8efd86f 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49164.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49164.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49164", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T00:15:20.740", - "lastModified": "2025-06-03T00:15:20.740", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Arris VIP1113 devices through 2025-05-30 with KreaTV SDK have a firmware decryption key of cd1c2d78f2cba1f73ca7e697b4a485f49a8a7d0c8b0fdc9f51ced50f2530668a." + }, + { + "lang": "es", + "value": "Los dispositivos Arris VIP1113 hasta el 30/05/2025 con KreaTV SDK tienen una clave de descifrado de firmware de cd1c2d78f2cba1f73ca7e697b4a485f49a8a7d0c8b0fdc9f51ced50f2530668a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49223.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49223.json index de0b6ef2d01..6fdea6fe840 100644 --- a/CVE-2025/CVE-2025-492xx/CVE-2025-49223.json +++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49223.json @@ -2,16 +2,43 @@ "id": "CVE-2025-49223", "sourceIdentifier": "cve@navercorp.com", "published": "2025-06-04T03:15:27.190", - "lastModified": "2025-06-04T03:15:27.190", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "billboard.js before 3.15.1 was discovered to contain a prototype pollution via the function generate, which could allow attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que billboard.js anterior a 3.15.1 conten\u00eda una contaminaci\u00f3n de prototipo a trav\u00e9s de la funci\u00f3n generate, que podr\u00eda permitir a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cve@navercorp.com", diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json index 588a3e6a8d1..4c74ac93264 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5068", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-03T00:15:20.907", - "lastModified": "2025-06-03T03:15:28.280", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "Use after free en Blink en Google Chrome anterior a la versi\u00f3n 137.0.7151.68 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5086.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5086.json index f2d8753abad..e5942437264 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5086.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5086.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5086", "sourceIdentifier": "3DS.Information-Security@3ds.com", "published": "2025-06-02T18:15:25.010", - "lastModified": "2025-06-03T07:15:21.380", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:53.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5103.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5103.json index 865c92c9bb4..079632dc392 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5103.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5103.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5103", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T09:15:22.840", - "lastModified": "2025-06-03T09:15:22.840", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultimate Gift Cards for WooCommerce plugin for WordPress is vulnerable to boolean-based SQL Injection via the 'default_price' and 'product_id' parameters in all versions up to, and including, 3.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Ultimate Gift Cards para WooCommerce de WordPress es vulnerable a la inyecci\u00f3n SQL booleana mediante los par\u00e1metros 'default_price' y 'product_id' en todas las versiones hasta la 3.1.4 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes autenticados, con acceso de administrador o superior, a\u00f1adir consultas SQL adicionales a las consultas existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5116.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5116.json index 4f9d16fc1ea..8f797e2a7a5 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5116.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5116.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5116", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T09:15:23.007", - "lastModified": "2025-06-03T09:15:23.007", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Plugin Info Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018containerid\u2019 parameter in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue is due to an incomplete patch for CVE-2025-31835." + }, + { + "lang": "es", + "value": "El complemento WP Plugin Info Card para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'containerid' en todas las versiones hasta la 5.3.1 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada. Este problema se debe a un parche incompleto para CVE-2025-31835." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json index 2362e24cc25..ebe8ea63ab0 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5332.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5332", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T23:15:26.680", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T15:37:02.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:online_notice_board:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E16CF0E4-F474-4709-8E9D-7CC5ED96DB59" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ubfbuz3/cve/issues/16", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310505", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310505", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586566", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ubfbuz3/cve/issues/16", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5340.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5340.json index 43053e94f2d..84b02606150 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5340.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5340.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5340", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-03T12:15:22.603", - "lastModified": "2025-06-03T12:15:22.603", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5371.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5371.json index 722fc7fc594..0b33876b712 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5371.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5371.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5371", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T08:15:21.297", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-04T14:31:41.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Health Center Patient Record Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/admin.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Health Center Patient Record Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /admin/admin.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:health_center_patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CC1860E5-A2E5-4014-AC88-1B114E6C41A6" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/shanranne/myCVE/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.310664", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.310664", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587382", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/shanranne/myCVE/issues/4", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json index 5fc31543679..2e0b9e34fb4 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5419", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-03T00:15:21.043", - "lastModified": "2025-06-03T14:15:50.600", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5482.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5482.json index 389979a94fb..76c15ec07fc 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5482.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5482.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5482", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-04T08:15:22.613", - "lastModified": "2025-06-04T08:15:22.613", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sunshine Photo Cart: Free Client Photo Galleries for Photographers plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.4.11. This is due to the plugin not properly validating a user-supplied key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's passwords through the password reset functionality, including administrators, and leverage that to reset the user's password and gain access to their account." + }, + { + "lang": "es", + "value": "El complemento Sunshine Photo Cart: Free Client Photo Galleries for Photographers para WordPress es vulnerable a la escalada de privilegios mediante el robo de cuentas en todas las versiones hasta la 3.4.11 incluida. Esto se debe a que el complemento no valida correctamente la clave proporcionada por el usuario. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, cambiar las contrase\u00f1as de usuarios arbitrarios mediante la funci\u00f3n de restablecimiento de contrase\u00f1a, incluyendo administradores, y aprovechar esta situaci\u00f3n para restablecer la contrase\u00f1a del usuario y acceder a su cuenta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5492.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5492.json index 0d1675ff486..93b2c8ce4e6 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5492.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5492.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5492", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T11:15:21.023", - "lastModified": "2025-06-03T11:15:21.023", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en D-Link DI-500WF-WT hasta la versi\u00f3n 20250511, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n sub_456DE8 del archivo /msp_info.htm?flag=cmd del componente /usr/sbin/jhttpd. La manipulaci\u00f3n del argumento cmd provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json index ee1ed225dad..fd33a28e0e0 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5493", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T11:15:21.230", - "lastModified": "2025-06-03T14:15:51.033", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json index fb4c9e164f4..f547830d502 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5495.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5495", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T13:15:21.123", - "lastModified": "2025-06-03T14:15:51.170", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Netgear WNR614 1.1.0.28_1.0.1WW. It has been classified as critical. This affects an unknown part of the component URL Handler. The manipulation with the input %00currentsetting.htm leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This issue appears to have been circulating as an 0day since 2024." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Netgear WNR614 1.1.0.28_1.0.1WW. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del componente URL Handler. La manipulaci\u00f3n de la entrada %00currentsetting.htm provoca una autenticaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este problema parece haber estado circulando como un d\u00eda cero desde 2024." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json index b4c6b8955ec..764ca598cce 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5497.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5497", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T13:15:21.310", - "lastModified": "2025-06-03T15:15:59.873", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been declared as critical. This vulnerability affects unknown code of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. The manipulation of the argument cnt_text leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en slackero phpwcms hasta la versi\u00f3n 1.9.45/1.10.8. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo include/inc_module/mod_feedimport/inc/processing.inc.php del componente Feedimport Module. La manipulaci\u00f3n del argumento cnt_text provoca la deserializaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a las versiones 1.9.46 y 1.10.9 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5498.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5498.json index afd7a6a48eb..f74d1aece53 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5498.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5498.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5498", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T14:15:51.313", - "lastModified": "2025-06-03T14:15:51.313", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en slackero phpwcms hasta la versi\u00f3n 1.9.45/1.10.8. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n file_get_contents/is_file del archivo include/inc_lib/content/cnt21.readform.inc.php del componente Custom Source Tab. La manipulaci\u00f3n del argumento cpage_custom provoca la deserializaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a las versiones 1.9.46 y 1.10.9 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5499.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5499.json index 856dd41ee5d..3fdc9940138 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5499.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5499.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5499", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T14:15:51.513", - "lastModified": "2025-06-03T14:15:51.513", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in slackero phpwcms up to 1.9.45/1.10.8. Affected is the function is_file/getimagesize of the file image_resized.php. The manipulation of the argument imgfile leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en slackero phpwcms hasta la versi\u00f3n 1.9.45/1.10.8. La funci\u00f3n is_file/getimagesize del archivo image_resized.php se ve afectada. La manipulaci\u00f3n del argumento imgfile provoca la deserializaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a las versiones 1.9.46 y 1.10.9 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5501.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5501.json index 9bd9eddc89a..ec92f3ec5a1 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5501.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5501.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5501", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T14:15:51.703", - "lastModified": "2025-06-03T15:16:00.003", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Open5GS up to 2.7.3. Affected by this vulnerability is the function ngap_handle_path_switch_request_transfer of the file src/smf/ngap-handler.c of the component NGAP PathSwitchRequest Message Handler. The manipulation leads to reachable assertion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2daa44adab762c47a8cef69cc984946973a845b3. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Open5GS hasta la versi\u00f3n 2.7.3. Esta vulnerabilidad afecta la funci\u00f3n ngap_handle_path_switch_request_transfer del archivo src/smf/ngap-handler.c del componente NGAP PathSwitchRequest Message Handler. La manipulaci\u00f3n genera una aserci\u00f3n accesible. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se llama 2daa44adab762c47a8cef69cc984946973a845b3. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5502.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5502.json index b5bb19f8c7d..58bf3747e23 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5502.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5502.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5502", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T14:15:51.893", - "lastModified": "2025-06-03T15:16:00.167", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK X15 1.0.0-B20230714.1105. Affected by this issue is the function formMapReboot of the file /boafrm/formMapReboot. The manipulation of the argument deviceMacAddr leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK X15 1.0.0-B20230714.1105. Este problema afecta a la funci\u00f3n formMapReboot del archivo /boafrm/formMapReboot. La manipulaci\u00f3n del argumento deviceMacAddr provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5503.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5503.json index 4547987171e..c76679069c0 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5503.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5503.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5503", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T15:16:00.350", - "lastModified": "2025-06-03T15:16:00.350", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0.0-B20230714.1105. This affects the function formMapReboot of the file /boafrm/formMapReboot. The manipulation of the argument deviceMacAddr leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK X15 1.0.0-B20230714.1105. Esta afecta a la funci\u00f3n formMapReboot del archivo /boafrm/formMapReboot. La manipulaci\u00f3n del argumento deviceMacAddr provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5504.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5504.json index 672a9d913fb..876c215ce33 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5504.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5504.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5504", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T15:16:00.533", - "lastModified": "2025-06-03T15:16:00.533", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in TOTOLINK X2000R 1.0.0-B20230726.1108 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWsc. The manipulation of the argument peerRptPin leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en TOTOLINK X2000R 1.0.0-B20230726.1108, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /boafrm/formWsc. La manipulaci\u00f3n del argumento peerRptPin provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5505.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5505.json index fff00dbbe5e..b10e6864c81 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5505.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5505.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5505", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T15:16:00.717", - "lastModified": "2025-06-03T15:16:00.717", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011 and classified as problematic. This issue affects some unknown processing of the file /boafrm/formPortFw of the component Virtual Server Page. The manipulation of the argument service_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK A3002RU 2.1.1-B20230720.1011 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /boafrm/formPortFw del componente Virtual Server Page. La manipulaci\u00f3n del argumento service_type provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5506.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5506.json index 7fcb1cd47f8..a049eb8b1f4 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5506.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5506.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5506", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T15:16:00.897", - "lastModified": "2025-06-03T15:16:00.897", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been classified as problematic. Affected is an unknown function of the component NAT Mapping Page. The manipulation of the argument Comment leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK A3002RU 2.1.1-B20230720.1011. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del componente NAT Mapping Page. La manipulaci\u00f3n del argumento \"Comment\" provoca ataques de Cross-Site Scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5507.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5507.json index 2de909f119a..0e7847c72b8 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5507.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5507.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5507", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T16:15:26.423", - "lastModified": "2025-06-03T16:15:26.423", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component MAC Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK A3002RU 2.1.1-B20230720.1011. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente MAC Filtering Page. La manipulaci\u00f3n del argumento \"Comment\" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5508.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5508.json index f6e29ffcac8..900ef1ddc58 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5508.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5508.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5508", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T16:15:26.627", - "lastModified": "2025-06-03T18:15:26.150", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been rated as problematic. Affected by this issue is some unknown functionality of the component IP Port Filtering Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK A3002RU 2.1.1-B20230720.1011. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del componente IP Port Filtering Page. La manipulaci\u00f3n del argumento \"Comment\" provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json index 7a5f6d9749d..6b39fee036d 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5509", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T16:15:26.803", - "lastModified": "2025-06-03T18:15:26.280", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in quequnlong shiyi-blog up to 1.2.1. This affects an unknown part of the file /api/file/upload. The manipulation of the argument file/source leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en quequnlong shiyi-blog hasta la versi\u00f3n 1.2.1. Esta afecta a una parte desconocida del archivo /api/file/upload. La manipulaci\u00f3n del argumento file/source provoca un path traversal. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json index 7854e905bf6..bcf0ad2a41a 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5510", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T17:15:22.057", - "lastModified": "2025-06-03T18:15:26.413", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in quequnlong shiyi-blog up to 1.2.1. This vulnerability affects unknown code of the file /app/sys/article/optimize. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en quequnlong shiyi-blog hasta la versi\u00f3n 1.2.1. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /app/sys/article/optimize. La manipulaci\u00f3n del argumento URL provoca server-side request forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5511.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5511.json index a5a58130637..3a17598ff1d 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5511.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5511.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5511", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T17:15:22.283", - "lastModified": "2025-06-03T17:15:22.283", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in quequnlong shiyi-blog up to 1.2.1. This issue affects some unknown processing of the file /dev api/app/album/photos/. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en quequnlong shiyi-blog hasta la versi\u00f3n 1.2.1. Este problema afecta a un procesamiento desconocido del archivo /dev api/app/album/photos/. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5512.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5512.json index 0423a465ae7..8ac1e3ed3ca 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5512.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5512.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5512", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T17:15:22.513", - "lastModified": "2025-06-03T17:15:22.513", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in quequnlong shiyi-blog up to 1.2.1. Affected is an unknown function of the file /api/sys/user/verifyPassword/ of the component Administrator Backend. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en quequnlong shiyi-blog hasta la versi\u00f3n 1.2.1. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /api/sys/user/verifyPassword/ del componente Administrator Backend. La manipulaci\u00f3n provoca una autenticaci\u00f3n incorrecta. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5513.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5513.json index d778d5133f2..710fa3b6634 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5513.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5513.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5513", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T18:15:26.673", - "lastModified": "2025-06-03T18:15:26.673", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in quequnlong shiyi-blog up to 1.2.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/api/comment/add. The manipulation of the argument content leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en quequnlong shiyi-blog hasta la versi\u00f3n 1.2.1, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /dev-api/api/comment/add. La manipulaci\u00f3n del contenido del argumento provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5515.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5515.json index 747ff3d29fb..7d3a69b5048 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5515.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5515.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5515", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T18:15:26.870", - "lastModified": "2025-06-03T18:15:26.870", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK X2000R 1.0.0-B20230726.1108. Affected by this issue is some unknown functionality of the file /boafrm/formMapDel. The manipulation of the argument devicemac1 leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK X2000R 1.0.0-B20230726.1108. Este problema afecta a una funcionalidad desconocida del archivo /boafrm/formMapDel. La manipulaci\u00f3n del argumento devicemac1 provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5516.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5516.json index 5eb78062086..bf9635cf580 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5516.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5516.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5516", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T18:15:27.067", - "lastModified": "2025-06-03T19:15:39.880", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in TOTOLINK X2000R 1.0.0-B20230726.1108. This affects an unknown part of the file /boafrm/formFilter of the component URL Filtering Page. The manipulation of the argument URL Address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en TOTOLINK X2000R 1.0.0-B20230726.1108. Esta afecta a una parte desconocida del archivo /boafrm/formFilter del componente URL Filtering Page. La manipulaci\u00f3n del argumento URL Address provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json index f64cb6a3484..b1203829758 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5520", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T18:15:27.257", - "lastModified": "2025-06-03T19:15:40.000", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open5GS up to 2.7.3. It has been classified as problematic. Affected is the function gmm_state_authentication/emm_state_authentication of the component AMF/MME. The manipulation leads to reachable assertion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 9f5d133657850e6167231527514ee1364d37a884. It is recommended to apply a patch to fix this issue. This is a different issue than CVE-2025-1893." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Open5GS hasta la versi\u00f3n 2.7.3. Se ha clasificado como problem\u00e1tica. La funci\u00f3n gmm_state_authentication/emm_state_authentication del componente AMF/MME est\u00e1 afectada. La manipulaci\u00f3n genera una aserci\u00f3n accesible. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se llama 9f5d133657850e6167231527514ee1364d37a884. Se recomienda aplicar un parche para solucionar este problema. Este problema es diferente al de CVE-2025-1893." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json index b59cf3a6402..1fede239e03 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5521", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T19:15:40.113", - "lastModified": "2025-06-03T20:15:22.263", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in WuKongOpenSource WukongCRM 9.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /system/user/updataPassword. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en WuKongOpenSource WukongCRM 9.0. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /system/user/updataPassword. La manipulaci\u00f3n provoca cross-site request forgery. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5522.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5522.json index 9350dec30c0..f986dad1960 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5522.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5522.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5522", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T19:15:40.283", - "lastModified": "2025-06-03T19:15:40.283", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in jack0240 \u9b4f bskms \u84dd\u5929\u5e7c\u513f\u56ed\u7ba1\u7406\u7cfb\u7edf up to dffe6640b5b54d8e29da6f060e0493fea74b3fad. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sa/addUser of the component User Creation Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en jack0240 ? bskms ????????? hasta dffe6640b5b54d8e29da6f060e0493fea74b3fad. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /sa/addUser del componente User Creation Handler. La manipulaci\u00f3n provoca una autorizaci\u00f3n indebida. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json index 9d78b5b9d95..46d72a83aa6 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5523", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T20:15:22.387", - "lastModified": "2025-06-03T21:15:23.223", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in enilu web-flash 1.0. This affects the function fileService.upload of the file src/main/java/cn/enilu/flash/api/controller/FileController/upload of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en enilu web-flash 1.0. Esta afecta a la funci\u00f3n fileService.upload del archivo src/main/java/cn/enilu/flash/api/controller/FileController/upload del componente File Upload. La manipulaci\u00f3n del argumento File provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5525.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5525.json index fae1160af65..a8fffe1b5a9 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5525.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5525.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5525", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T20:15:22.563", - "lastModified": "2025-06-03T21:15:23.360", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Jrohy trojan up to 2.15.3. It has been declared as critical. This vulnerability affects the function LogChan of the file trojan/util/linux.go. The manipulation of the argument c leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Jrohy trojan hasta la versi\u00f3n 2.15.3. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta la funci\u00f3n LogChan del archivo trojan/util/linux.go. La manipulaci\u00f3n del argumento c provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json index 1a52fa1fbe0..354c5c3fc75 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5527", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T21:15:23.483", - "lastModified": "2025-06-03T21:15:23.483", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda RX3 16.03.13.11_multi_TDE01. It has been rated as critical. This issue affects the function save_staticroute_data of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda RX3 16.03.13.11_multi_TDE01. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n save_staticroute_data del archivo /goform/SetStaticRouteCfg. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.tenda.com.cn/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/alc9700jmo/CVE/issues/13", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5531.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5531.json index 90a6221012e..ca268de0575 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5531.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5531.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5531", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-04T04:15:54.140", - "lastModified": "2025-06-04T04:15:54.140", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Employee Directory \u2013 Staff Listing & Team Directory Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'emd_mb_meta' shortcode in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Employee Directory \u2013 Staff Listing & Team Directory Plugin for WordPress para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'emd_mb_meta' del plugin en todas las versiones hasta la 4.5.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5532.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5532.json index 7f908355849..a35181a5c1d 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5532.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5532.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5532", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-04T04:15:59.263", - "lastModified": "2025-06-04T04:15:59.263", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Campus Directory \u2013 Faculty, Staff & Student Directory Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'emd_mb_meta' shortcode in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Campus Directory \u2013 Faculty, Staff & Student Directory Plugin for WordPress para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'emd_mb_meta' del complemento en todas las versiones hasta la 1.9.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5539.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5539.json index ba7542956ef..fcc9303d9e5 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5539.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5539.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5539", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-04T05:15:24.733", - "lastModified": "2025-06-04T05:15:24.733", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple Contact Form Plugin for WordPress \u2013 WP Easy Contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'emd_mb_meta' shortcode in all versions up to, and including, 4.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Simple Contact Form Plugin for WordPress \u2013 WP Easy Contact para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'emd_mb_meta' en todas las versiones hasta la 4.0.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5542.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5542.json index 45447599345..6ef11b8c680 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5542.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5542.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5542", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T22:15:21.807", - "lastModified": "2025-06-03T22:15:21.807", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK X2000R 1.0.0-B20230726.1108. It has been classified as problematic. Affected is an unknown function of the file /boafrm/formPortFw of the component Virtual Server Page. The manipulation of the argument service_type leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK X2000R 1.0.0-B20230726.1108. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /boafrm/formPortFw del componente Virtual Server Page. La manipulaci\u00f3n del argumento service_type provoca ataques de cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_Virtual_Server", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5543.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5543.json index f9dfa3956d2..4d195b52f51 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5543.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5543.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5543", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T23:15:20.953", - "lastModified": "2025-06-03T23:15:20.953", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK X2000R 1.0.0-B20230726.1108. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Parent Controls Page. The manipulation of the argument Device Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK X2000R 1.0.0-B20230726.1108. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente Parent Controls Page. La manipulaci\u00f3n del argumento \"Device Name\" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/X2000R/XSS_parent_control", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5544.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5544.json index e679aa7c679..52178c5bd97 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5544.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5544.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5544", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T23:15:21.147", - "lastModified": "2025-06-03T23:15:21.147", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in aaluoxiang oa_system up to 5b445a6227b51cee287bd0c7c33ed94b801a82a5. It has been rated as problematic. Affected by this issue is the function image of the file src/main/java/cn/gson/oasys/controller/user/UserpanelController.java. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en aaluoxiang oa_system hasta 5b445a6227b51cee287bd0c7c33ed94b801a82a5. Se ha clasificado como problem\u00e1tica. Este problema afecta a la imagen de funci\u00f3n del archivo src/main/java/cn/gson/oasys/controller/user/UserpanelController.java. La manipulaci\u00f3n provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json index 0e6f7ec9ea0..41e17738a98 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5545", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T00:15:25.333", - "lastModified": "2025-06-04T00:15:25.333", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in aaluoxiang oa_system up to 5b445a6227b51cee287bd0c7c33ed94b801a82a5. This affects the function image of the file src/main/java/cn/gson/oasys/controller/process/ProcedureController.java. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en aaluoxiang oa_system hasta 5b445a6227b51cee287bd0c7c33ed94b801a82a5. Esta vulnerabilidad afecta la imagen funcional del archivo src/main/java/cn/gson/oasys/controller/process/ProcedureController.java. La manipulaci\u00f3n provoca un path traversal. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no se dispone de informaci\u00f3n sobre las versiones afectadas y no afectadas." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.585885", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/honorseclab/vulns/blob/main/aaluoxiang_oasystem/ArbitaryFileRead02.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json index da9e564d2cd..4fefee04520 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5546", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T00:15:25.540", - "lastModified": "2025-06-04T00:15:25.540", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Daily Expense Tracker System 1.1. This vulnerability affects unknown code of the file /expense-reports-detailed.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Daily Expense Tracker System 1.1. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /expense-reports-detailed.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5547.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5547.json index c283e6b51b5..ff3f3693cfb 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5547.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5547.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5547", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T00:15:25.713", - "lastModified": "2025-06-04T00:15:25.713", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. This issue affects some unknown processing of the component CDUP Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en FreeFloat FTP Server 1.0. Este problema afecta a un procesamiento desconocido del componente CDUP Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5548.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5548.json index 03575c8863a..a4f68a31698 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5548.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5548.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5548", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T01:15:19.873", - "lastModified": "2025-06-04T01:15:19.873", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. Affected is an unknown function of the component NOOP Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en FreeFloat FTP Server 1.0. Se ve afectada una funci\u00f3n desconocida del componente NOOP Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5549.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5549.json index 8925fbf5073..362c4770bf0 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5549.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5549.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5549", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T01:15:20.083", - "lastModified": "2025-06-04T01:15:20.083", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in FreeFloat FTP Server 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component PASV Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en FreeFloat FTP Server 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente PASV Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5550.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5550.json index 4e9d43572af..0e89bceb97f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5550.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5550.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5550", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T01:15:20.250", - "lastModified": "2025-06-04T01:15:20.250", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0 and classified as critical. Affected by this issue is some unknown functionality of the component PBSZ Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del componente PBSZ Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5551.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5551.json index cf0a03ccf36..f772f8a9756 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5551.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5551.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5551", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T02:15:21.580", - "lastModified": "2025-06-04T02:15:21.580", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. This affects an unknown part of the component SYSTEM Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del componente SYSTEM Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5552.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5552.json index 93c5c0a919a..cb55167c8aa 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5552.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5552.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5552", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T03:15:27.317", - "lastModified": "2025-06-04T03:15:27.317", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ChestnutCMS up to 15.1. It has been declared as critical. This vulnerability affects unknown code of the file /dev-api/groovy/exec of the component API Endpoint. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en ChestnutCMS hasta la versi\u00f3n 15.1. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /dev-api/groovy/exec del componente API Endpoint. La manipulaci\u00f3n provoca la deserializaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json index 353e9ba5ca0..87123526571 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5553", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T03:15:27.517", - "lastModified": "2025-06-04T03:15:27.517", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /download-pass.php. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en PHPGurukul Rail Pass Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /download-pass.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json index d7ce55de4b8..b83ae43a437 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5554", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T03:15:27.693", - "lastModified": "2025-06-04T03:15:27.693", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Rail Pass Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/pass-bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Rail Pass Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /admin/pass-bwdates-reports-details.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json index 54ae516d172..acfd292b12f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5556", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:15:59.447", - "lastModified": "2025-06-04T04:15:59.447", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Teacher Subject Allocation Management System 1.0. This affects an unknown part of the file /admin/edit-teacher-info.php. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Teacher Subject Allocation Management System 1.0. Esta afecta a una parte desconocida del archivo /admin/edit-teacher-info.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json index fcb1971bd1b..026571940c4 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5557", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:16:00.370", - "lastModified": "2025-06-04T04:16:00.370", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Teacher Subject Allocation Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-course.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Teacher Subject Allocation Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/edit-course.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json index 16d6033b3cb..5953544b485 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5558", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:16:01.790", - "lastModified": "2025-06-04T04:16:01.790", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Teacher Subject Allocation Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/changeimage.php. The manipulation of the argument editid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Teacher Subject Allocation Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/changeimage.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json index 855f141498a..69ad09d444f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5560", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:16:03.063", - "lastModified": "2025-06-04T04:16:03.063", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /index.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Curfew e-Pass Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /index.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json index be52b478f4c..29915262ef8 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5561", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T05:15:24.883", - "lastModified": "2025-06-04T05:15:24.883", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/view-pass-detail.php. The manipulation of the argument viewid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Curfew e-Pass Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/view-pass-detail.php. La manipulaci\u00f3n del argumento viewid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json index 1d29c28589b..09e0b919cbc 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5562", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T05:15:25.070", - "lastModified": "2025-06-04T05:15:25.070", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/edit-category-detail.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Curfew e-Pass Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/edit-category-detail.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json index 8cf6475c95e..8ae08e8ad5c 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5566", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T05:15:25.247", - "lastModified": "2025-06-04T05:15:25.247", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Notice Board System 1.0. This affects an unknown part of the file /search-notice.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Notice Board System 1.0. Esta afecta a una parte desconocida del archivo /search-notice.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5569.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5569.json index 7bff0a11bfb..f1c00fe2975 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5569.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5569.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5569", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T06:15:21.937", - "lastModified": "2025-06-04T06:15:21.937", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IdeaCMS up to 1.7 and classified as critical. This issue affects the function Article/Goods of the file /api/v1.index.article/getList.html. The manipulation of the argument Field leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.8 is able to address this issue. The patch is named 935aceb4c21338633de6d41e13332f7b9db4fa6a. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad en IdeaCMS hasta la versi\u00f3n 1.7, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n \"Article/Goods\" del archivo /api/v1.index.article/getList.html. La manipulaci\u00f3n del argumento \"Field\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Actualizar a la versi\u00f3n 1.8 puede solucionar este problema. El parche se llama 935aceb4c21338633de6d41e13332f7b9db4fa6a. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5571.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5571.json index 31b21f4ab33..af7f39b2ebe 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5571.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5571.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5571", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T06:15:22.190", - "lastModified": "2025-06-04T06:15:22.190", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as critical. Affected is the function setSystemAdmin of the file /setSystemAdmin. The manipulation of the argument AdminID leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DCS-932L 2.18.01. Se ha clasificado como cr\u00edtica. La funci\u00f3n setSystemAdmin del archivo /setSystemAdmin est\u00e1 afectada. La manipulaci\u00f3n del argumento AdminID provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5572.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5572.json index d877b11bcfc..ec34e3580f3 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5572.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5572.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5572", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T06:15:22.437", - "lastModified": "2025-06-04T06:15:22.437", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DCS-932L 2.18.01. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setSystemEmail del archivo /setSystemEmail. La manipulaci\u00f3n del argumento EmailSMTPPortNumber provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_43/43.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5573.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5573.json index e0cde0966e5..a75f1ba8442 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5573.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5573.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5573", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T06:15:22.677", - "lastModified": "2025-06-04T06:15:22.677", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DCS-932L 2.18.01. It has been rated as critical. Affected by this issue is the function setSystemWizard/setSystemControl of the file /setSystemWizard. The manipulation of the argument AdminID leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DCS-932L 2.18.01. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n setSystemWizard/setSystemControl del archivo /setSystemWizard. La manipulaci\u00f3n del argumento AdminID provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_44/44.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json index fdbd0ce060e..68e89d8e729 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5574", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T07:15:23.060", - "lastModified": "2025-06-04T07:15:23.060", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Dairy Farm Shop Management System 1.3. This affects an unknown part of the file /add-company.php. The manipulation of the argument companyname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Dairy Farm Shop Management System 1.3. Esta afecta a una parte desconocida del archivo /add-company.php. La manipulaci\u00f3n del argumento \"companyname\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5575.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5575.json index 23edce1c866..78a800bd270 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5575.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5575.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5575", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T07:15:23.533", - "lastModified": "2025-06-04T07:15:23.533", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Dairy Farm Shop Management System 1.3. This vulnerability affects unknown code of the file /add-product.php. The manipulation of the argument productname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Dairy Farm Shop Management System 1.3. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /add-product.php. La manipulaci\u00f3n del argumento \"productname\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588785", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/FLYFISH567/CVE/issues/10", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5576.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5576.json index c222076ae00..b088dc1944d 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5576.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5576.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5576", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T08:15:22.810", - "lastModified": "2025-06-04T08:15:22.810", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Dairy Farm Shop Management System 1.3. This issue affects some unknown processing of the file /bwdate-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Dairy Farm Shop Management System 1.3. Este problema afecta a un procesamiento desconocido del archivo /bwdate-report-details.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588789", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/FLYFISH567/CVE/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5577.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5577.json index b9d5dd16a90..f2bbb576fca 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5577.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5577.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5577", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T08:15:22.997", - "lastModified": "2025-06-04T08:15:22.997", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Dairy Farm Shop Management System 1.3. Affected is an unknown function of the file /profile.php. The manipulation of the argument mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Dairy Farm Shop Management System 1.3. La funci\u00f3n afectada es desconocida en el archivo /profile.php. La manipulaci\u00f3n del argumento \"mobilenumber\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588799", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/FLYFISH567/CVE/issues/12", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5578.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5578.json index af76faec8b8..de8e664b5f9 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5578.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5578.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5578", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T08:15:23.177", - "lastModified": "2025-06-04T08:15:23.177", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sales-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en PHPGurukul Dairy Farm Shop Management System 1.3, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /sales-report-details.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588800", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/FLYFISH567/CVE/issues/13", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5579.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5579.json index ccd48050f01..e7eece25e2f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5579.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5579.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5579", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T08:15:23.360", - "lastModified": "2025-06-04T08:15:23.360", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this issue is some unknown functionality of the file /search-product.php. The manipulation of the argument productname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Dairy Farm Shop Management System 1.3, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /search-product.php. La manipulaci\u00f3n del argumento \"productname\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588804", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/FLYFISH567/CVE/issues/14", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5580.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5580.json index 3c193072b9b..b35de156c88 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5580.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5580.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5580", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T09:15:20.800", - "lastModified": "2025-06-04T09:15:20.800", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CodeAstro Real Estate Management System 1.0. It has been classified as critical. This affects an unknown part of the file /login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en CodeAstro Real Estate Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /login.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588811", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_login.php.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5581.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5581.json index 3d956eff78e..58604cced4e 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5581.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5581.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5581", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T09:15:21.010", - "lastModified": "2025-06-04T09:15:21.010", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CodeAstro Real Estate Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument User leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en CodeAstro Real Estate Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/index.php. La manipulaci\u00f3n del argumento \"User\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588820", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_admin_index.php.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5582.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5582.json index 445ff84a1fd..4fe7ffd7e7a 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5582.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5582.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5582", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T09:15:21.227", - "lastModified": "2025-06-04T09:15:21.227", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CodeAstro Real Estate Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /profile.php. The manipulation of the argument content leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en CodeAstro Real Estate Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /profile.php. La manipulaci\u00f3n del argumento \"content\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588821", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_profile.php.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5583.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5583.json index 04d3eee01ac..080543c3040 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5583.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5583.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5583", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T10:15:21.640", - "lastModified": "2025-06-04T10:15:21.640", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /register.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en CodeAstro Real Estate Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /register.php. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.588822", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_register.php.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json index 4c4d3899cb5..20ba39e3c10 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5584", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T10:15:21.870", - "lastModified": "2025-06-04T10:15:21.870", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been classified as problematic. Affected is an unknown function of the file /doctor/edit-patient.php?editid=2 of the component POST Parameter Handler. The manipulation of the argument patname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Hospital Management System 4.0. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /doctor/edit-patient.php?editid=2 del componente POST Parameter Handler. La manipulaci\u00f3n del argumento \"patname\" provoca ataques de cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5592.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5592.json new file mode 100644 index 00000000000..b6efd78ffc4 --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5592.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5592", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-04T14:15:35.280", + "lastModified": "2025-06-04T15:15:24.060", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component PASSIVE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-d28993dd71bcf3fbc63ff58db41e5f10a3ff7932e72d9e25c556cf18921a98e3.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311078", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311078", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586990", + "source": "cna@vuldb.com" + }, + { + "url": "https://fitoxs.com/exploit/exploit-d28993dd71bcf3fbc63ff58db41e5f10a3ff7932e72d9e25c556cf18921a98e3.txt", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json index 6ed5047ca90..22c5cfe918e 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5597", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2025-06-04T12:15:21.017", - "lastModified": "2025-06-04T12:15:21.017", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json index a5d1ae53cef..fce71cdb06a 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5598", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2025-06-04T12:15:21.173", - "lastModified": "2025-06-04T12:15:21.173", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5601.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5601.json index d6dd3878bb1..e057c4e6ad1 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5601.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5601.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5601", "sourceIdentifier": "cve@gitlab.com", "published": "2025-06-04T11:15:22.110", - "lastModified": "2025-06-04T11:15:22.110", - "vulnStatus": "Received", + "lastModified": "2025-06-04T14:54:33.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 75702b7426d..d91bab46e2c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-04T14:00:19.819305+00:00 +2025-06-04T16:00:19.902810+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-04T13:15:28.633000+00:00 +2025-06-04T15:59:26.683000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296453 +296462 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `9` -- [CVE-2025-30415](CVE-2025/CVE-2025-304xx/CVE-2025-30415.json) (`2025-06-04T12:15:20.703`) -- [CVE-2025-48959](CVE-2025/CVE-2025-489xx/CVE-2025-48959.json) (`2025-06-04T12:15:20.880`) -- [CVE-2025-5597](CVE-2025/CVE-2025-55xx/CVE-2025-5597.json) (`2025-06-04T12:15:21.017`) -- [CVE-2025-5598](CVE-2025/CVE-2025-55xx/CVE-2025-5598.json) (`2025-06-04T12:15:21.173`) +- [CVE-2025-1701](CVE-2025/CVE-2025-17xx/CVE-2025-1701.json) (`2025-06-04T14:15:27.050`) +- [CVE-2025-23095](CVE-2025/CVE-2025-230xx/CVE-2025-23095.json) (`2025-06-04T15:15:23.760`) +- [CVE-2025-23096](CVE-2025/CVE-2025-230xx/CVE-2025-23096.json) (`2025-06-04T15:15:23.860`) +- [CVE-2025-23101](CVE-2025/CVE-2025-231xx/CVE-2025-23101.json) (`2025-06-04T15:15:23.960`) +- [CVE-2025-27811](CVE-2025/CVE-2025-278xx/CVE-2025-27811.json) (`2025-06-04T14:15:28.260`) +- [CVE-2025-48960](CVE-2025/CVE-2025-489xx/CVE-2025-48960.json) (`2025-06-04T14:15:29.680`) +- [CVE-2025-48961](CVE-2025/CVE-2025-489xx/CVE-2025-48961.json) (`2025-06-04T14:15:29.833`) +- [CVE-2025-48962](CVE-2025/CVE-2025-489xx/CVE-2025-48962.json) (`2025-06-04T14:15:29.983`) +- [CVE-2025-5592](CVE-2025/CVE-2025-55xx/CVE-2025-5592.json) (`2025-06-04T14:15:35.280`) ### CVEs modified in the last Commit -Recently modified CVEs: `35` +Recently modified CVEs: `259` -- [CVE-2024-56758](CVE-2024/CVE-2024-567xx/CVE-2024-56758.json) (`2025-06-04T13:15:25.613`) -- [CVE-2025-21816](CVE-2025/CVE-2025-218xx/CVE-2025-21816.json) (`2025-06-04T13:15:25.773`) -- [CVE-2025-37819](CVE-2025/CVE-2025-378xx/CVE-2025-37819.json) (`2025-06-04T13:15:26.007`) -- [CVE-2025-37890](CVE-2025/CVE-2025-378xx/CVE-2025-37890.json) (`2025-06-04T13:15:26.170`) -- [CVE-2025-37909](CVE-2025/CVE-2025-379xx/CVE-2025-37909.json) (`2025-06-04T13:15:26.290`) -- [CVE-2025-37913](CVE-2025/CVE-2025-379xx/CVE-2025-37913.json) (`2025-06-04T13:15:26.490`) -- [CVE-2025-37914](CVE-2025/CVE-2025-379xx/CVE-2025-37914.json) (`2025-06-04T13:15:26.610`) -- [CVE-2025-37915](CVE-2025/CVE-2025-379xx/CVE-2025-37915.json) (`2025-06-04T13:15:26.730`) -- [CVE-2025-37923](CVE-2025/CVE-2025-379xx/CVE-2025-37923.json) (`2025-06-04T13:15:26.850`) -- [CVE-2025-37927](CVE-2025/CVE-2025-379xx/CVE-2025-37927.json) (`2025-06-04T13:15:26.970`) -- [CVE-2025-37930](CVE-2025/CVE-2025-379xx/CVE-2025-37930.json) (`2025-06-04T13:15:27.087`) -- [CVE-2025-37932](CVE-2025/CVE-2025-379xx/CVE-2025-37932.json) (`2025-06-04T13:15:27.210`) -- [CVE-2025-37949](CVE-2025/CVE-2025-379xx/CVE-2025-37949.json) (`2025-06-04T13:15:27.320`) -- [CVE-2025-37953](CVE-2025/CVE-2025-379xx/CVE-2025-37953.json) (`2025-06-04T13:15:27.437`) -- [CVE-2025-37969](CVE-2025/CVE-2025-379xx/CVE-2025-37969.json) (`2025-06-04T13:15:27.550`) -- [CVE-2025-37970](CVE-2025/CVE-2025-379xx/CVE-2025-37970.json) (`2025-06-04T13:15:27.677`) -- [CVE-2025-37987](CVE-2025/CVE-2025-379xx/CVE-2025-37987.json) (`2025-06-04T13:15:27.810`) -- [CVE-2025-37990](CVE-2025/CVE-2025-379xx/CVE-2025-37990.json) (`2025-06-04T13:15:27.940`) -- [CVE-2025-37991](CVE-2025/CVE-2025-379xx/CVE-2025-37991.json) (`2025-06-04T13:15:28.053`) -- [CVE-2025-37992](CVE-2025/CVE-2025-379xx/CVE-2025-37992.json) (`2025-06-04T13:15:28.170`) -- [CVE-2025-37994](CVE-2025/CVE-2025-379xx/CVE-2025-37994.json) (`2025-06-04T13:15:28.283`) -- [CVE-2025-37995](CVE-2025/CVE-2025-379xx/CVE-2025-37995.json) (`2025-06-04T13:15:28.403`) -- [CVE-2025-37997](CVE-2025/CVE-2025-379xx/CVE-2025-37997.json) (`2025-06-04T13:15:28.513`) -- [CVE-2025-37998](CVE-2025/CVE-2025-379xx/CVE-2025-37998.json) (`2025-06-04T13:15:28.633`) -- [CVE-2025-5601](CVE-2025/CVE-2025-56xx/CVE-2025-5601.json) (`2025-06-04T11:15:22.110`) +- [CVE-2025-5556](CVE-2025/CVE-2025-55xx/CVE-2025-5556.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5557](CVE-2025/CVE-2025-55xx/CVE-2025-5557.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5558](CVE-2025/CVE-2025-55xx/CVE-2025-5558.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5560](CVE-2025/CVE-2025-55xx/CVE-2025-5560.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5561](CVE-2025/CVE-2025-55xx/CVE-2025-5561.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5562](CVE-2025/CVE-2025-55xx/CVE-2025-5562.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5566](CVE-2025/CVE-2025-55xx/CVE-2025-5566.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5569](CVE-2025/CVE-2025-55xx/CVE-2025-5569.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5571](CVE-2025/CVE-2025-55xx/CVE-2025-5571.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5572](CVE-2025/CVE-2025-55xx/CVE-2025-5572.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5573](CVE-2025/CVE-2025-55xx/CVE-2025-5573.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5574](CVE-2025/CVE-2025-55xx/CVE-2025-5574.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5575](CVE-2025/CVE-2025-55xx/CVE-2025-5575.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5576](CVE-2025/CVE-2025-55xx/CVE-2025-5576.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5577](CVE-2025/CVE-2025-55xx/CVE-2025-5577.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5578](CVE-2025/CVE-2025-55xx/CVE-2025-5578.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5579](CVE-2025/CVE-2025-55xx/CVE-2025-5579.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5580](CVE-2025/CVE-2025-55xx/CVE-2025-5580.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5581](CVE-2025/CVE-2025-55xx/CVE-2025-5581.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5582](CVE-2025/CVE-2025-55xx/CVE-2025-5582.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5583](CVE-2025/CVE-2025-55xx/CVE-2025-5583.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5584](CVE-2025/CVE-2025-55xx/CVE-2025-5584.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5597](CVE-2025/CVE-2025-55xx/CVE-2025-5597.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5598](CVE-2025/CVE-2025-55xx/CVE-2025-5598.json) (`2025-06-04T14:54:33.783`) +- [CVE-2025-5601](CVE-2025/CVE-2025-56xx/CVE-2025-5601.json) (`2025-06-04T14:54:33.783`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 437a9c7fc3a..d0b3ba6e509 100644 --- a/_state.csv +++ b/_state.csv @@ -121454,7 +121454,7 @@ CVE-2018-25108,0,0,b20ffbb6cbdeced293a2d0d5632cf118c9bcd4427f34608769eddf9c049b9 CVE-2018-25109,0,0,78a6fcfa9783d17890c8ccdbf5bd43dceffab865f734cb93193e2f03c25430f9,2025-03-23T23:15:13.060000 CVE-2018-25110,0,0,abecf77d0fbcf00bec56ae07fcdaac59d13802e5d641bed90dfb73d9379f33a8,2025-05-23T15:54:42.643000 CVE-2018-25111,0,0,d1d17366475e485173a544457112923af9883e4ce6e5838607a959f5a4b802a1,2025-06-02T17:32:17.397000 -CVE-2018-25112,0,0,93ad48b186c456e0fd81f82a9c15fc00180f9fe62522f679230025a22ce63ee3,2025-06-04T10:15:20.380000 +CVE-2018-25112,0,1,954f7a367dec1fbbe0a0e8ae5051683ca4d26796a396cf4c400a9183f2d08361,2025-06-04T14:54:33.783000 CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,64c0ce8dd86b8cd41f028fc0faeb4c2703b3a3d6c99b5cfb7e065de6e8a10aab,2024-11-21T04:03:56.060000 CVE-2018-2561,0,0,03752647d2e63906688e002ddaaa7e85aba13094709fdf81fa6e8215efd59a07,2024-11-21T04:03:56.197000 @@ -159423,7 +159423,7 @@ CVE-2020-3660,0,0,f65f30dd9b36bd64cab206a19ad861ad05cfa663f246ece301397a644ee57b CVE-2020-36600,0,0,83ceb21f36f56fa559f903a0a999228bf03f7fd32fc4f17c94470dd6bb0c13e1,2024-11-21T05:29:51.883000 CVE-2020-36601,0,0,88cea7332e1faf8c4bc9c050ea51af397e9bee58f7f5ed0165c70fe2a1030df8,2024-11-21T05:29:52.060000 CVE-2020-36602,0,0,c560bbd66e0047ffc8e693627b008e850ec3aebe725e18bc9b530eb72f7ab6a5,2025-05-28T16:15:21.060000 -CVE-2020-36603,0,0,ef759b60f3e9cccedda1cacfccc16de0b5c24ff90197dae3061f9f759af86e0a,2024-11-21T05:29:52.383000 +CVE-2020-36603,0,1,32ef2be5b181f14ac358349aa20d1d3429deea717cf8576b2f50c47b96af188a,2025-06-04T15:15:21.917000 CVE-2020-36604,0,0,22e21b5b01febfa747d5231e782ebc9f7e1475e86d0af5c890b4978ececbbb73,2025-05-27T15:15:23.940000 CVE-2020-36605,0,0,f8da529d94511c5f227aba38a1671444973e1386cf0aca8dea0c6426d5671126,2024-11-21T05:29:52.817000 CVE-2020-36607,0,0,4150d954d3dfe85f786ac5ac7cce291189d460c0103e078ecde4c9b43d864a3c,2025-04-21T20:15:17.170000 @@ -185492,7 +185492,7 @@ CVE-2021-44215,0,0,32a9d651c52e79de650cb979fdd6111f8ed0d6ed048d0369443a137a44125 CVE-2021-44216,0,0,b5d1972bc5d76dd69bd518578a94696b1f3465e09d18705a4e5774c26e8ae957,2024-11-21T06:30:36.150000 CVE-2021-44217,0,0,50a0a3115127c658e1ae2bac4e1909ff25ef7fe9db77cdcd3362a97ef360c171,2024-11-21T06:30:36.337000 CVE-2021-44219,0,0,18ab1a3ad3d59a7fb0bfe6716f42a62e60e9301ed5568fa8a60cc30ea63778e0,2024-11-21T06:30:36.523000 -CVE-2021-4422,0,0,e2b9246ca3f45c55d434cd1c5298d2ba2c8073cb5c3fad3cf2147696098d16f4,2024-11-21T06:37:41.330000 +CVE-2021-4422,0,1,87d10fb40fc0c5be1de2ef2d22fe5deadc3645f3fa956344c230f935469593a9,2025-06-04T15:05:06.540000 CVE-2021-44221,0,0,5df66473670914d9b01d715f5d7630c873d2ce2b811aed4ab0256e238898f6ae,2024-11-21T06:30:36.687000 CVE-2021-44222,0,0,a363dfd66ac23300c7a049633b60e9b859fd75db0b090cfa3fb80bf1b51968df,2024-11-21T06:30:36.823000 CVE-2021-44223,0,0,21a131f0b5009a39ec80ae658e181c8844981d7f5bc13ebd51955f939cdcb8b3,2024-11-21T06:30:36.947000 @@ -187363,7 +187363,7 @@ CVE-2021-47033,0,0,0c47657436e397a05f9881d648a026b558b2d013a92d5e54cb5a3af71fee4 CVE-2021-47034,0,0,7934c561e4d0654a3ab7c16b5f9a37529145c575ca469687d6d9029c30b3f621,2025-04-03T16:32:59.967000 CVE-2021-47035,0,0,53047d823c2bc5a21fd15a3f65846d517f3d894eb26ec981725bfabe968e651b,2025-01-24T16:15:28.167000 CVE-2021-47036,0,0,5f024a05262de61e5ac08b9d5f719a3994f1541d12133f825b62021cb35ce987,2025-01-10T18:25:11.710000 -CVE-2021-47037,0,1,f1866aee36fb673959f61310023f3370975f2ea4da53bdcf1154f71de4abc0c2,2025-06-04T13:15:23.840000 +CVE-2021-47037,0,0,f1866aee36fb673959f61310023f3370975f2ea4da53bdcf1154f71de4abc0c2,2025-06-04T13:15:23.840000 CVE-2021-47038,0,0,173970a6c5d44bb723efd6b764e694ea73860ece1a8d9e4523c1041c196f5023,2024-12-06T20:56:10.230000 CVE-2021-47039,0,0,2043692ba0d7056630e43be01a6f62167c27f203a3c1aa6722409f5a759c38a1,2025-01-09T15:31:27.123000 CVE-2021-47040,0,0,9b576377681428ef2e044f0239ba1c5def7ee06eb8f2eff2a663a8d34c9fe0ef,2025-01-09T15:29:49.397000 @@ -191376,7 +191376,7 @@ CVE-2022-21542,0,0,40a5bcc12eabf6258801e78e6dc2d267a4fe441026d924242ff67b3e7342b CVE-2022-21543,0,0,c76ee9b7a29c0e131577bf6b9934c1cb1bf0c1670a2ed75054ba6efb261c3c24,2024-11-21T06:44:55.483000 CVE-2022-21544,0,0,11c2ecfdea00503bacbb9472730fdae5939e1310a2f31bda79dcb601f471d00c,2024-11-21T06:44:55.610000 CVE-2022-21545,0,0,20632a8e5e2d297e5dc5567814288b9e21b0351e381ffd66dae3b43622145575,2024-11-21T06:44:55.737000 -CVE-2022-21546,0,1,6b90b44755f72cdd9773fd330ba59c7729942224b1790ad9a5b211fdb4a34077,2025-06-04T13:15:24.053000 +CVE-2022-21546,0,0,6b90b44755f72cdd9773fd330ba59c7729942224b1790ad9a5b211fdb4a34077,2025-06-04T13:15:24.053000 CVE-2022-21547,0,0,7852e220889c5dd0ad167f791cca7bdf9f02c7853c53e39a323f705bd216b802,2024-11-21T06:44:55.867000 CVE-2022-21548,0,0,2a9883299b3d40c55b8600f291a673339f0f880aee096b244247faec73a7804d,2024-11-21T06:44:55.990000 CVE-2022-21549,0,0,5cad69ea91cedb7215bdf3e9009750377e2eff3f29cefe9b81dff221fa824e82,2024-11-21T06:44:56.113000 @@ -195157,7 +195157,7 @@ CVE-2022-2570,0,0,20be71367da090bfc30649d7ba55750344cb9937102b20b333a349ac860cc8 CVE-2022-25702,0,0,e70c6c56dcb17b255c97fdf7e6df4e8e77fa14a83868fab11a2a64b37db63492,2025-04-22T16:15:25.530000 CVE-2022-25705,0,0,fa291f4e56eef1c2eda0122d22313c81fdc695a91f7f3d43f9a908f431d57bd8,2024-11-21T06:52:46.037000 CVE-2022-25706,0,0,8f63e871f73d2faa2ab27c7a68ef89e6500037da8b217be4facc87ea1bf14094,2024-11-21T06:52:46.387000 -CVE-2022-25708,0,0,a680ea77bf7b53f75771f21a00edf56813368abe56981e3022d8f5a7e6821173,2024-11-21T06:52:46.613000 +CVE-2022-25708,0,1,cfbcc7e1a9392456977bb3f1eb9e6bf578bea49ea2169e1d49675e6aab7cfb5f,2025-06-04T15:15:23.067000 CVE-2022-25709,0,0,b921bdaf025358ed49a93488781c38cc89d252e6b6e4f54c974b4455b30ff9ec,2024-11-21T06:52:46.750000 CVE-2022-2571,0,0,eb0a081c57dc261a3e99487fb5fb8757e1b2860087aacb01050b450196bcdc36,2024-11-21T07:01:16.183000 CVE-2022-25710,0,0,d6ffb2fd5625658faddf1b78567937f4ad9996030cf0e4ffaa4b323bb95c2679,2025-04-22T16:15:25.843000 @@ -213463,7 +213463,7 @@ CVE-2022-4906,0,0,a823b4bbfbbc923f2df028a42581e18917821bc8c8d60008f8440a61828e4e CVE-2022-49060,0,0,acfcd7f48c8a91b814124712117cee9004f1c83060d598f839d66e50ade6f80c,2025-03-18T18:15:10.113000 CVE-2022-49061,0,0,4bbcc0bd92627f9f5cf7e74dd9b331783ad2cb997fe92c340a942f6e29983dc9,2025-03-18T18:27:09.130000 CVE-2022-49062,0,0,7acfc578836558dd590d9f3b4cd27e42e3a2e80496df397228fcff3036430bbe,2025-03-18T18:32:22.413000 -CVE-2022-49063,0,1,b37ca3b4c58f568bc54d9717c51fc1061fe69aacbb424d8c622d13f47d6a9e56,2025-06-04T13:15:24.193000 +CVE-2022-49063,0,0,b37ca3b4c58f568bc54d9717c51fc1061fe69aacbb424d8c622d13f47d6a9e56,2025-06-04T13:15:24.193000 CVE-2022-49064,0,0,7db35e2188f9d0c1f0ef7fcb7f262240667782c20fb0c4b8464d2083b4af498f,2025-02-26T07:00:43.637000 CVE-2022-49065,0,0,5368e1914309f490f08f7c26d51f1d1fc918f7cd2e401a82d81f2b925e9fb667,2025-03-18T18:45:18.623000 CVE-2022-49066,0,0,1d2ad6081ff8a9bca47b57172c754cbf231fc57b746aa17f2831fd618104a426,2025-02-26T07:00:43.820000 @@ -225233,7 +225233,7 @@ CVE-2023-30804,0,0,bf7a7059751d27a5b08fa103899e0cd6061336e24918b769511fd58e53f70 CVE-2023-30805,0,0,0fc4e845764da4caef01b2576d4dcefca7e7698881841252fb0fc85649f653cc,2024-11-21T08:00:56.330000 CVE-2023-30806,0,0,a4ac73072e86f6e1ce93c957cb7bfc0da0293b151edde0678c4a02ed18010bc5,2024-11-21T08:00:56.473000 CVE-2023-3081,0,0,1d5cd1820af8912a7372f4eb7de61662b62235bed8f61b62af3d48406596c146,2024-11-21T08:16:24.167000 -CVE-2023-3082,0,0,b52305a8ebbddfb957af77c5e26bc6b39d605433b33d9caf257f28ebe41ed307,2024-11-21T08:16:24.297000 +CVE-2023-3082,0,1,cec63fc77cb40008c839f7403ecf544b466a0e68178751d14a6b98340e566ad9,2025-06-04T15:05:06.540000 CVE-2023-3083,0,0,53ed36e42aeb98047a8fa120f07f302a1a5f134b53deaa4f4a035aadac187c06,2024-11-21T08:16:24.413000 CVE-2023-30837,0,0,98ee79ee9320ef834da864a3b3e6cfe530bc2fbc6f311c9c20ee122ec62efd52,2024-11-21T08:00:56.617000 CVE-2023-30838,0,0,f35f4bcdfed73a059d0c0a846d234ecb8a670acb43a5c376c4a66ca9a3bfd0eb,2024-11-21T08:00:56.743000 @@ -225906,7 +225906,7 @@ CVE-2023-31763,0,0,706e05d2d51a686562a1101f8bd8dcfea6102f1ec5076cccd54be2f7389c1 CVE-2023-3177,0,0,f3764f4c236d0ab0117ed89ccad93e42a68d1a0bf6301e7696daca10e17bf0f4,2024-11-21T08:16:37.877000 CVE-2023-31779,0,0,d83ed5b350578db6ddd3c21b782cc400b6e2d20a7ddec8521be0a0404c73acd9,2025-01-28T17:15:14.843000 CVE-2023-3178,0,0,9784fd7dd2a60eca14deac1f55f873d321eac0778e9fbb671c3d88cf87d784e9,2025-06-02T16:15:24.557000 -CVE-2023-3179,0,0,1232ae4c9719e6d16d77eea1af5631a06d487115eb4166670d2bcfeeb5adf5fb,2024-11-21T08:16:38.150000 +CVE-2023-3179,0,1,ccd9fa2d1c92730c774fc5e3b1493febb8f71dff18d2b0706f29d31021d49dc3,2025-06-04T15:05:06.540000 CVE-2023-31794,0,0,8ae5e5ef16681fb440aeba37cf49e46015866fac220db6443a40bb1cd627e505,2024-11-21T08:02:15.753000 CVE-2023-31799,0,0,4db6701da0110595e2c6e2f103523103fd9460e769d729e1a0d9ba1db656102c,2025-01-29T21:15:20.463000 CVE-2023-3180,0,0,d9cf9465be6dce5cfa4d1504636e21636a3f4980e15381b974a3b2c7cc836b5d,2024-11-21T08:16:38.297000 @@ -238869,7 +238869,7 @@ CVE-2023-48670,0,0,6f4cc5b5de5229c8bb05013d5edbac14ec0a884ab45e4cc6bc7bd50449d79 CVE-2023-48671,0,0,2f437585f3a00482df05947e0c48edd8a2c5aebf95af07e2736401eec5b7b38d,2024-11-21T08:32:14.137000 CVE-2023-48674,0,0,82020d6da78155232d0b3445b54af9580e2fb526b7d77a20761864eecc73b0b4,2025-01-31T15:53:27.380000 CVE-2023-48676,0,0,03742c0ead7419d73b3df7dcc9c827ea5b692840cd175c5c72c0371291d34efc,2025-05-01T15:41:34.473000 -CVE-2023-48677,0,0,ead5a312eda26efe795ee27ccff078c9b784b80cc8674ac5657800719376a13d,2025-01-31T13:15:26.723000 +CVE-2023-48677,0,1,0d2a83a45b332685759fee8771f2a31185bf116de9c6477ac7df561f3deb8afc,2025-06-04T14:15:25.697000 CVE-2023-48678,0,0,63d5f00d9e8cb17975778fa6d00bb345816168eed62c20adecda629e9f180ccd,2025-02-06T16:32:10.827000 CVE-2023-48679,0,0,81e2dcfd10196535295fb63cd5f94be90ceb52a0d37793ca09c335e4bbfac8eb,2025-02-06T16:30:48.253000 CVE-2023-4868,0,0,c2acac2bf88db4693840f7ab4da28a4cd2078c2be67ff810e629e855f632a880,2024-11-21T08:36:09.060000 @@ -241380,7 +241380,7 @@ CVE-2023-5223,0,0,2fb00a8c39af0b009cca243d971676d52c15e47da332f24d74c2dc93b3b5f1 CVE-2023-52230,0,0,f74a4b7b498808aeca0a984a29729c461b3b795e9da7ce52049e0e1692c07a5d,2024-11-21T08:39:26.800000 CVE-2023-52231,0,0,70b0c207e04b3201814f087724dd4ea640070e9b4cd848ddc574a03f8f7ba76d,2025-03-10T15:54:41.330000 CVE-2023-52232,0,0,25816897725e03b2601314f3c9389a2be7d7e262fad693583de240b223ce3938,2024-11-21T08:39:27.053000 -CVE-2023-52233,0,0,2423e3afa7be038ccf2190464fe2d4c37e2d909a99b6b2c713bd1ae6e307c147,2024-11-21T08:39:27.173000 +CVE-2023-52233,0,1,877bd66a154fad8c345ab7555640a1d78deadfb819ba5856bea098cb5a886a2f,2025-06-04T15:05:06.540000 CVE-2023-52234,0,0,6984b41c87b7f2d15b820bc3d8db1038b20cc6bb55fdedabf1511bd51365f7a8,2025-03-10T15:52:35.053000 CVE-2023-52235,0,0,4f1e2f38c8f4b55ae6d956cbec2c5763374a4cbfb41d1307d39af61dd9437d7b,2025-03-13T20:15:16.470000 CVE-2023-52237,0,0,ec00cd5043a647583ae661e798908ac8aae8b8c80323fd5ded69d2879fe6e25e,2024-11-21T08:39:27.630000 @@ -242909,7 +242909,7 @@ CVE-2023-5954,0,0,ac1ef91ec2c5675c7e1c3b282c6ef6b3b939a5f7987a716f19550c6af0d613 CVE-2023-5955,0,0,cf96c33af6cc9b73b57b78012e4782149164c9aac8d93899ee8320263d002887,2024-11-21T08:42:51.403000 CVE-2023-5956,0,0,081455ccb1fc867165d2e32ce0fd09036c2e1e7e184bef4b711e9161cef17619,2024-11-21T08:42:51.590000 CVE-2023-5957,0,0,2e255864d8e4da5224ec4e6dcb881326c81273d1c52308cb2939cdf6c15edad8,2024-11-21T08:42:51.710000 -CVE-2023-5958,0,0,55c60cf95cc52981ebb4d1bba7a0e95e310b8372d3699254b90ba705ec2e90f7,2024-11-21T08:42:51.820000 +CVE-2023-5958,0,1,a4d6b56e50bdc466a8f831d836651a25a5a99a523bf47f68ca1375823877e8c5,2025-06-04T15:05:06.540000 CVE-2023-5959,0,0,acd2ef1ce200b40e602798b025faf87f0b6c541e357d99c781834775f0c55112,2024-11-21T08:42:51.940000 CVE-2023-5960,0,0,0a5a002761a86fa1b6485cdb85b3bcbd0fd79d97666e56db2ab5d7f92b3abf54,2024-11-21T08:42:52.087000 CVE-2023-5961,0,0,d753467e36892ee45d9ca5fa392d677843a1ef1a00b32288494ae65179f9d54a,2024-11-21T08:42:52.213000 @@ -243506,7 +243506,7 @@ CVE-2023-6616,0,0,7c706cb359ce97176ebd5b07a2c324cf99bd41b6f23e35a650d55ab8a07070 CVE-2023-6617,0,0,f691eaea4760e0a562fbaa39cfa55ab54915689fc15a7f440230ece1f5f6ea35,2024-11-21T08:44:12.680000 CVE-2023-6618,0,0,b1d954c5a68bec0b0caaa166229856ec2cf1636713231404f6e21ce6700fc746,2024-11-21T08:44:12.823000 CVE-2023-6619,0,0,180316cc6fd360c1cfe418b9baabb68fdbfe5b0679f655882ed55290e60a7e09,2024-11-21T08:44:12.967000 -CVE-2023-6620,0,0,9d0c30fdcf2d7f42c939410ff203e0f3e94b4b1e8b0b41d6a4b138d3e3976adc,2024-11-21T08:44:13.107000 +CVE-2023-6620,0,1,35c5200bcc56a45c90d4074f5e12e96b2f7870bd81ca2c68fd62f79ca43da9c6,2025-06-04T15:05:06.540000 CVE-2023-6621,0,0,0ec1b4ff716532353abb375d94c350358931f6867a19bb029a444bef52966eeb,2024-11-21T08:44:13.220000 CVE-2023-6622,0,0,f8d6c5bbc7808ee302e77c555d86120f85d88b7ca5f1c469d114026d3359ed13,2024-11-21T08:44:13.340000 CVE-2023-6623,0,0,88658556ba7b3327e94ba4c331853df94a28ec0a13f367519f93ccde85e8504c,2024-11-21T08:44:13.497000 @@ -243723,7 +243723,7 @@ CVE-2023-6871,0,0,511d4882be5db00c394cdfeeb6a4cc1e13661ce1e47eebfbe0cf051a715444 CVE-2023-6872,0,0,521677033aca1dce6a332258b5d43dc9c75835ee9f4ffab4da8af2afd696e21f,2024-11-21T08:44:43.980000 CVE-2023-6873,0,0,11191143d74c70782f4c4c7af6235b3379062eb4b20224b8179127fcaa1f0fb4,2024-11-21T08:44:44.090000 CVE-2023-6874,0,0,7874c25a9da01453ebdee524d3e762543cfd9a546f837538ea948cc463619afc,2024-11-21T08:44:44.203000 -CVE-2023-6875,0,0,d3a36dcb01c69573768e69040770ae42451d38267f6f0ffa42a03619ab0a1b9d,2025-06-03T14:15:41.283000 +CVE-2023-6875,0,1,af2f3469fb8f42266bbda3fb1f06ddb1906200cd99f1134c16810b9366ce5f44,2025-06-04T15:05:06.540000 CVE-2023-6876,0,0,f89af48ef5f5504c2e692ad4c07df9536f428f7191488caaa8dee49bae4e0312,2024-11-21T08:44:44.470000 CVE-2023-6877,0,0,fabb8390ccad1bd1daff92a75095fb666b1adbb5bb5a0b20ea6adb5df4bb8118,2025-01-14T20:36:35.477000 CVE-2023-6878,0,0,072a14737a3d37e6ab8da6421d172d02428f32099c58474343ed93f02dcb71b5,2024-11-21T08:44:44.710000 @@ -247843,7 +247843,7 @@ CVE-2024-12714,0,0,77ca4adc457ee2cb7bcf6b4729e9e3da4bd5b80759ff32cfa0b1a48f0e1da CVE-2024-12715,0,0,086ac6f63a614715bc3ba7cc5f74d04535b93d69419ca1a2a2c4d332775ec147,2025-05-17T02:34:13.747000 CVE-2024-12716,0,0,76fb5b10d1d55e12576bb9ea3415a4aa0dee741e120bfe88d50611e73dc17ede,2025-05-20T20:15:31.240000 CVE-2024-12717,0,0,154dca6e7c3997c611d8bf724a605e850f7ca5cd826b6b3b708c332cefe51032,2025-04-21T17:09:36.177000 -CVE-2024-12718,0,0,ce724fa5db8a208b4227431315cb3259e370695cf03f88f965e229faae4d68e1,2025-06-03T21:15:20.857000 +CVE-2024-12718,0,1,5e16c900904e5d3c0753fa228265d92efa967da4f1c64026be9cbdaf98e5e2ae,2025-06-04T14:54:33.783000 CVE-2024-12719,0,0,c34442f4a2a9e42bf0beba4200827e8cdf35e75eae83c71d20db9392843712f7,2025-03-13T17:23:01.420000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 CVE-2024-12720,0,0,64cad461a43fc8f5d0410c610c99186515778fe2e8eacf77eec51f5a2921a1e2,2025-03-20T14:15:18.290000 @@ -248377,10 +248377,10 @@ CVE-2024-13242,0,0,48e4425e2313d9e4b9c508c2e20978158490b3935315111bfbd08be22fd10 CVE-2024-13243,0,0,09de2049a34db5121bc75d2484ee70d79ade5868230f63ea6904a49aa5be9d69,2025-01-10T17:15:12.363000 CVE-2024-13244,0,0,04a6433692ba844578a96ebbb9956ffda37685b07e5472d33a77f294d7f47635,2025-01-10T17:15:12.520000 CVE-2024-13245,0,0,e462b3248df1dcb2da6e2c9df3d4586bfd0f6bd8df1413c75704b49bce546cfe,2025-01-09T21:15:25.280000 -CVE-2024-13246,0,0,b6e3df20cf7ffff28c67a7f4f22f2892843ad653599f692f904b90f823cd5f29,2025-01-10T20:15:30.297000 -CVE-2024-13247,0,0,05103d69329b27d8b20872ae6e8b1d4fdd89773e77d3c7c80a6edd2bb62f94e8,2025-01-09T21:15:25.443000 -CVE-2024-13248,0,0,11e60ec0c7f7ad1a651ff74c0a66d90df0fc8f551fcb0abc201884a1d8522236,2025-01-10T22:15:25.360000 -CVE-2024-13249,0,0,0f739f4fcc5109721a104bbb7ac69a2549578d59d96577cf17c023c2c5f2262c,2025-01-10T22:15:25.497000 +CVE-2024-13246,0,1,e2e5bab59a6c15884fbe52bfedab11658d95808913321d17f2c5a48b93a330eb,2025-06-04T15:18:56.680000 +CVE-2024-13247,0,1,5763c8eca91d6581f7a34ba68c328909b01db95fb893f130a64fab6883a80367,2025-06-04T15:23:03.783000 +CVE-2024-13248,0,1,703b629b6343739a2b70b0425ba04c695159418ab4b84428642126d84919532e,2025-06-04T15:58:13.153000 +CVE-2024-13249,0,1,8e61b764a231e0dbaf7424bb642fd1c1f6e609105f68b380be7dbce945e6a05d,2025-06-04T15:59:26.683000 CVE-2024-1325,0,0,a349f1da32afaa2c30678bfbdae2dc24cc32a423c94d6aa10d76321c48e8b1e6,2025-04-09T15:39:39.063000 CVE-2024-13250,0,0,27e4c14d6170fe6de6c4a7cf0bfea8f658cefc901cccef870ae73e39181853b6,2025-01-10T17:15:12.680000 CVE-2024-13251,0,0,c2673b9031949c4c4065c121bf2ee5a17e7743cdfd598386b657b01349a9bfe7,2025-01-10T17:15:12.840000 @@ -248388,12 +248388,12 @@ CVE-2024-13252,0,0,4dff181adbc7b55eb2a59475bbe207c30e69d1865bca664833ad62c1345fd CVE-2024-13253,0,0,3f27198d9d63ce31d47df6f782355a633b9a0f3510cabf6c152beb4eaf158f5c,2025-01-10T17:15:13 CVE-2024-13254,0,0,bc59e64d4a2a239491a60d70dfb6923e32fe1204881ed7a7c9e7833398c91623,2025-01-10T17:15:13.160000 CVE-2024-13255,0,0,1a1e0eed2bb7d39c8e92695c0515448cc29848d6a2a4137e32d44830e62b4fda,2025-01-10T17:15:13.323000 -CVE-2024-13256,0,0,ec4fda6ffc7ae904501710b8f3c567dea4d71c3d2f7f8151cfc99124a1155463,2025-01-10T17:15:13.473000 -CVE-2024-13257,0,0,1416108bd85fff261b84e66c1fc3f6a437fffb443470964eb7ba1b3672f399d4,2025-01-10T17:15:13.633000 -CVE-2024-13258,0,0,278e8a7e689996ac4970a2480cb5a219a23bc3109446bafa1eae166d45452d40,2025-01-10T17:15:13.790000 -CVE-2024-13259,0,0,51b8ce844cb2471195f7d9c966106f60c5f513d0cda9d653323fd01102560cf1,2025-01-10T17:15:13.960000 +CVE-2024-13256,0,1,7458ee24cb9e700ce176c43ef2a5d4c3458bbde92c9ea6f3feee80298753c0de,2025-06-04T15:09:20.230000 +CVE-2024-13257,0,1,4a24970cc7a20b46dbb3995c9209b1effb709485a2a5ae62a3933de78f6dd402,2025-06-04T15:09:44.690000 +CVE-2024-13258,0,1,f243e82f36fb70a5fe6aa63019ec2b58a8eeb92724b8a69fe020088ed8e335ac,2025-06-04T15:11:56.670000 +CVE-2024-13259,0,1,cfd56c9056765dd6811995e35ca88b8e62599f69c8ee9ecb5e6ff90afc5396f4,2025-06-04T15:12:41.220000 CVE-2024-1326,0,0,ac4519a354d11725d1294e3a4352486814b34b222c391e8e6e1330f2dafde31a,2025-01-15T18:08:01.100000 -CVE-2024-13260,0,0,57757f504be9b465bcf2fc00a33a225f852d2cb25bc46e7e87c0041e2de24f59,2025-01-10T17:15:14.107000 +CVE-2024-13260,0,1,ceba4903f701f5ba5c9d462db3c5f4be00493d105b63d7e02756bf50e2a5c111,2025-06-04T15:13:24.007000 CVE-2024-13261,0,0,0488246e685df60a2baadd57883ded78a9960a9ca422cf33e3dc1d175f157ed2,2025-01-10T22:15:25.630000 CVE-2024-13262,0,0,f42826f99a2294f60b944bbc35c89c4f533e668555c364894ff8f776cb4c2767,2025-01-09T21:15:25.770000 CVE-2024-13263,0,0,f968351445fc99f6e3dfb4be31349a8b3501084c33ee668176ecd38c499f373f,2025-01-10T22:15:25.777000 @@ -249134,7 +249134,7 @@ CVE-2024-13962,0,0,ea9d81d91a348a1fccf0a29b3d54407f74eaf1ed332ca23dd52e5162f21cb CVE-2024-13964,0,0,0b3cec59b44d58c537c140b76cb5eed52f77b988e404c33ca119bbcb44531c40,2025-05-17T20:15:19.230000 CVE-2024-13965,0,0,696266c1e615339e2c74184825c7869048cb34652d675d1bb1be5959dc30273e,2025-05-17T20:15:19.317000 CVE-2024-13966,0,0,1e7c7434322ae48a12d12060d00ccb0202329621b4c00fb67abd63b41233b655,2025-05-28T19:15:35.940000 -CVE-2024-13967,0,0,88a62faac054a08e568cb0e89617f4c9ca6f0d96cde36b43b9933345b083dbfc,2025-06-04T08:15:21.367000 +CVE-2024-13967,0,1,e4c12a5e2447511b13039db14dcd45cd36008a5d221c50815608308da9cc3d12,2025-06-04T14:54:33.783000 CVE-2024-1397,0,0,b23e8b9ccb5706ad3f8d257df0efb1d8013c2af60938dfd6b0df8c51fda39522,2025-01-22T17:41:19.017000 CVE-2024-1398,0,0,9645ba9f8586ede4d8e9304631788266d0cde74989f61af36e6ddca7859998d4,2025-01-08T18:39:21.643000 CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000 @@ -252972,7 +252972,7 @@ CVE-2024-23895,0,0,d4d544360ff9ac84901a798dd93d692846b51f3d4a3bfcbaf0a75a825a101 CVE-2024-23896,0,0,635bb83ecb6705faee17db42ca50da7c067c8d9ac628ea959f5651246f7e310a,2024-11-21T08:58:39.560000 CVE-2024-23897,0,0,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4ef5a,2024-12-20T17:30:33.613000 CVE-2024-23898,0,0,82cb86eeead29a41a26f8d43a27d3730988e662134d81188c8cd9708a0afbd78,2024-11-21T08:58:39.923000 -CVE-2024-23899,0,0,4e4895235c426268ca84c39a87c44ba513bc2717de20eefcac614411ffacbafe,2024-11-21T08:58:40.040000 +CVE-2024-23899,0,1,c9706debcbb25b54a6bc875acb0da336d766e313da3eea8e6dba91d19993d393,2025-06-04T15:15:23.400000 CVE-2024-2390,0,0,3e848f25c0e6aca1cdb589d9d47a5535f56144364579a0cdbb3a8951c3252040,2024-11-21T09:09:39.010000 CVE-2024-23900,0,0,e7878c9d2402f20d8367acdc291cff5d3b9148e51da70130710dab99f9430d6e,2024-11-21T08:58:40.163000 CVE-2024-23901,0,0,49bcb4810f55c620816c3f0e594dbd0087699ab58f867f02a2b90676bb50fc8e,2025-05-30T15:15:39.480000 @@ -254979,7 +254979,7 @@ CVE-2024-26735,0,0,8376bf8aaf5bbfc4470da7adce5f6b9f58511b72d51065a9b6f0cc0b6f24b CVE-2024-26736,0,0,db0f3e358d9b2b4371e86aaebd5993fe0654a1caf1496c0ee4b3fb7c3fb7202e,2025-03-17T16:03:20.093000 CVE-2024-26737,0,0,1e375a2e88d5e32bd5b245a244a9d24910111579d7949bfc48934858d7e0f987,2025-04-04T14:34:28.903000 CVE-2024-26738,0,0,7401dc8ccba47014fc09b50b349b2fbe5d1a660cb458a9c717c4b0bf3e62c9a2,2025-01-07T21:13:43.273000 -CVE-2024-26739,0,1,aad6bd7b2ec26e485a8a53ca95acf329a56b5592d521e16813c96f026c04b557,2025-06-04T13:15:24.410000 +CVE-2024-26739,0,0,aad6bd7b2ec26e485a8a53ca95acf329a56b5592d521e16813c96f026c04b557,2025-06-04T13:15:24.410000 CVE-2024-2674,0,0,a6ed79cbc8b2ace847fd9f602eec2818f488e9ac296cda6cc9fe140ff8b05647,2025-02-21T15:49:25.710000 CVE-2024-26740,0,0,bae4c9fac49600181f08052e69cc7a5f5528d382c6bacb471dff4c717a962a28,2025-03-17T16:03:33.700000 CVE-2024-26741,0,0,2c4de59648952a2362ede4380ae9b072da084628051e21ba83d372b54102be86,2025-03-17T16:03:52.647000 @@ -258388,7 +258388,7 @@ CVE-2024-31120,0,0,35d4f0e8fa6c746bb7fb032a7a661b01a9ffb29a2d0e9dae31396cea656f5 CVE-2024-31121,0,0,17a27d33fe8a21f76c62822e8bd0b5425e66dca9d6d98c456685474852fd8bf0,2024-11-21T09:12:53.637000 CVE-2024-31122,0,0,c51a5712bdbe0f189f233e0d8822c1782400145d92344ed8488a068152cb5597,2024-11-21T09:12:53.767000 CVE-2024-31123,0,0,403d3e968ce2b5e26d5481a0f21ce8d416f8c3ec1d4ca02c2071acb75c924ac7,2024-11-21T09:12:53.900000 -CVE-2024-31127,0,0,0ed24feec4ed416a1037049337d054d357e2a67b13ab7632bee2cb7e6578745b,2025-06-04T05:15:21.870000 +CVE-2024-31127,0,1,51a05a69807d94b49f8789365d6089510a8e68f85851e92523331bd607a78adf,2025-06-04T14:54:33.783000 CVE-2024-3113,0,0,949ee5c2b257afe51aeecc4e40ba90e1fe83922cf6876a67078d711bdefa59dc,2025-05-30T16:55:02.807000 CVE-2024-31134,0,0,684ec4fb3ab1d4b94622e466bd62b4b2952a0217846316306405c4f6193f7b3b,2024-12-16T15:53:28.913000 CVE-2024-31135,0,0,6f570ab7f122a6ad49c3fa62728d41ae46d24bf44d47ac54c704b6fb6a9d101f,2024-11-21T09:12:54.143000 @@ -261939,7 +261939,7 @@ CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313 CVE-2024-35788,0,0,cfbbcb5b1c7b5aed82e1a1721f9174e455396f89b648614529f26e4a443d5e44,2025-03-05T17:33:07.867000 CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000 CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000 -CVE-2024-35790,0,1,914a42206bcf167074dd60111e4c8cecf43541d1e237ed2dfbd858b2449c7b9b,2025-06-04T13:15:24.587000 +CVE-2024-35790,0,0,914a42206bcf167074dd60111e4c8cecf43541d1e237ed2dfbd858b2449c7b9b,2025-06-04T13:15:24.587000 CVE-2024-35791,0,0,85ead07022ef53c0e6f72e9e777d81e8d0ca2cd9792e2767bce0619269c60a40,2024-11-21T09:20:54.250000 CVE-2024-35792,0,0,b976adee26a670820dbfdbc2839380b04012e83339f2866536e779f8151bc1bd,2025-03-05T17:39:23.407000 CVE-2024-35793,0,0,82ce6b2ac6f53564ddc7616294ad0293384da143f7096dd15ac59cf347e0a71d,2024-11-21T09:20:54.497000 @@ -262597,7 +262597,7 @@ CVE-2024-36481,0,0,4eb9f12e83487746bcd563f74e1338838b3bacec77ea996220050453df93a CVE-2024-36482,0,0,535472baf1dda6517f1f0290a0b6663d8509986e45cf2f1daae2170dddb08280,2025-02-04T18:27:28.993000 CVE-2024-36484,0,0,a06783a9b3c79d8cb9b5fe8bfffb1618ea1a5c1aab2918e64ca3d8f674b8e0e9,2024-11-21T09:22:16.280000 CVE-2024-36485,0,0,d951588f4dcc00d26595f8d25b71cc0d010f10ca23d6ec7bebb340fbcf7c88da,2024-11-07T11:15:04.637000 -CVE-2024-36486,0,0,5e9d8b9e5c98838f92d258f45e5a8d0460ab627b98c77f922645c3de174b5758,2025-06-03T14:15:47.160000 +CVE-2024-36486,0,1,1a873d3e10f79748d2ce668b3a2fc4e733700f6732be7d05fda7cfd5e4ce665c,2025-06-04T14:54:33.783000 CVE-2024-36488,0,0,abe66b275816c86c5f144981d7bda84aea8ae8a17414a41070e511c1200662b4,2025-02-04T18:32:08.450000 CVE-2024-36489,0,0,483f02515bfc91c5ae3d16c61773df6c14d7d1b71a9ade79929d031b233a7f89,2024-11-21T09:22:16.667000 CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000 @@ -264302,7 +264302,7 @@ CVE-2024-38538,0,0,f220d87a84b724b24d89767c7d92c1accfaa078d81520e261e78698c0051e CVE-2024-38539,0,0,be6524d4988a9f90d8b4a02a6934585310944f2926189ab49a46b5d4cf4baa82,2024-11-21T09:26:16.430000 CVE-2024-3854,0,0,a1974fd3d2e51876bd374d2a672a481c5d50b565fa7ea4eeac681c6ba889198d,2025-04-01T14:11:53.310000 CVE-2024-38540,0,0,7168efe39204f04a96f889b052fffe67bf5e606ec8c95a948d8eef169da8e877,2025-05-02T07:15:53.960000 -CVE-2024-38541,0,1,1694030ec432148e45515e0be9a532ac949fa697392342822801cf926c9828b4,2025-06-04T13:15:24.767000 +CVE-2024-38541,0,0,1694030ec432148e45515e0be9a532ac949fa697392342822801cf926c9828b4,2025-06-04T13:15:24.767000 CVE-2024-38542,0,0,1a4cf9991e674cb89b1162ffe95329aae1e2c48aa17dcb447cab52a06dfa7e37,2025-04-01T18:36:50.130000 CVE-2024-38543,0,0,883d648adeab28bb184a8fbb8da8721e5f06ca045d6379f5ed26730ea15b10ec,2024-11-21T09:26:18.130000 CVE-2024-38544,0,0,e15bdc0dc94b6396be984927fdd0ad14338bad0b4a287c13c8b828b4d0a959d9,2024-11-21T09:26:18.280000 @@ -268420,7 +268420,7 @@ CVE-2024-4386,0,0,54a90b5b7f9adcb3ab883ff3856f21e7a8791912f2bda7cdf746e2c28d6184 CVE-2024-43860,0,0,f44d5fa98ec9cb63048854db47de832b82f8f7f41f44782f815d1a7bacb3b779,2024-08-22T17:08:15.097000 CVE-2024-43861,0,0,68f34ecda5105e49a0d387298aea68805dc4dcc7d82a6e8002e74c14b48e94aa,2024-09-03T13:45:12.667000 CVE-2024-43862,0,0,171af0f7fc202d2bdf06930015dc853d7861e4edde36751f4ac7aa2f56f2672e,2024-09-03T13:44:24.033000 -CVE-2024-43863,0,1,f0d392f7cde0fd24d0c1d74b315c54066dd1a1a338f5cdb70a18715194b067a7,2025-06-04T13:15:24.993000 +CVE-2024-43863,0,0,f0d392f7cde0fd24d0c1d74b315c54066dd1a1a338f5cdb70a18715194b067a7,2025-06-04T13:15:24.993000 CVE-2024-43864,0,0,21d16c6aaddff6921ea6961f03c4534862e785bec53c822be6ee212eb279e5e5,2024-08-21T12:30:33.697000 CVE-2024-43865,0,0,3ea6e9c4ca349deed15ed0ff69ac86878978452d8ff75eb76c40f26fbd6827b8,2024-08-21T12:30:33.697000 CVE-2024-43866,0,0,6e5539791de7fd9db9a2dbd44ef4ef909cdea28e8dad8f6a2b788fd31794d772,2025-01-31T16:00:46.823000 @@ -269746,7 +269746,7 @@ CVE-2024-45651,0,0,4f9f23eef66740309b9e8955f221f531c3a000a787665716e547fa7586956 CVE-2024-45652,0,0,6254bd590ce03a9259b82c0dba15561aacbeb1df97e69b146f493975ca4a2427,2025-01-19T03:15:06.647000 CVE-2024-45653,0,0,d05af724d0f2d97aebbefd0fd2c35f86104d5a99b0f0c483f158528d2ddf8549,2025-03-25T14:27:46.903000 CVE-2024-45654,0,0,84e0b6e2caafc48baa1b35c20875028bfa1c53921b9ea64b0881773217e0e97d,2025-01-19T03:15:07.787000 -CVE-2024-45655,0,0,4b2cfa78237986db3160929d8dee0742a3cac3c918c8a81c2f5946984defa634,2025-06-03T15:15:58.093000 +CVE-2024-45655,0,1,812b9fb1607bb32bc436615557e80e26ad1fbbc11062cdb660ffb08bbff1d90d,2025-06-04T14:54:33.783000 CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000 CVE-2024-45657,0,0,7a5eef9b925442dc8d84e1f516344c5c80c75658a7c519c6cc81634b57ca69fa,2025-02-04T21:15:26.687000 CVE-2024-45658,0,0,8932f3a8cf0f70fa04aa4437185397d20fc6ebf566ce62ce8b08260d14a6ce74,2025-02-04T21:15:26.833000 @@ -270354,7 +270354,7 @@ CVE-2024-46748,0,0,1f58ab5daa8fdc3cf242c066f17a57853dc64a33693f07928a094111674fe CVE-2024-46749,0,0,06974424caaf294bd21107ec0a2b36d9d5ecacfe406ebb7e66612d896fc4d0f8,2024-09-20T18:45:43.483000 CVE-2024-4675,0,0,fb7e6fa9fc63f7b6a41c7770746ca4c45a9246471a1a98e3cba2ed2f8d6fcf6e,2025-02-19T18:06:59.853000 CVE-2024-46750,0,0,66feceef0345c19e660d67c9a1818aa8a16fe162028284331affcd8721d122e5,2024-09-30T13:27:45.787000 -CVE-2024-46751,0,1,38c92193d26b3eecd7dc18fd822230ff8b7be0b338c0918be0bb7f9f88fe7b96,2025-06-04T13:15:25.160000 +CVE-2024-46751,0,0,38c92193d26b3eecd7dc18fd822230ff8b7be0b338c0918be0bb7f9f88fe7b96,2025-06-04T13:15:25.160000 CVE-2024-46752,0,0,a6e483848fd846991fe052cf397d8e3748be44625f58093adb7b1755e086fa32,2024-09-20T12:30:51.220000 CVE-2024-46753,0,0,3f1682b59cb8d5756351d35a4e4458eb3e9b590f693c2e576da791ab5f36b981,2025-04-10T13:15:45.023000 CVE-2024-46754,0,0,d335bc48b5fc1eebe1a7eef0e7eae5f8d2c1b537f7a261d71a0e5ceb10c05e28,2024-09-20T12:30:51.220000 @@ -274852,7 +274852,7 @@ CVE-2024-52558,0,0,862aa816f99d7d175aef88936bc531a11569a19b5f814c5d7b923875345c7 CVE-2024-52559,0,0,af632a7cbb87ee504be0a00b900d193f82666532e997cddf8a97d190ed2c3153,2025-03-07T12:32:44.420000 CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000 CVE-2024-52560,0,0,17f5696064cc8a54449a3e1cfd601a790042146971352f114ead14ce71af8bb4,2025-02-27T03:15:10.573000 -CVE-2024-52561,0,0,2523b665c8eb8ca7f837a0d2c7074f6d6db590847937a13f6b1632c675ea3603,2025-06-03T14:15:47.283000 +CVE-2024-52561,0,1,9e9b21442af8a4cbbd966106ac20531516650144574ee4c847f3cb2119909cd9,2025-06-04T14:54:33.783000 CVE-2024-52564,0,0,082fb97e963e24eeaf48108489383b26257575861650145a72a41c8a27e90eeb,2024-12-05T10:31:40.663000 CVE-2024-52565,0,0,02d8cf9601a79a81a90ae9c5bdc3d5a4c9c0865f4264720b000e5fe215f3cc2e,2024-12-10T14:30:45.133000 CVE-2024-52566,0,0,ad9914b2c2d53afe57085e24afde6d252d9adbd5430cfab4bef8a3994295e334,2024-12-10T14:30:45.280000 @@ -275146,24 +275146,24 @@ CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a53824 CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a878,2025-01-31T08:15:08.157000 CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000 CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000 -CVE-2024-53010,0,0,05e80b9336fdc1c50cb312accd7cc89807585d871683f92e9d927a217dbf7887,2025-06-03T06:15:23.887000 +CVE-2024-53010,0,1,e92ea489ea86ddb06142add3a7b47a2b4c77fd3f05e7b1a7bf67e9e564744128,2025-06-04T14:54:33.783000 CVE-2024-53011,0,0,43652afa8ecc8ffd9ce037fbbd076ab2370cdb5bab16d27a9d0d522b14d90e39,2025-03-03T13:15:10.853000 CVE-2024-53012,0,0,950d19974b52359043aeababc59a313e37e644d350cda3a38725dd1bbdedcdb2,2025-03-06T17:11:00.953000 -CVE-2024-53013,0,0,cd510110b1073150526050391a1cc6ee7cb7a8a91d59ddb26d9b242f4bc413ca,2025-06-03T06:15:24.160000 +CVE-2024-53013,0,1,8d210c05dd1b64c6c47cfd00c65a0b73f17272a696913a123b948752a0ecd543,2025-06-04T14:54:33.783000 CVE-2024-53014,0,0,f46cf9621d7ec0ec27b269342393212a2ff98a2d1e4dee51da1f5926fb7a1566,2025-03-06T17:53:56.627000 -CVE-2024-53015,0,0,37cc064bd332577609694c254fb15fa20c85eb0fef21178639c35fcad4c55644,2025-06-03T06:15:24.350000 -CVE-2024-53016,0,0,2feac6d8cd6615ab27d3380cc5fc5d738cee42637c90303ac85dd67b8de5ef36,2025-06-03T06:15:24.580000 -CVE-2024-53017,0,0,ed87516bf5a529ee3e7953c21dddd393d04878934d335a3c0827381819c6deeb,2025-06-03T06:15:24.793000 -CVE-2024-53018,0,0,8f51d3340d23bfa24acf28d0d13a35ee07b440fdbff190fbf1470f3fa508a3ef,2025-06-03T06:15:24.963000 -CVE-2024-53019,0,0,cc65e156cbbcf29f48c46ceab6c45ab36aab7146cc34a053aba86a13d8329f2d,2025-06-03T06:15:25.147000 +CVE-2024-53015,0,1,a450c81f1cd31e0b45f10edf303d4175e5b04201968eef8e5f498130daed687f,2025-06-04T14:54:33.783000 +CVE-2024-53016,0,1,56c8e5bbbd1f8141073f88c073c8f73badabb17854527ae5665fff3ae29f8688,2025-06-04T14:54:33.783000 +CVE-2024-53017,0,1,b43895ac6c98d4a1ed2fe101aa4b379864b11699c1d74a4fdc7641679832ca11,2025-06-04T14:54:33.783000 +CVE-2024-53018,0,1,b91bd2a60242e1a83632f24f76a1f1e9621660aaf01cf13982634b09272302bd,2025-06-04T14:54:33.783000 +CVE-2024-53019,0,1,2a44bb606c842cb61c132f1db5f3f9729f57b4304ec98d980de30e180a9e97c7,2025-06-04T14:54:33.783000 CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000 -CVE-2024-53020,0,0,166bcf321332a0ed6b181b60a93edc1c75bd5b1f7c754a3ac824113e243d69ef,2025-06-03T06:15:25.347000 -CVE-2024-53021,0,0,0a13d5ba31f8db766c3eff7346ea8b93a64f92c6e12010e2ebcf350536f60eb7,2025-06-03T06:15:25.560000 +CVE-2024-53020,0,1,1d094613dfb020571e6c472f786ac9babe7ccdbd30181f05d275f87f497a164a,2025-06-04T14:54:33.783000 +CVE-2024-53021,0,1,25d513dc785055c2693d55c0c3991922bf8b6f8bb9a4701ccd26ce076fd793f2,2025-06-04T14:54:33.783000 CVE-2024-53022,0,0,1f7d4cb1a035457938447f797a131050573edd098327d13c971b963b504c0be0,2025-03-06T17:53:45.620000 CVE-2024-53023,0,0,4991d64b52ee6b6149a8df2b655b67d0aa27e520b393b97673b088b92b6768f3,2025-03-07T11:52:53.973000 CVE-2024-53024,0,0,b4367dee590361a0c69d79254e166f98a1f0e0486712b21d3bf0f5dc6c740df6,2025-03-06T17:53:27.780000 CVE-2024-53025,0,0,91a23b9db5f048fda78eaf5cfaceeb7484de79586a4c749acf92fcdc70bf6090,2025-03-06T17:53:18.463000 -CVE-2024-53026,0,0,1dd3ae4644770caf83541bbc335acc5aa13d4ac2a6aa0c5e7184bf76cacf491d,2025-06-03T06:15:25.780000 +CVE-2024-53026,0,1,567a411aedc7dd8586cdfd298f04d2a0bce6d63adf133f9beba4293632af585f,2025-06-04T14:54:33.783000 CVE-2024-53027,0,0,f2775659635233bf71c563784e7075e6cb34f960d73482bad948bc1afe444256,2025-03-06T17:53:06.633000 CVE-2024-53028,0,0,47c1f6c6de706a1a88b64062b39ad64ff81060289fa9ea75185c681384a1860c,2025-03-06T21:16:30.650000 CVE-2024-53029,0,0,9faad4c644d7cc6766182f984eb4dad5985edb2c7f1854e13bd05423a0e71bf3,2025-03-06T18:10:30.300000 @@ -275349,7 +275349,7 @@ CVE-2024-53199,0,0,b7d164e48aa05e3c01fb8207aa331e220207154288cf87cf44ac3ccbb8685 CVE-2024-53200,0,0,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4e1f,2025-01-08T21:29:35.877000 CVE-2024-53201,0,0,c711eb722b8f180d53de7616fe5e83ef81c9c735e27696929f70cbb31bb1797d,2025-01-08T21:26:58.670000 CVE-2024-53202,0,0,6dbe997bc5638474adb0491890778fbeedc8cad0594dca99d0aa34c6acab69cf,2025-01-14T16:23:54.130000 -CVE-2024-53203,0,1,bbadf9bc5119342ff251c4c0baab0550b2fcc669047aeb772ba1c7890f13fe51,2025-06-04T13:15:25.317000 +CVE-2024-53203,0,0,bbadf9bc5119342ff251c4c0baab0550b2fcc669047aeb772ba1c7890f13fe51,2025-06-04T13:15:25.317000 CVE-2024-53204,0,0,2c897609f21b073f2aedfbae9db3f6afa71168ae92f23356b369b32f12df3275,2025-04-18T14:15:20.860000 CVE-2024-53205,0,0,f32da2740c9268726c877ede297f0d5488feab408e6344c210626a8b8000caed,2025-04-18T14:15:20.987000 CVE-2024-53206,0,0,2f6a2fc7adb42267dc8ee97a338aa8c24c6fa9462fbe1480b8392e4aae94186c,2025-02-11T16:15:41.840000 @@ -275912,7 +275912,7 @@ CVE-2024-54015,0,0,40971c469c3896fb9f44684b71eb7b15c5b49eb2e701c300dd7c0c4ad6b2d CVE-2024-54016,0,0,3b5eb58b4244700d1bcb32c4dac2bd0c90e1e201611d8a89739b74a30622a284,2025-04-01T20:35:54.023000 CVE-2024-54018,0,0,cad6d12f1a14e927d37238581f95d0e8ab02634a89452232f8dadfac53c033d6,2025-03-11T15:15:43.113000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 -CVE-2024-54020,0,0,68f3dca84f2afd7af4d026bb2834b4e4d32e6de32dcbde2ac5b496199f95cd0f,2025-05-28T15:01:30.720000 +CVE-2024-54020,0,1,deedde63d908f2774e588bfa00ef40030e124db57741b462401a683c70fb1d25,2025-06-04T14:34:54.323000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 CVE-2024-54024,0,0,b12992324e708add852aff73cc4680ab70c64cd77d627c575cda6c4714aff0b9,2025-04-08T18:13:53.347000 CVE-2024-54025,0,0,8aa32b233e56da713dddb0eb535be2617e97f8dd7601088b08118f98be13f739,2025-04-08T18:13:53.347000 @@ -276039,7 +276039,7 @@ CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39 CVE-2024-5418,0,0,e8b4cd9b422aa40da5d2622d5e29796eb5a07db3f41b03941ba29e731fed299e,2025-03-24T14:25:36.727000 CVE-2024-54181,0,0,3e04974e8b1a6b14bc562b3f38845258be106e346d87e72f2301979081de7867,2025-03-28T16:32:40.990000 CVE-2024-54188,0,0,abfb7e0b3ec5ac91b1cbb24f50653752798673c16f4b76b78e719e6a3d07cb8f,2025-06-03T13:52:30.580000 -CVE-2024-54189,0,0,0f3cc39a5af1bfc82a2227ac28e0b27304da82983c6ee72ae7e8c56f95d17bfb,2025-06-03T14:15:47.803000 +CVE-2024-54189,0,1,fa6685cf50ef76bc406a38801c914d5572c20fcbd2f52b1eebe180ea434ed7c1,2025-06-04T14:54:33.783000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000 CVE-2024-54193,0,0,d4064cbcdedae86603fba40721ede5426ca6ed68b9bf4e5893ada8c0fb6b87d9,2025-01-11T13:15:26.840000 @@ -276722,7 +276722,7 @@ CVE-2024-55529,0,0,1d23a6190ed20d6e071a25112ca50d5aa9ed1f469e0055848697711ea503d CVE-2024-5553,0,0,cbe2ddf67f45d187893926fbbdd2baf5f4f4aaeda85e24ec6fe6e5dc2690683a,2025-01-15T17:29:08.167000 CVE-2024-55532,0,0,b9288f692d0a58b93b8bcdb70061687c5d84cb0b5202dc355b056ff9b07bd9ed,2025-05-21T16:12:57.587000 CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000 -CVE-2024-55539,0,0,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000 +CVE-2024-55539,0,1,cd8f3a1a456e84a195945d08e16b6fad235968ac9b40d31cd75c507d8bb34c58,2025-06-04T14:15:26.893000 CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000 CVE-2024-55540,0,0,9c95e88ae218d78df112647409831dadef1e40774b3428021419ae700bc07996,2025-03-06T14:54:35.500000 CVE-2024-55541,0,0,57f41b422eca0b1d859cffb16c9e905e5fa863b4d187262deca7fbe12dda1907,2025-03-06T16:46:30.867000 @@ -277486,7 +277486,7 @@ CVE-2024-56651,0,0,c63b4ce3133e3258f12483aa05277a2c45cf174f136577dd26845f6698d57 CVE-2024-56652,0,0,980520d7b679c98cf47990bb6cc4f2033691c8b2eedd05705eaea498021ada4c,2025-02-11T16:15:47.103000 CVE-2024-56653,0,0,2c21656dacd93a34e7aebaee3fc843972c34d69396f439a86edb6beae42401af,2025-02-10T18:15:31.423000 CVE-2024-56654,0,0,9e61aaa697592ea74d94ab060d486564b3c917c417bf5745395edd40f490b270,2025-01-06T22:33:09.937000 -CVE-2024-56655,0,1,2e2ab84a7e0a98ba7cda940c3313841ff2c42f967243dd0f1b9120c23697a24f,2025-06-04T13:15:25.473000 +CVE-2024-56655,0,0,2e2ab84a7e0a98ba7cda940c3313841ff2c42f967243dd0f1b9120c23697a24f,2025-06-04T13:15:25.473000 CVE-2024-56656,0,0,c45608fb96c1d9d3ec6fdafc60038556053690b8422a06c9b78c70da4adc48cc,2025-01-06T19:27:40.187000 CVE-2024-56657,0,0,24b7a2608e29205998c248ed91c6d0279f60b2603ab2a2945b2346a131e1b818,2025-01-06T19:28:49.760000 CVE-2024-56658,0,0,654754c8e45b3f2a9d56d52e5ec1237003c3e653c364e59cb112d6c1a38837ca,2025-05-02T07:15:58.347000 @@ -277597,7 +277597,7 @@ CVE-2024-56754,0,0,0719ef5595d01f11c4fdd47e3e22b1fc21ab1d413809f498383df6b132d48 CVE-2024-56755,0,0,205ce7afe96425c287c52b7a72e2ff26171d854700f3cf3d8f25e737abb82fe4,2025-01-06T20:26:39.200000 CVE-2024-56756,0,0,bd03068cc43b4cd3609b9bb8866c84806441d6e0d20095ddeda56dff7ba7d05a,2025-01-06T20:33:10.813000 CVE-2024-56757,0,0,46c6c9ed6516d3e8d957dd15e681278f460a9b87f55fe95de169dcd9aa1996fa,2025-01-07T22:46:35.897000 -CVE-2024-56758,0,1,0b535bba797433cc8006e1eef8799cecbdcda34addd1bffce754077abc35d865,2025-06-04T13:15:25.613000 +CVE-2024-56758,0,0,0b535bba797433cc8006e1eef8799cecbdcda34addd1bffce754077abc35d865,2025-06-04T13:15:25.613000 CVE-2024-56759,0,0,baf8ba1004657e7a0e6ba7c661b8367138ec6290ca5e3442b95674f62ec10311,2025-02-11T16:15:47.730000 CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e4847379,2024-11-21T09:48:08.420000 CVE-2024-56760,0,0,72c66a1e53e88062831a1e2948e1690ade890c97f5a8aca9793bb4f74cd3b40e,2025-01-07T23:06:22.637000 @@ -283153,7 +283153,7 @@ CVE-2025-1047,0,0,f4a91cf03e61641913f4b2ce744735c2c7afe01ff139070079f3532b76bab3 CVE-2025-1048,0,0,a3d3092c793cada439e5ef60b13556acee8cb417f590edf501c935903b0bb227,2025-04-29T13:52:47.470000 CVE-2025-1049,0,0,a2ad117fb9f4ebaeca41323a663c4345f577f06b04be24ad8994c39b58864b9c,2025-04-29T13:52:47.470000 CVE-2025-1050,0,0,03a93d3cb98f03a711aca7858c2c0c992a1724fd10d6a4dc91fccf81a354c65e,2025-04-29T13:52:47.470000 -CVE-2025-1051,0,0,b04e58aa8b94d8f44ad899441b51f2a16487769f29db78949accf9aa1906373d,2025-06-02T19:15:25.740000 +CVE-2025-1051,0,1,816774a6d249d513959f69735121c5847d99b4bcac98bb8b3c855db23269c0b3,2025-06-04T14:54:33.783000 CVE-2025-1052,0,0,dd0f54ac7a99856d7d318fe87955632258ed518980dc0996f06ddf7223075097,2025-02-18T21:32:45.863000 CVE-2025-1053,0,0,745fc40219bc37fd7ab7252db87e5d766a3ee14d78f27aa4c9a1b496940a21f8,2025-02-14T04:15:08.903000 CVE-2025-1054,0,0,430aa21bf72f645c6e6bfd34970aba7a2e39d4475b698feec899aa71c44032d7,2025-04-23T14:08:13.383000 @@ -283392,7 +283392,7 @@ CVE-2025-1330,0,0,8806b600a16600135c3ee444bcc6df626e2468ea3481ac7ea55ef1588f6e78 CVE-2025-1331,0,0,e74416c57b9592d93cced9944a9bb80ec0883cb56d39327667b3612c5634dc5f,2025-05-12T17:32:52.810000 CVE-2025-1332,0,0,651a32ff0ce1e4c178256e4e7fa7755a14b2351228c1c710a764ce12601a0c92,2025-03-04T17:17:39.640000 CVE-2025-1333,0,0,2afa36665db7a2858d88b2e62caefbada9aa36adb986a0acff76d9e0dbf1aaf9,2025-05-02T13:52:51.693000 -CVE-2025-1334,0,0,18e096144032cbdbf95059aceb6ba695767405a37e099716951ea47be0bf04ef,2025-06-03T16:15:22.983000 +CVE-2025-1334,0,1,23fa7e76491fb4a6ab83950f3973db99b4e102f7ee84bcde42695d83cee5b0cd,2025-06-04T14:54:33.783000 CVE-2025-1335,0,0,564364b2f61e7747ac590848e7f26fbef6a8ec644fa7858b0ae594d6c732e9b5,2025-02-28T19:56:39.220000 CVE-2025-1336,0,0,5bb81efefa47b6b10a748758c689250ae0a85244c2bc3fa4b57d2310008c62b3,2025-02-28T19:55:19.603000 CVE-2025-1337,0,0,d50b5c2b5aabd36826ddbc10fd1c9ad645d3a485550527f95248dd387d871087,2025-04-09T13:15:41.100000 @@ -283688,6 +283688,7 @@ CVE-2025-1693,0,0,7ebc617b821b94f1ea8c04b23cc41634822af607e5925c55616ab5694b115f CVE-2025-1695,0,0,6ea36d3166401596f7da6d63e10a3e0697b4bb41d475dd82848973a4738b8109,2025-04-10T18:55:19.100000 CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000 CVE-2025-1697,0,0,419964dd027623ddd628c29949c81bd3d5bf673e4cbac859628f2226ec230f6a,2025-04-21T14:23:45.950000 +CVE-2025-1701,1,1,bf9bd6003d4b9761e0cd2e2250b38f2a1428e71c4b724793309ad990e7d4b702,2025-06-04T14:54:33.783000 CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000 CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000 CVE-2025-1704,0,0,45ed10bd85c28150ffd6d9e18a4e608ac36e439afa1d7fa6e04c31ca92cc52dc,2025-05-06T01:15:50.293000 @@ -283700,7 +283701,7 @@ CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000 CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000 CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000 -CVE-2025-1725,0,0,484f4f3b008cf8f410d412b639fcc32bd2e1e80b242bac0d03000edf1c5898a4,2025-06-03T09:15:22.487000 +CVE-2025-1725,0,1,c49b8d1c27e2c6728ab571d7d9ee0274a46175f957660be0c5aa759fde493bd7,2025-06-04T14:54:33.783000 CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000 CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000 CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000 @@ -284072,7 +284073,7 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38 CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 CVE-2025-20186,0,0,988f7f1d2645d1b97028fb13ba80ac27036d7d2054583bffc040f1b4de466626,2025-05-08T14:39:09.683000 CVE-2025-20187,0,0,49cb1bb2460f1bf94d25f953e4816fb4704910b25f07a14f891f757e44af242f,2025-05-08T14:39:09.683000 -CVE-2025-20188,0,0,ee7b61267b081be1c279185cc5b7ac84a854c95693bb167865bbbe578d414f19,2025-05-08T14:39:09.683000 +CVE-2025-20188,0,1,89701269cca9d4d2f3e429dae52909bb86f3ada58b9e9fcb887f78ff02ae542a,2025-06-04T14:15:27.247000 CVE-2025-20189,0,0,80748ec81ef3d0bfea0a8fd1c737694e12cc44ced3d0cbf30c347d4a66ab6799,2025-05-08T14:39:09.683000 CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000 CVE-2025-20190,0,0,469a86e281a91f6666aba5167ba034aae7aaa490b577c894f7d420858aa81096,2025-05-08T14:39:09.683000 @@ -284129,8 +284130,8 @@ CVE-2025-20258,0,0,587485bc224e7800bf99678fb698cd6c8d3d28eeeb847ba45799c39e0a8ca CVE-2025-20267,0,0,9f1a8869becd21960978de51d3d70c583f40a6a9b638c69857e8709afa0ac105,2025-05-21T20:24:58.133000 CVE-2025-2027,0,0,f4e787944fa975229e7ea27488af4d7a233e07940cd5bde5046deccbe6a0e23d,2025-03-28T18:11:40.180000 CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000 -CVE-2025-20297,0,0,d51e7390670998593142c70d867d96776d19436c37b4f7c43ae9c93b7ed48bb1,2025-06-02T18:15:23.360000 -CVE-2025-20298,0,0,f845683dd3aedabfd7fae149866b965aced6aee71a8231c2b8f6f3a9c7aa8446,2025-06-02T18:15:23.560000 +CVE-2025-20297,0,1,fd036aef2926b86f71d7b735e8eace20d04567625f017b30a40eab31b1a018ed,2025-06-04T14:54:53.980000 +CVE-2025-20298,0,1,5ef123b99aecda479eda59b2805a60f94ea649d648ececceda6a02d8cab7316c,2025-06-04T14:54:53.980000 CVE-2025-2030,0,0,0e82bd47c24dfd47a0763661b2667fde4902819acb4b011b12553acdfd131e3f,2025-03-10T07:15:36.400000 CVE-2025-2031,0,0,f0e6a81edfa1417e63c121f9ecf488da08992c1c9a6c102e64ae87468bb47def,2025-05-12T20:56:38.933000 CVE-2025-2032,0,0,322fbe54e0e9f8c1f8fc80a5a1dbfb0b1da1a60c079e30b220dbe7508c728edb,2025-05-12T20:43:29.347000 @@ -284359,20 +284360,20 @@ CVE-2025-20978,0,0,2714cf52ef7c128669f80775d2c882171c48600d8887f6b257b4da65c3d21 CVE-2025-20979,0,0,231f64c3e176775ba854746f023aa81bf6b40a4874e615d2c4610802ac3d0429,2025-05-07T14:13:20.483000 CVE-2025-2098,0,0,339294206fd4d5be14c5ec0cfdf9d0429803ca53d006fc61729cc0a81c0f19c1,2025-03-27T16:45:27.850000 CVE-2025-20980,0,0,7fdd5a1f3346b410ae9e2acd7c3f47424f0d1437083753fdf0525f723ce42b13,2025-05-07T14:13:20.483000 -CVE-2025-20981,0,0,7fbba3a81de4c351eacc4bd9b489ec5cdb26bfb047901f2f6070ac42574fd6ca,2025-06-04T05:15:23.073000 -CVE-2025-20984,0,0,48189766337fe129ee90908f98ec64baf87936cb5a63b3abd12f9d293672feb0,2025-06-04T05:15:23.213000 -CVE-2025-20985,0,0,5fac10296315ad6ab12299f768f354e2d8d402523c1302b62bf41bc5be430313,2025-06-04T05:15:23.347000 -CVE-2025-20986,0,0,a28508d58ff59524399a7aac11c70ef565455d35714926de741c3f67db4d5037,2025-06-04T05:15:23.483000 -CVE-2025-20987,0,0,b8d9894a5bb343afe965ef7ce491a0954a5e52da0450f38e97437b9d9828fc39,2025-06-04T05:15:23.603000 -CVE-2025-20988,0,0,f16eb8baa47126ad15632de91fc5a4aa62b9b943bc3c6490c47c0e086e72f8b0,2025-06-04T05:15:23.727000 -CVE-2025-20989,0,0,2e231e1bd38b49f7dd513070e3a038660de6241e60eecec93860b73055f58899,2025-06-04T05:15:23.847000 +CVE-2025-20981,0,1,3cd666e2f6ca8dbe42267b7ba7f17b10b23a6b03f2fc8612f5f137dbde34d2f6,2025-06-04T14:54:33.783000 +CVE-2025-20984,0,1,e7280baeb13683cb27514b85160ab9b678f39f8df2cf27f792346506ca0946ee,2025-06-04T14:54:33.783000 +CVE-2025-20985,0,1,f1546ae707d82e33a5482d68554ce8489a02400f5065ef7262899124d0fa85b0,2025-06-04T14:54:33.783000 +CVE-2025-20986,0,1,a8c17dd67caf405f6f23f17b2129a7137468e63456e903401ccdccb0b601a184,2025-06-04T14:54:33.783000 +CVE-2025-20987,0,1,8913da4b44ee7da5c0971503acaf824914ebec5e763fa37871a9073fb97e7cbe,2025-06-04T14:54:33.783000 +CVE-2025-20988,0,1,fbbd6f958a183439aaa160643d875446809a0f64e8c0f3232547d171f73b598e,2025-06-04T14:54:33.783000 +CVE-2025-20989,0,1,5f32155f918b2ec2b1caf827f08bbaebf3599c28c1492271fb57b49c3f1a2f8c,2025-06-04T14:54:33.783000 CVE-2025-2099,0,0,43e77ac58d7d237c4631f79417f3dddc6f58c98730ef38b1a30c68f7f4626d05,2025-05-21T17:43:15.080000 -CVE-2025-20991,0,0,dbb0b5d79bf2ec1e7eb4703bec093b6595bfdaf97f4568ce7ae4eeb1e72378e4,2025-06-04T05:15:23.970000 -CVE-2025-20992,0,0,9dd11306881cccbbe25020b1bb0ce043087a5538265d5d2976206b045a451ffb,2025-06-04T05:15:24.090000 -CVE-2025-20993,0,0,68b2f18309b26ee31657ecbf95aeb979de09b41a41ed8199c6417e0d46d542a3,2025-06-04T05:15:24.223000 -CVE-2025-20994,0,0,24565c5fd536c14e798f81ee128b392b37a4746db4dc899d7e7e7f338ea879c3,2025-06-04T05:15:24.353000 -CVE-2025-20995,0,0,21d38972c8c9fe13eaaed2766f60c02fe3f7ee2e9065ddce907589583f824c1e,2025-06-04T05:15:24.480000 -CVE-2025-20996,0,0,9fe88729bab313f3ff198366672c8d3da9d19fd60c286fc4dab0d3dc790b6313,2025-06-04T05:15:24.607000 +CVE-2025-20991,0,1,2be8e72270d4654deb123a58d92739e465c2272d9b8d6e114e60716b24a6efe1,2025-06-04T14:54:33.783000 +CVE-2025-20992,0,1,9afb3e2c523b70b4d88069d24ee793f31c569d16948df8b056dce0648c6bd016,2025-06-04T14:54:33.783000 +CVE-2025-20993,0,1,2f2e05380962f23c2442bc279bb02edf00e9574fe76d3c8cb0266c25828d2475,2025-06-04T14:54:33.783000 +CVE-2025-20994,0,1,9433fa250a990918bc6b86efd5f43f4cb8ee99e0799546de1201054f6acdb498,2025-06-04T14:54:33.783000 +CVE-2025-20995,0,1,b0e261ba12a516e344c63e2844a9aedbf277b62990580f34723653f536b23d63,2025-06-04T14:54:33.783000 +CVE-2025-20996,0,1,2997e4a5961993fb94aabc2509dc00cf8844c2ce85f291a3f0f1326b812fee1f,2025-06-04T14:54:33.783000 CVE-2025-2101,0,0,e2f134d8ec38a4ef69a8a1b6464b6041847978860b9b377155f00fb727decdb9,2025-04-29T13:52:10.697000 CVE-2025-2102,0,0,1b84a94b9bc783c0eba8b42961ff5295a1d593e71ba7b75effdb8c35c2b35fb6,2025-05-21T20:24:58.133000 CVE-2025-2103,0,0,8165c0b352513de64cda0403ba5ccccfa989e53bace8ba5cf69fd4b2ec66dc6b,2025-03-21T15:06:58.433000 @@ -284728,18 +284729,18 @@ CVE-2025-21459,0,0,5c386ebea9ff578717babb7aa51aad849d73bca7cd137939105262b1d5b65 CVE-2025-2146,0,0,f9f0ee70a1a39eb0556adf9eb68f745a3064e4c76eb406a896b9039c6428fac4,2025-06-03T15:49:50.793000 CVE-2025-21460,0,0,389cc7be8fa099528db069375678ba8c4a64d44cb4ba042b2379ea417e3aa0f3,2025-05-09T19:09:33.447000 CVE-2025-21462,0,0,472fd520000393ead0a178585c5420674292d66900bca0ccacb3268944c15d7e,2025-05-09T19:09:19.660000 -CVE-2025-21463,0,0,eea414ba69f1a4ee5ca75c5097c270c878111730470586c60280c9221d600948,2025-06-03T06:15:25.983000 +CVE-2025-21463,0,1,593907bcf873c565a7c581e265b97d32aba720c27ffcf57b3226463b4c2d25ca,2025-06-04T14:54:33.783000 CVE-2025-21467,0,0,ee6894e4cbe2827de5e9551f2468fe4483ae3970632b17da0270579a63a0e452,2025-05-09T19:09:11.167000 CVE-2025-21468,0,0,657db3e9e3b08d3a920f7b517225c72105a802e2c6d292c94318fca052f3a5a0,2025-05-09T19:09:01.703000 CVE-2025-21469,0,0,44a98d2c7da1387889249fd5539f1241bba1748830f946c1d60c946e176d6446,2025-05-09T19:08:51.337000 CVE-2025-2147,0,0,74883129637bc3238403c8977cb3f6a890ade1afe4467a882851a126f0eb8edc,2025-03-24T14:30:40.943000 CVE-2025-21470,0,0,302140affced5624b7926ec75d432b3f98e7a2f5e5c1d9590233b858d4c47845,2025-05-09T19:08:42.713000 CVE-2025-21475,0,0,f2f32195890d4a050cc8c69ec5f14e2e026ddc3e3e1c08b511c44a38ddd17bc2,2025-05-09T19:08:32.710000 -CVE-2025-21479,0,0,b383d399249a8b696425c45d434b27a11bbfd89b3535464396b5e4472d8ccc0e,2025-06-04T01:00:02.020000 +CVE-2025-21479,0,1,8e590607bb93626838feb03fb50b5d9c8497ced142640027914505bf3e535850,2025-06-04T14:54:33.783000 CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000 -CVE-2025-21480,0,0,3d6c12ebd4174700c7e8b93422e4107901bd25746dda5636897f4eb0a80c4d61,2025-06-04T01:00:02.020000 -CVE-2025-21485,0,0,73010e18ec621a1a17167f907048fc66beee8b9c3599de3cddf72f09ee8387e1,2025-06-03T06:15:26.423000 -CVE-2025-21486,0,0,c5e16de3bcadc7d595ee20023571b8c6f4699e27d552dea8d1e8a4a8eed6c72d,2025-06-03T06:15:26.590000 +CVE-2025-21480,0,1,b45b81e3eb77ce6d23a24b2297dafa7774b2aaefe494be41b5ff3c600b82231b,2025-06-04T14:54:33.783000 +CVE-2025-21485,0,1,03d83e3b9947fa20b8c4220c62d45e20f0436065a3a3d3554a8beeb69e71c0fa,2025-06-04T14:54:33.783000 +CVE-2025-21486,0,1,6657ae7f3cc111f37509795b42a9ee2f1a625afcb0e5375a7c1283ba109a4c1b,2025-06-04T14:54:33.783000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000 CVE-2025-21490,0,0,b59bfaf73f4a7aac7f498efe2114db1737794c6dd1c56d41aa09f498e00d23bb,2025-04-09T16:06:52.400000 @@ -285088,7 +285089,7 @@ CVE-2025-21812,0,0,0172989b53c6feffdc375708d0a02eb1d75237040d5e5920d81ce1955dc1e CVE-2025-21813,0,0,78df5f168bcf407ef8d0541d43d53e4fe129ebc6e2716e4b36acef01df61f61a,2025-02-27T20:16:03.883000 CVE-2025-21814,0,0,c364ace44bd0b50483a36447581071f1df07a5f9d5793183d961c3e48b85a166,2025-03-13T13:15:56.290000 CVE-2025-21815,0,0,f4e2c12cd4a4edabd0c8b0bd958ad46a201e53ff9da54eb242d285bf4d2e973d,2025-02-27T20:16:04.063000 -CVE-2025-21816,0,1,fee210647579ee368be1afc8526b5145892508890c8c2b16e3fd757377dd6312,2025-06-04T13:15:25.773000 +CVE-2025-21816,0,0,fee210647579ee368be1afc8526b5145892508890c8c2b16e3fd757377dd6312,2025-06-04T13:15:25.773000 CVE-2025-21817,0,0,c1a7c26d0ccafcef71ad51858a2ffb9b84072383a4f0223ff11f842c70b97e93,2025-02-27T20:16:04.243000 CVE-2025-21818,0,0,68cb1db63634248e0d05be36e88289887b47df3d3a20d0885cc9e5401cfe2ddb,2025-03-02T15:15:12.043000 CVE-2025-21819,0,0,fffb2ad585acacb7750de724d03060958e0008c1da6ee25489543c037e67d048,2025-02-27T20:16:04.430000 @@ -285496,7 +285497,7 @@ CVE-2025-22247,0,0,e2ccb0d69d4b19d529c00757c1f999c2de56db4ef675be5b764f7810fb3d8 CVE-2025-22248,0,0,6a9e5f44ae59f3eb4fa0812a308821c9129d4ef2a0a8c4fa23d2a9a359e62a28,2025-05-13T19:35:18.080000 CVE-2025-22249,0,0,f4d67d6ed3673265e11af908716828682348f88de500075ac363e3a69c846579,2025-05-13T19:35:18.080000 CVE-2025-2225,0,0,d26980ce605de1c16e8b872e505802fad1242bb85c846db0c5c70a05dbfaf01f,2025-04-15T18:39:27.967000 -CVE-2025-22252,0,0,7d66ab29dbb6b392ac2973108fc7d6b8011f4d04a5d690d1c9308b9dde9f4685,2025-05-28T15:01:30.720000 +CVE-2025-22252,0,1,d2f2320f288010f024706c18a6ea879e02f185cf8c34fd036ab23a80b6f775ac,2025-06-04T14:35:38.543000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -285969,7 +285970,7 @@ CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29 CVE-2025-22774,0,0,d978492ff608868557e566cca7883c4173b30659a40e2fc80a8268cc8310bc4f,2025-04-17T20:21:48.243000 CVE-2025-22775,0,0,7d2a06197d6a9d775e8fbcfc5379bbce7f2f443442e1d2178247e5bcb0b27213,2025-03-13T15:15:52.570000 CVE-2025-22776,0,0,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa83c,2025-01-15T16:15:40.193000 -CVE-2025-22777,0,0,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22 +CVE-2025-22777,0,1,e808ddcb1173e2a263cafb5c590cefd6b1f28321db788deef005225ef3587140,2025-06-04T14:07:37.637000 CVE-2025-22778,0,0,a2bc20469f55e874da32fca9be88da64c934748fc51c1927967277612aa1f61f,2025-01-15T16:15:40.350000 CVE-2025-22779,0,0,1dbe2ad312835dc346b83ea64bb7019d11586a48cc8d249ef5a6c76c895b3238,2025-01-15T16:15:40.510000 CVE-2025-2278,0,0,1f6ba3e8865a0fc197221680bef34c2019c013aa87a883c69215d2a422304533,2025-03-28T16:23:02.837000 @@ -285995,7 +285996,7 @@ CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000 CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000 CVE-2025-2280,0,0,3c729bf718b53d7a8fbc2e72fa5f16dcd614901b486dc8adcf49241fbde2616b,2025-03-28T16:23:07.340000 -CVE-2025-22800,0,0,e99f60ce9373f01185c56625914fcfda91db6d5e57cef9e10da9683bdf24f752,2025-01-13T14:15:13.067000 +CVE-2025-22800,0,1,e03970f0762d1bc81120ab4ec235dee44a344f7f6f8ba9ec71ffb63d1d1877f6,2025-06-04T14:37:20.747000 CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000 CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000 CVE-2025-22803,0,0,40579bef037b2313067d92dc65978feb36bebc6c2ed9d74c87c1ec3f2a0020b9,2025-01-09T16:16:29.627000 @@ -286202,16 +286203,19 @@ CVE-2025-23090,0,0,db1a04b33215738ef9ff89e7dd3243ce6839535b0728d9bb0d1927af1170a CVE-2025-23091,0,0,52be052e818e282e438c6b1d873e178494e11252bb26056a7aa314d364167b02,2025-03-13T13:15:57.990000 CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000 CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000 -CVE-2025-23097,0,0,0396473552c3fd6d175417c799df7715a49d562bfaababbce4e2d5bd17743dcc,2025-06-03T20:15:20.883000 -CVE-2025-23098,0,0,0b09f5018a46991646ad34c6a74a8f423b126280e17876932a235f1cda70b439,2025-06-03T20:15:21.760000 -CVE-2025-23099,0,0,2c5f8647f6b1da5927512d94bb2c685c4b7491802e2e8ca1a9f5368402ddc658,2025-06-03T03:15:26.790000 +CVE-2025-23095,1,1,d1448caee19bcdf715820666e4907902307a3f246d33218374b8a35ac932fa1e,2025-06-04T15:15:23.760000 +CVE-2025-23096,1,1,53495144b25b021bcfaffef9368ee921a30955be845e2f1e4828dd7aed4f00e6,2025-06-04T15:15:23.860000 +CVE-2025-23097,0,1,b6b9b39e6feec99d9682d4ff6ba89b9e0abad33c94dbb0509851a4a248aae108,2025-06-04T14:54:33.783000 +CVE-2025-23098,0,1,40800f73e64ff4bed528436fa0af43504536926869eed5aa7aef4189485af2c1,2025-06-04T14:54:33.783000 +CVE-2025-23099,0,1,76197de6f7075c8d8a9f0fc39558cb7eedbeb1e6ce55a9cdbe78882e1931cafa,2025-06-04T14:54:33.783000 CVE-2025-2310,0,0,1254bedeef285364d4ce4cc304a3b27319f0e76b0b0498fd69d05aba0b6f3806,2025-05-28T18:12:42.130000 -CVE-2025-23100,0,0,c0ebece67a1c4778767fc9bedf2a263693d4d9b1453e5fa1c2dd6805bd8f2a5e,2025-06-03T20:15:21.880000 -CVE-2025-23102,0,0,7e1e23ce656278f4363639ef93f781ff2bf04de2b349756bc7e64e67db8cece6,2025-06-03T19:15:38.807000 -CVE-2025-23103,0,0,4a9686303495363c725aa4007a6c18e5f91b643b7e7841fdba7adeba9fc938d5,2025-06-03T16:15:23.650000 -CVE-2025-23104,0,0,6610497cadc4747ca925b32a7c9cf6b309d77c571ee095b8f68729e046c6562d,2025-06-02T21:15:21.473000 -CVE-2025-23105,0,0,76af3a585a1106927951b0a08d54a00fd760a17c06bf43c56a5b0473237f5cb9,2025-06-03T03:15:26.957000 -CVE-2025-23107,0,0,f699e36c7d4aec071e130a272477f639858699d7f4bfe96dc7bd093307bb20a9,2025-06-03T18:15:24.947000 +CVE-2025-23100,0,1,0e17828fdbe686e374d9c17775edb74349ac1174060c863009c0ba7ad2c8edc7,2025-06-04T14:54:33.783000 +CVE-2025-23101,1,1,202b88ce0e91cc08e33196351c4fd96eb2bb0768c25449456a133fd282c3e3ef,2025-06-04T15:15:23.960000 +CVE-2025-23102,0,1,6bec7573bbe7240a0cc6c4ad146f66173c15f86fae3427c8aa28807d6147b430,2025-06-04T14:54:33.783000 +CVE-2025-23103,0,1,c8c91a4a577fefcea451a589fa7a19f5057b093193fb8a60af72a8861235b66e,2025-06-04T14:54:33.783000 +CVE-2025-23104,0,1,6e3255de9b3e3eabf4e0883aa996b5d13398a20f89aed465be62f21cd861d0db,2025-06-04T14:54:53.980000 +CVE-2025-23105,0,1,0cfe1826e7f6e2704ce0e8c0045a2d064cd7652071b287e953f8c489e8a22a74,2025-06-04T14:54:33.783000 +CVE-2025-23107,0,1,b5923ffad40828aa0847fa30f2f0def8d61f468e0a49580d483e213869e12b9e,2025-06-04T14:54:33.783000 CVE-2025-23108,0,0,43dfea536f21c7dddc3256c2f1e274765fe5955541d1af65c01a12871277b7ff,2025-04-03T18:58:00.940000 CVE-2025-23109,0,0,dab09ed4e1fbec86e8afd75398d8d3c5a65ca2a268fa35cb5d3a1b5459dc4d18,2025-04-03T18:52:57.410000 CVE-2025-2311,0,0,0549a26ae70964117a933b4c0694a85dc38e847ae92918cf4a69583f79013968,2025-03-21T07:15:36.820000 @@ -287036,7 +287040,7 @@ CVE-2025-24011,0,0,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7 CVE-2025-24012,0,0,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000 CVE-2025-24013,0,0,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000 CVE-2025-24014,0,0,d437dd0957e63e3c162ac9164e717ef0adc1c3484b51bbf8b0a74d7b98c6cf06,2025-03-14T10:15:16.240000 -CVE-2025-24015,0,0,bc4e9d1cfa4b068baa98dec265391270676970b3c926ef8dd39e1e0aa1616e09,2025-06-03T23:15:20.633000 +CVE-2025-24015,0,1,41a640ad8351bebc450da33a970fbd73e71d0c95285bfc484deed4cdbc64f2e1,2025-06-04T14:54:33.783000 CVE-2025-24016,0,0,c090754f26d92875e7dde6ca613307138b21fce6005c542e3bd734afb516a0ac,2025-02-10T20:15:42.540000 CVE-2025-24017,0,0,dc52ecd4171e7929f65e0a4836da3afeb723a34df858befdd8eddd836222dac3,2025-05-09T14:05:15.500000 CVE-2025-24018,0,0,8bc6fec409107a40272cc09bd4cd4f020e3f477d554cda09bae3fbb5bf512a3d,2025-05-09T14:02:53.547000 @@ -287414,7 +287418,7 @@ CVE-2025-24460,0,0,4f72eb3be22e4f1df5ebc3a0bd9e4b0215891e7379b9cb7c39c53c2299ad1 CVE-2025-24461,0,0,25f37a551c58c38f8a12f7c46f3328964394f6bf5bab9d552ab0758339b513f4,2025-01-30T21:26:17.583000 CVE-2025-24470,0,0,b97a6fef4b5505dee945d637a8774d8a3a426e3a9c38ffd15f57405368d61eb7,2025-02-11T17:15:34.730000 CVE-2025-24472,0,0,573046e6e59a9878d2f5071b0132cdfc67ff241095b627fd46340e7e712c33a7,2025-03-19T20:21:38.197000 -CVE-2025-24473,0,0,51feedbc0f58defb9117169b6f54cdfa8d0a4ef8e34d08c86d7da454bdb56fac,2025-05-28T15:01:30.720000 +CVE-2025-24473,0,1,3ae93405aff32059fba30d19017fffdbad02a02f70e176e1cb2c599c6cc09d61,2025-06-04T15:38:01.880000 CVE-2025-24478,0,0,0083a83ce8a7467bd79ed623e875ec78bf3adca87990be9aea0e893fa7d8e9bc,2025-01-28T19:15:14.777000 CVE-2025-24479,0,0,d732ba51a4f6efc84c8321c89024e480fd7d3b488cb555f37500d77679d00e07,2025-01-28T19:15:14.910000 CVE-2025-24480,0,0,8c69070e4602e3e045b6de7421f305082c0b32c33d67076e7034c529b969d532,2025-01-28T19:15:15.033000 @@ -287855,15 +287859,15 @@ CVE-2025-25013,0,0,8b0fcb6890b87ced02ed7f1e0ef615815bf6fcf1ec3fd1005c85d59a01058 CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352e87,2025-05-07T14:13:20.483000 CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000 CVE-2025-25016,0,0,d83ceddcf1bcf084cd4544ad95cf9a19b953e3c151e0441bc0e4520196c8ad1f,2025-05-02T13:53:20.943000 -CVE-2025-25019,0,0,3db3b3a0dffec28aaad9bef3e4385287ebac30b994df6524c478d3e101968700,2025-06-03T16:15:23.960000 +CVE-2025-25019,0,1,2afc58431924021ca3bf42f394ec17aa34157f3c5c08443297c80740eb48786d,2025-06-04T14:54:33.783000 CVE-2025-2502,0,0,6fd5d57633ca6bfb868bb538c58a070c30094fd2c097c4991df33aa80efbbb4d,2025-06-02T17:32:17.397000 -CVE-2025-25020,0,0,1e8dfccbd2eaf64c2af040878eee6ff9b406b46ee0c9125a657e49afb60c0ab5,2025-06-03T16:15:24.123000 -CVE-2025-25021,0,0,01750b567ab5ecaaa2e193e806fb4dcfb71fd8840ecc79a1662c6162f485ff7a,2025-06-03T16:15:24.277000 -CVE-2025-25022,0,0,38e4ac517f264707b690b7f91dc1735ebd30af4259b2448db91a97d4fa4b2e46,2025-06-03T16:15:24.437000 +CVE-2025-25020,0,1,d566b7cd7fd6361d66cffeca4ce560878441d81f95ce07909cf8483e0f5efc77,2025-06-04T14:54:33.783000 +CVE-2025-25021,0,1,d60ecd5794b198d9ec69c2ba72a1a0ede514132c1180164c16ec5c076fe6351a,2025-06-04T14:54:33.783000 +CVE-2025-25022,0,1,f3f9e6a4c683219a3fd870da8dbdc0b423345338053db43be9cf724b4dc0e822,2025-06-04T14:54:33.783000 CVE-2025-25023,0,0,074c065f09189eb031ac585458a2e1d09aaf15c120a072909abd4feb5fd42f37,2025-04-09T20:02:41.860000 -CVE-2025-25025,0,0,cba7c1973f00875f7a53d69e43747c45a434402edbb60b81b004ad1fbf051ad0,2025-05-28T15:01:30.720000 -CVE-2025-25026,0,0,d6d9ee90a0b87c2d15e65e13b34efa2ed7fde3817adf2327f98dddd9e0ff1a9d,2025-05-28T15:01:30.720000 -CVE-2025-25029,0,0,d60d3b08d45a1f5efa9fff660b0a79e3248820125b49c9119c20e01d0b547da2,2025-05-28T15:01:30.720000 +CVE-2025-25025,0,1,baada1c6e11f4c466ae1f25ebcbd90c7a67d2ee75d626afed1c26f338fed81bc,2025-06-04T14:34:21.177000 +CVE-2025-25026,0,1,9e10c45eeb1395709948c66baccf38a650cc7f25c87ff2170d95459f94f51251,2025-06-04T14:34:34.380000 +CVE-2025-25029,0,1,71f96fba6a59ae9782743e404a789413bdcd621c572feacd01423bcf67b23aad,2025-06-04T14:34:42.130000 CVE-2025-2503,0,0,ed4d8140856f517be1798ebd1d42e9ad5beeb39e147c4f2248508d466f42a88d,2025-06-02T17:32:17.397000 CVE-2025-25035,0,0,4a2d0f672ce0e83b98c92e972e5b7eb6fa5e15f13c5c1cb0d71f8aaf6e12e24b,2025-03-21T19:15:45.437000 CVE-2025-25036,0,0,a8799abf886f32cf74fa3727668b9ee2d7cf5c4f840bf1724d07c64c2d8a39a5,2025-03-21T20:15:15.293000 @@ -288054,7 +288058,7 @@ CVE-2025-25245,0,0,9553bdb2bbba17800d10d6fb307dc38303cc249115fd509a4ca397b2ef8f3 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-2525,0,0,6681512816c86a4dc20141a0c3ff6e8c54c015b41d7df5f29fc6bf7816448bbc,2025-04-08T18:13:53.347000 -CVE-2025-25251,0,0,875d9fadb651814f0987bd2c000e3405ebb8c1b280d3303f6e8ceb277ce10035,2025-05-28T15:01:30.720000 +CVE-2025-25251,0,1,7ba720b0969d846f1f4c94132b0eb572e4c9a81f6898891b935d17882c7c0a34,2025-06-04T15:37:46.183000 CVE-2025-25254,0,0,c4f21e6036ba144ab43461c15a785205542371d6b8f941619552468f7ca5bf0a,2025-04-08T18:13:53.347000 CVE-2025-2526,0,0,b4d2665b0df39fb8efb0ebc6a7ec708e940ede0cae79c4c99d0922650362cbb0,2025-04-08T18:13:53.347000 CVE-2025-25266,0,0,14fc4214833d5ffeb8f363743939de320f9169af46798b63b6da510cc3dfff47,2025-03-11T10:15:17.850000 @@ -288832,19 +288836,19 @@ CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c04 CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000 CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000 CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000 -CVE-2025-2678,0,0,964a0e1a9907daa0bc817ad95b4030ca4f7062b582f2c9913f2237c8bafac651,2025-03-26T13:42:31.437000 +CVE-2025-2678,0,1,21e043de7d99133c751a03cd3480d87cab1f4c4859861a7ef4f888b9aa8448ca,2025-06-04T15:46:43.063000 CVE-2025-26783,0,0,f7630790cc515680ec9785d28aa0766e3b14d28241ebdf1a6b796ccb247075af,2025-05-16T14:43:26.160000 CVE-2025-26784,0,0,e88c527b0d754df7cebb32bcf738dbdcb37d5509c49c3ea18c675be442ce2019,2025-05-19T18:15:27.850000 CVE-2025-26785,0,0,7599783c96c8ee3ba83678a99a1453724b93e5edc13f10710a74d9635466b4f5,2025-05-27T18:15:31.037000 CVE-2025-26788,0,0,5fac6b93304aa80bc7a573b7eaa3933fb509b5a737cf70fd7551789f71a19205,2025-02-15T16:15:30.090000 CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2c79,2025-02-14T08:15:31.357000 -CVE-2025-2679,0,0,eb9f7c9ce3f80cdf477410f2622f95be141e0acf7a2ac524acd86d435cf92fd7,2025-03-26T13:35:46.297000 +CVE-2025-2679,0,1,cafe0cb961640352f6700d1f4f9c72cc0c9f8d69b76916ff519f9c4a67eb3536,2025-06-04T15:19:35.357000 CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000 CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26795,0,0,a918e173b11977413f0b59d322df4584deb42a821659e1377a79a8d11ee044df,2025-05-19T19:15:47.950000 CVE-2025-26796,0,0,68ab74fb372251311859b8e434d48ae111cce4d9cb690323b59ceca29e2126f1,2025-04-01T20:27:46.867000 -CVE-2025-2680,0,0,ed24fa2aaeefef57ba0215ddc4935b906efafd183191ffaeab872cce10d1d1bf,2025-03-26T13:23:41.867000 +CVE-2025-2680,0,1,934be0066d2f2c151ff263e21e7acbd87991eb5817b720319e92f8127f51bdc5,2025-06-04T15:16:46.930000 CVE-2025-26803,0,0,f34b060535881535036774e78c94752baf5db5d8ee7ebda53997889e53c0646c,2025-02-28T17:21:55.827000 CVE-2025-2681,0,0,f49803f68d1a27568d13b193742670ffaf69dc1c15128431e4382e87958eb255,2025-03-27T18:14:32.930000 CVE-2025-26816,0,0,2e6935052c19cf69ca34f2738a206b36dcd75ba847d4d8c06eefb2c65cc33c63,2025-03-25T13:15:40.623000 @@ -289025,10 +289029,10 @@ CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d45 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 CVE-2025-27018,0,0,48d58c9e9c902b1eaa7722cd7e4f3337c69ebc3fec7269de4a4a5a702e3570f7,2025-06-03T21:11:28.860000 CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000 -CVE-2025-27029,0,0,52ac68a9cdf6220cc18c5e7cbb583d98e66fa0a9fab7cdc377fda1e06ea9860c,2025-06-03T06:15:26.777000 +CVE-2025-27029,0,1,f19508e0628f7c772651f93e1b12fe9874fd4060cecec22f220c71602c00f8da,2025-06-04T14:54:33.783000 CVE-2025-2703,0,0,1cd2ec1071e8a854a09aaa20f8e960bae5b0d0c1a938baebd649e294b60810d4,2025-04-23T14:08:13.383000 -CVE-2025-27031,0,0,f69e1e0dba9ba78d4c6190b5ed5e711fd3643a9a1a5a7fd6ecc0a1e4b91fc55c,2025-06-03T06:15:26.960000 -CVE-2025-27038,0,0,515cf89db010c9346d0344253e5f834db6cf025152fe7353fbd6fefeac2af6b0,2025-06-04T01:00:02.020000 +CVE-2025-27031,0,1,9fa4d5238e55dfabc5a9becc0748532469d6008767dbc00fd4050a94f50be84d,2025-06-04T14:54:33.783000 +CVE-2025-27038,0,1,d07adf83f27b7104c9822617c0a41fdcb8eba7c282df98b2b2c43119858fe201,2025-06-04T14:54:33.783000 CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000 CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000 CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000 @@ -289338,7 +289342,7 @@ CVE-2025-27440,0,0,86277272131892140b431c748dacaa4d43e60fedf1d6315607fc09340bd3b CVE-2025-27441,0,0,79018b3b06a9e1f169848e8cfe5684a88b8ec611e0eecb9ae49cfed5e1cd7b23,2025-04-08T18:13:53.347000 CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501ed9,2025-04-08T18:13:53.347000 CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000 -CVE-2025-27444,0,0,95dd66321c35391a8cf3b58a9acd74b89e40b0b508c1c51e78cb5304ac2a9740,2025-06-04T08:15:21.613000 +CVE-2025-27444,0,1,3b2f034c29e35998a58eab4edebe91f0523b223327d4b3bcbe6698882dba3b7f,2025-06-04T14:54:33.783000 CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000 CVE-2025-27467,0,0,e305051e1a7dcf4291e11b8cd6f3091788c2ddeaf29bee2cf92ba70db3a6a044,2025-04-09T20:03:01.577000 CVE-2025-27468,0,0,dcaeee6f5e39787f02f391b688449bc9e36259b88e853d225eb70b8e9394d505,2025-05-19T18:22:00.040000 @@ -289534,7 +289538,7 @@ CVE-2025-27696,0,0,b8781e75125477796d54713f9a417fdec295883f7ed0a51b575af4a7cc2b5 CVE-2025-2770,0,0,6bd1c7bc620ddc325a20b983ac64bee658af9ee49886305da61eed2e2b045bd1,2025-04-29T13:52:47.470000 CVE-2025-27700,0,0,772f795cf0c5f97f871de9fa228ab34f17314f8124b5fffeca6a52688fe8acfa,2025-05-28T15:01:30.720000 CVE-2025-27701,0,0,632001ea717a7912b7d5684cadd5b780d93721e73e6415b5aa91110d7be1492e,2025-05-28T15:01:30.720000 -CVE-2025-27702,0,0,b086670456f70423ecf7da0582a0538d9ceda188709d70c0fc0b85c055819446,2025-05-29T14:29:50.247000 +CVE-2025-27702,0,1,4c1d64332ff86901b8f7deff44d4a0571de53128003d42a86cc12cdc7d4e71ce,2025-06-04T15:37:13.483000 CVE-2025-27703,0,0,4abe9ec9a21f808549a494e5bfa0224f7da8212fd92116b1393c443d590afe40,2025-05-29T14:29:50.247000 CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000 CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000 @@ -289618,6 +289622,7 @@ CVE-2025-27804,0,0,0f20e5d895be2127038637881ffdfd5e6829ee1b3cd5ff6e111614642a15e CVE-2025-27809,0,0,acf17088263ac0454f3c19e9b5b69eee2adc10f0e02e48930b8a575ccd37ca6c,2025-03-27T16:45:46.410000 CVE-2025-2781,0,0,f71242cf9553514cc2ec12a96aa1195882b54360169109a0233e1040d7956dda,2025-04-01T20:26:30.593000 CVE-2025-27810,0,0,d1482541c832943462d5d5141f3260f826675da05c4de1d17a8d8000d1e76d18,2025-03-27T16:45:46.410000 +CVE-2025-27811,1,1,ec21aa06cc6c4671d18ec33f78214ab08a25af0505121af1841465fdcc247455,2025-06-04T14:54:33.783000 CVE-2025-27812,0,0,490eea28d11bf4042efca85e606a63ea8705fbb9895bc0e4fb69498d1dff9f35,2025-04-11T15:39:52.920000 CVE-2025-27813,0,0,810e9a9403b82aebefac61476a9e0011d443081011347b72d18ecc06e7e5914d,2025-04-11T15:39:52.920000 CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000 @@ -289671,10 +289676,10 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4 CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000 CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000 CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000 -CVE-2025-27953,0,0,e1fe6f7ea803db9839cc70851f2034cc4e6965b9af336700d9e8d1bb811fc4e7,2025-06-03T14:15:48.417000 -CVE-2025-27954,0,0,26f7ce405d9ad47135f9093c8e426f158d69b2f6a8ce5bf5187b90f21a872722,2025-06-02T18:15:24.030000 -CVE-2025-27955,0,0,9d48c50a5b04551b3c0263e29c22a2f1b905b4b581942a2a4b26a65fe8579834,2025-06-02T18:15:24.143000 -CVE-2025-27956,0,0,f83c1ea0a2e602acb31301329bc9603c7e2b266381e2a33441e08eb2880cbfcf,2025-06-02T21:15:21.757000 +CVE-2025-27953,0,1,bbd1e72d5b15b75fe7ef006002f7b1c0e63667796301a844910133745b8912a5,2025-06-04T14:54:53.980000 +CVE-2025-27954,0,1,85915819caff7cfba469fae37f1622db2f0c91330303492b3ee09a012eb1050c,2025-06-04T14:54:53.980000 +CVE-2025-27955,0,1,51dae4ba78709aaa1d3db7e734832cb9a66cfeb02528d31c2ecd6e9a9e4537a7,2025-06-04T14:54:53.980000 +CVE-2025-27956,0,1,d55a7b54ffbb480d5dca0bcbefc32df202fac276d1c366d1805bd881a6fc642d,2025-06-04T14:54:53.980000 CVE-2025-2796,0,0,53e1f7c20777e5a56703d611323bf74e7aea306b658a5fd01e0390cfe50e5f4f,2025-05-28T15:01:30.720000 CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000 CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000 @@ -290068,7 +290073,7 @@ CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000 CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000 CVE-2025-29389,0,0,b6e910417322f02be556ac9b548f6e8b6c35848d660fba9931faab004d75355d,2025-04-15T13:42:23.447000 -CVE-2025-2939,0,0,56ca324058fe3e567f41612a0636860d8ad888c64ad6d6ad9522cfc15a5b8bde,2025-06-03T03:15:27.137000 +CVE-2025-2939,0,1,a3ebd06eae4e5495bfbe13ec19e9ce588d7c4e7533feaf938870f87d184967f8,2025-06-04T14:54:33.783000 CVE-2025-29390,0,0,2af3ceeb0b0e4ec487468d0265cf4f9bf7105f9f26e650a3615e67390bc16783,2025-04-22T17:06:50.490000 CVE-2025-29391,0,0,3957a6f12658ba0f8a64a4509b31e9cff0f721c7269083a2c5583c8497158773,2025-04-22T17:02:50.427000 CVE-2025-29394,0,0,4090687a0b04adebceb5be059956dcab0a952bc601580bcce43cec2c0d6a13ba,2025-04-22T21:15:45.123000 @@ -290459,7 +290464,7 @@ CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000 CVE-2025-30165,0,0,077f76199176bd5a57a77bdd57a0340d7be11667eaf5fd962561297bf1462b10,2025-05-07T14:13:20.483000 CVE-2025-30166,0,0,dc8fa2e955f9b83b24c2517018cb3ddc4399710004f918cf05eb88fd63c78734,2025-04-08T18:13:53.347000 -CVE-2025-30167,0,0,f54a2c82f14bf6e6cadff9ff05ea2aa66df60413e91aef03cf6792b5b7811940,2025-06-03T17:15:21.520000 +CVE-2025-30167,0,1,3ccba741b0dfbb142da7a1476df893ab6d305fc135bfa1c2453f43369aec6a1e,2025-06-04T14:54:33.783000 CVE-2025-30168,0,0,3703f1f4b9dfa087aa1c5a98a4898da5aafd4533d5e73d111e4aa608fa2c614e,2025-03-21T15:15:43.440000 CVE-2025-30169,0,0,f15d28ceb012be340421aec72a0050a4d83cc9a90d0defa493993c61d4837127,2025-05-23T15:55:02.040000 CVE-2025-3017,0,0,98ff904dc48968379de3c001eb6b068a3a8d13595e1e3e62ce18b74891721501,2025-04-01T20:26:22.890000 @@ -290585,9 +290590,9 @@ CVE-2025-30355,0,0,c181bb9f03178ada7f8864d95d9a7bf782ab89dac6c391740fa45089c2c71 CVE-2025-30356,0,0,83c1bd4f04f6f659dfb706d5db13dfed52cbe10d288d470cb63358354a45567c,2025-04-29T14:20:48.880000 CVE-2025-30357,0,0,a112b553f9fe8ce3c8c6b8f2cbac9764d0719224dc65b5895da5dde9bb9f8ee8,2025-05-13T15:40:18.203000 CVE-2025-30358,0,0,ba82b45f3275f086cfe8fd2cd02599b2d0205f25d94443c7a1b8198759a53381,2025-03-27T16:45:12.210000 -CVE-2025-30359,0,0,3b05cd8fadddd1fcaf59fe2267be10cf815fde1e6de1c93a414d8f2aeec959dd,2025-06-03T18:15:25.243000 +CVE-2025-30359,0,1,038bba1f58113cffb457250fa7606f1c4bc477b72575c6c5cdf7a59c167d7382,2025-06-04T14:54:33.783000 CVE-2025-3036,0,0,6636ad531d4d825cbe689a416476826bff4271ee7e1ab4bb067157c36af50ced,2025-04-15T14:44:20.857000 -CVE-2025-30360,0,0,847636148a8c241d0a288271f231b07a6c74953e3232b8c9e0aabb8a0764eee2,2025-06-03T18:15:25.410000 +CVE-2025-30360,0,1,6f11cc9e38cab659bb0e8e02a6031ea583c3964d0a803d367c0b2da23de38122,2025-06-04T14:54:33.783000 CVE-2025-30361,0,0,19943f9d1f16dce1755d90c23618ac1f0cee8cc6d55b65bac0d631512690e896,2025-04-10T15:16:33.707000 CVE-2025-30362,0,0,cc4dadc795cc1f5352ed0bc9925d710102e2d8900e361590a007e946d9f05ff6,2025-04-10T15:14:58.300000 CVE-2025-30363,0,0,83cef0b1c9d99240a8b9685426b87c72348f59b0ff6fd6d76ca9a64f8a7c6051,2025-04-10T15:09:44.697000 @@ -290629,10 +290634,10 @@ CVE-2025-30400,0,0,5cc18fc6839c88849b10bd538724771ffbd9b11a0b212546a4258600699f4 CVE-2025-30401,0,0,6094c4851d69a90cee16f3fcc3e38848db3a7882816e567c1d58e4520154798e,2025-04-09T18:15:45.107000 CVE-2025-30406,0,0,51db6be098d64837005d45fe4610c9b1d0c7620f15fc2620b87328ad3b94709d,2025-04-22T01:00:01.653000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 -CVE-2025-30408,0,0,2792d835499d3628ffd24f58abad5066aec8fadb8250d1ec490abc6676a7b4e7,2025-04-29T13:52:47.470000 +CVE-2025-30408,0,1,c46f2a921717ac22e3b71d54e7d86c5873aa6444534e1d413014b6e91fe9524f,2025-06-04T14:15:28.420000 CVE-2025-30409,0,0,ffcec7ca8527166f636901bf55b40476a7045f7049fdff6f862152cd4a0c855e,2025-04-29T13:52:47.470000 CVE-2025-3041,0,0,d5b21b6b78f2a401c9e8e108885b1916a2f3aafca95b7fffa55c4525e86b27e1,2025-04-01T20:26:11.547000 -CVE-2025-30415,1,1,5f4e72792337fd33632fb25bb4b97da8407eb4953fb175d1d79c301af6047ee1,2025-06-04T12:15:20.703000 +CVE-2025-30415,0,1,af0520bb0a4effe647597c05565509c95b80b615348ac3dd921e3bfa860ba5d7,2025-06-04T14:54:33.783000 CVE-2025-30417,0,0,fc12b9a39bd4ea35089b458c7e35708d689f039d406a8ac724d2823069bc5d0d,2025-05-20T15:52:33.193000 CVE-2025-30418,0,0,c869c34b60256dd02b3302e7e1152866851bf6fea18ac0f8f935e7bec98ade6e,2025-05-20T15:51:04.833000 CVE-2025-30419,0,0,9f19aa64262f2b9ac9049cf86acaaf123bfdbd1b1bb2dd1fac4010e65cfb2dcd,2025-05-20T15:49:39.510000 @@ -291353,7 +291358,7 @@ CVE-2025-31352,0,0,3b4ee61ff7706e5b838ec3976d4739ae6e58eadd39aa9e1b3ccd9b903a2bb CVE-2025-31353,0,0,aade972dfa9ec47d3e07b242f41f20d76a01f8f078e181747ee000ca91c0162c,2025-04-17T20:21:48.243000 CVE-2025-31354,0,0,a2c1ecbfcb3235477ad8200431c0ea4c81321e989c49ca93cbcc9e6a449508c8,2025-04-15T18:39:43.697000 CVE-2025-31357,0,0,10568eb634d6e712fcbab95ba9d1ba1b9cae9c7b98346cc44a3edcb291c43f89,2025-04-16T13:25:37.340000 -CVE-2025-31359,0,0,efa4c1aa02572e03d29ac6983572a8f7d5d8225325b318b6fa0acc55bdad5715,2025-06-03T14:15:48.583000 +CVE-2025-31359,0,1,d29bfe3af7a0d3ac34d1a8288544512aa03ca87e40d4dd5cd084f6835ff3ba5c,2025-06-04T14:54:33.783000 CVE-2025-3136,0,0,7ff98ba975809b4188d01f2e115e9c45862abffa34dc2aa33ad7cd01529a1bca,2025-05-28T15:59:54.130000 CVE-2025-31360,0,0,d1f586e795abef0eb367609debec6330cd41ffe8fbde4933f6aef94b2cc696ff,2025-04-16T13:25:37.340000 CVE-2025-31362,0,0,29e714bdac918165d1f72d9b66a1fef39fc1fe95242e3501acdc160e75ffc0c8,2025-04-11T15:39:52.920000 @@ -291643,10 +291648,10 @@ CVE-2025-31672,0,0,18523ce29ca2394cbea557e3729624ca8f16f3c5c719ca663267bafc741cf CVE-2025-31673,0,0,2467da8095fdce04350fa519d84d54b4d209606a8b9398ccf988b8cdb1a78a22,2025-06-02T16:25:04.353000 CVE-2025-31674,0,0,327f9ea560adab6587f49387642540429864f14d7cdf9a934c59392e636dc278,2025-05-01T14:35:58.687000 CVE-2025-31675,0,0,c71e82663e0cd8b0d04b67eafb81070764146bfbab88a8c59df6fe0a75628421,2025-06-02T16:25:25.267000 -CVE-2025-31676,0,0,c51c4fd68cde148d646ac0943fec4b75c25976c1cf9cfca72254d5118e21a230,2025-04-29T16:15:31.617000 -CVE-2025-31677,0,0,394797feae60344d3005aa28572ad0caaf69f3e911089fe7d6b00463203e1c48,2025-04-29T16:15:31.757000 -CVE-2025-31678,0,0,341d658715272d3b00bb740c74072f453470dce5afecc32cfa79ba2563a84ea4,2025-04-29T16:15:31.910000 -CVE-2025-31679,0,0,bfa0264e2da22ecdfc65c9f0385edb6d9aeac8e23d1ca2ce4420f0543e2a7db1,2025-04-29T16:15:32.067000 +CVE-2025-31676,0,1,15ef670ecc1f0be4771951edfb4d000a839d8e3848bd423ad9d3210eda7599c6,2025-06-04T15:03:00.780000 +CVE-2025-31677,0,1,afa971810ddfcf9082ca0bf100547aa9dcce6f941d328371830210c8ae289c0e,2025-06-04T15:06:19.570000 +CVE-2025-31678,0,1,0e287b26d429105bd9ff47803a0df430db42b4fc5aaf86b95ea38dcf6b959998,2025-06-04T15:07:11.777000 +CVE-2025-31679,0,1,c22b9c5647aa99f53054dc780deb6603420ffa16905016af07ff67cdc722a332,2025-06-04T15:07:57.973000 CVE-2025-3168,0,0,e380d53211d6f24bd24289b3a68b514642e6f8e2257f3afbd7bbfd6673251848,2025-05-07T16:14:52.250000 CVE-2025-31680,0,0,91878cb3e4ffcda448c77120ded1c9657418f160814537489161180488740e2a,2025-06-02T20:00:35.477000 CVE-2025-31681,0,0,443fc4a14578824a394eaec52ea2ec13dc42182080598a751c2b891e1f44f408,2025-06-02T18:12:28.140000 @@ -291669,9 +291674,9 @@ CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bb CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000 CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000 CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000 -CVE-2025-31710,0,0,3d935ddea092dd4445aef24343139521e94099c5cd9a80c7a58d98089c531908,2025-06-03T16:15:24.600000 -CVE-2025-31711,0,0,b67f35dd978e62198dbd2fbd97b6720d675e44c1356ac399170edaf34ab7565a,2025-06-03T16:15:24.717000 -CVE-2025-31712,0,0,099d6ce03d9e7a3aa816fa7066d86326db71a00a2c7f37bc8c591b800129ef15,2025-06-03T16:15:24.823000 +CVE-2025-31710,0,1,8697c4c01f54bbcee011347c1a38daaa8a4583593d3477afcb4a5cde160df591,2025-06-04T14:54:33.783000 +CVE-2025-31711,0,1,84b2ae9f8d2aebdbec17ad11b2ad830c114c5f3b19d006f39db2d4c2003fbdc7,2025-06-04T14:54:33.783000 +CVE-2025-31712,0,1,76997365817618d2fd45cfec3b555611f3996fdff38a8a8dab9fd8717a05a0e6,2025-06-04T14:54:33.783000 CVE-2025-3172,0,0,7ef3d20b4569576ecc044e7634dd1d1d020ed6e5c64b90d6184f578b093246a4,2025-05-15T20:07:38.310000 CVE-2025-31720,0,0,ce62208919cdfa9fb252b714bb7365bb606e8689ef37f84aded5e8ad22c74887,2025-04-29T14:03:21.570000 CVE-2025-31721,0,0,91995a06eddb99842482cec92b823782bf8b0af6c3c204a05bb9543bd15215b4,2025-04-29T13:56:43.860000 @@ -291975,8 +291980,8 @@ CVE-2025-32093,0,0,0be67561f687e419f366910e8dba9fd229d2f66cc865d230a0136e401d9d9 CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000 CVE-2025-32102,0,0,04ddcda8c051f3c91aa036de5ac0a4f40a69ceb05a05dff993e29e6ac8d5767c,2025-04-21T18:15:23.430000 CVE-2025-32103,0,0,6fe14085be008d3a16f5d06a169dc84db347b342206ef966b317449d4c4ce065,2025-04-16T15:16:12.310000 -CVE-2025-32105,0,0,f7090aff465f0342b44cbf149c15a22f08a1a6a13236de72ce56e07f796ac12a,2025-06-03T18:15:25.560000 -CVE-2025-32106,0,0,77c8b80875c659ccdc5ba2138ede92ef65e66bb3348be5f59c08f772247075a8,2025-06-03T18:15:25.737000 +CVE-2025-32105,0,1,9b51936ae2dd09b96114e35e8dee30bc7dbd5ead83902169b338553d082ea45d,2025-06-04T14:54:33.783000 +CVE-2025-32106,0,1,51ced130fc20ee2b6b78ea8cbba575ec565dde298b612131fdaa683b41a8d69a,2025-06-04T14:54:33.783000 CVE-2025-32107,0,0,a689a2435b39d5968d7bf2a8f1256f4c1ffc589945169a8a583af99a6981cea6,2025-04-11T15:39:52.920000 CVE-2025-3211,0,0,76a1b978e4d14ad416db291eb9ea785aa516c18018efd6d48ff333b290ad4968,2025-05-28T19:31:10.140000 CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000 @@ -292396,7 +292401,7 @@ CVE-2025-32593,0,0,139df50974f5ea4b80d658ad525adb72e81a799a3c99ffbea222c544ff434 CVE-2025-32594,0,0,258e3442e81c3a8f77299e8b708824756c6b5b5c2682135cc9905d526b78bdcb,2025-04-17T20:21:05.203000 CVE-2025-32596,0,0,f1872f78910abd93ca6bc44a668b64d9a217aba1c01ee357a12dfaef6efc96b1,2025-04-17T20:21:05.203000 CVE-2025-32597,0,0,55ab5ca6ed3d8b6cf0931426c8147ebabb322fbbc0aae4fae4f5b3289fb12ce9,2025-04-09T20:02:41.860000 -CVE-2025-32598,0,0,cdac3f432b75d5f00695f6f1edf0fbf1140369b9893f469b35a81ca8a52c54b6,2025-04-15T15:16:09.180000 +CVE-2025-32598,0,1,9aa1e262fedefa32d68a358cc7965fb92135026e124c97ce6f09a09dd1cca3ed,2025-06-04T14:25:34.160000 CVE-2025-32599,0,0,2831ce4b5b42e6325ce283503c26f9c21788129405d17dc22b338c3d4b2bbf42,2025-04-11T15:39:52.920000 CVE-2025-3260,0,0,2622f79018d11ad99457f9734c22f67fff4766852e4b18c6f2f091c561d9cd1d,2025-06-02T17:32:17.397000 CVE-2025-32600,0,0,083cfb813b0e4faf3c70b5e5f02105068f0caedfb180899d4577e64e9ef1444f,2025-04-11T15:39:52.920000 @@ -292915,7 +292920,7 @@ CVE-2025-35003,0,0,21587c625dab7683038a5bdc307498878657bea1128b3a4ea6c83622b9ed0 CVE-2025-3501,0,0,b44a31b094864acab1ff386cddcad3fda5c65db85ee8c99ed4dbb344cd7aad09,2025-05-02T13:53:40.163000 CVE-2025-3502,0,0,7c73723b0d4b00e6da894445c57c5ec7f552a238ff16d874e6183139bc542d93,2025-05-07T16:30:24.910000 CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905f5,2025-05-07T16:30:33.803000 -CVE-2025-35036,0,0,7dc37bccd4a0c1dab3320e224a89a5e13b259dccff5210edadf5d94fca1e9e06,2025-06-03T20:15:21.993000 +CVE-2025-35036,0,1,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000 CVE-2025-3504,0,0,aa0bdb842e6d15cc15443745349224911fa493d95241cc6b8918b52272013f3a,2025-05-07T16:30:38.630000 CVE-2025-3506,0,0,2cb7dd6bbf56ec7a1271ba0855665acb3addde320f586d229e2ed1fc18ebe38d,2025-05-08T14:39:09.683000 CVE-2025-3509,0,0,96ce11e8415b6fa7a6d814b563a660b77be726c43a7ecd1b450b2b36646bd53b,2025-04-21T14:23:45.950000 @@ -292988,7 +292993,7 @@ CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e182 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 CVE-2025-3580,0,0,fb5209c3cd7ebcd66c15bce657f3ddb23cbe27d0c5d33814deb9407bd651e1de,2025-05-23T15:54:42.643000 CVE-2025-3583,0,0,5e828bc2ad696ee8fcb9f09a10e41d54b38effce4c0c5b61566233d5e9eb1a29,2025-05-07T16:36:47.020000 -CVE-2025-3584,0,0,b40c53097d58b514bf7bf194d89616a9fe4d2fe085d4f25d2179665b41345b9f,2025-06-03T16:15:24.937000 +CVE-2025-3584,0,1,6dc075728cd49538f20984d36f6012888754a0af32a808874e7113d400c64072,2025-06-04T14:54:33.783000 CVE-2025-3585,0,0,793d014b8d4f8a0338ac5bc0543e903589c1e8b4dc1d9fc37efe0dfb6e2b3b88,2025-05-21T20:01:00.620000 CVE-2025-3587,0,0,24a9d7f002b5d3dda78896e9b2347c9c9868aa706322ae2e0fbf5aeb34b2cb44,2025-04-15T18:39:27.967000 CVE-2025-3588,0,0,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000 @@ -293053,11 +293058,11 @@ CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000 CVE-2025-36558,0,0,f7ba1efb73da33ba35418104474d3de926b1549af2f93d6130fc139c04b0fc60,2025-05-02T13:52:51.693000 CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf79d8,2025-05-19T13:35:20.460000 -CVE-2025-36564,0,0,a2533d975a72c787726d963234957c35e86278b6e196783fbd751c9900d3950e,2025-06-03T15:15:58.600000 +CVE-2025-36564,0,1,f446e566baff1cdb9604912d945d5cdc052f4905557c8c5952132ba86a364f20,2025-06-04T14:54:33.783000 CVE-2025-36572,0,0,058b67de5ee82f1e6220c3754353a9e125a12fbf0176dd2f3a1d9ddfb79707a8,2025-05-29T14:29:50.247000 CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000 CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000 -CVE-2025-3662,0,0,1cfbd7cab63bed32269f0525b2df241debfc8850217743345174c97a538d24b5,2025-06-03T16:15:25.073000 +CVE-2025-3662,0,1,3576d1b5b8a003fdfe493a63d963a2565d72251b1680d19c7edb80e5d0e0b9c8,2025-06-04T14:54:33.783000 CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000 CVE-2025-3663,0,0,8e1f6f32c25b3b8d1ec3b3a3f1e13e7a7d56fd1e7c8e37fb37a5c673e5d21e5b,2025-05-12T19:50:03.073000 CVE-2025-3664,0,0,8622093c787fd6e9e1b160486bb91e2aaa36ebec298b1306944080b7ed6d8600,2025-04-22T16:53:30.190000 @@ -293235,7 +293240,7 @@ CVE-2025-37815,0,0,01be70362e7082c681be8de2916ea468039f38138e13d447479ba33454631 CVE-2025-37816,0,0,d2fab0d097274f61049d8e3866fb334569bee76c284690b43034ff4140fcb52b,2025-05-08T14:39:09.683000 CVE-2025-37817,0,0,c1c74edec3ebca6b733dcd22ed71dd1f8cfe9445b8ec44b7a6e2a3b15335c3d9,2025-05-08T14:39:09.683000 CVE-2025-37818,0,0,e2d343839e3a5b57f8655a2d595dfabc934576f682cf3ddbaf63d2cc0c942c18,2025-05-08T14:39:09.683000 -CVE-2025-37819,0,1,ef73488b2b66e149932bf4168928e2a0094f05fd087bf02a5dea7db739173008,2025-06-04T13:15:26.007000 +CVE-2025-37819,0,0,ef73488b2b66e149932bf4168928e2a0094f05fd087bf02a5dea7db739173008,2025-06-04T13:15:26.007000 CVE-2025-3782,0,0,e321aa91abf3b9aebfddc9158a39ba1034792d6dc6924752054612ca966a4b21,2025-05-07T14:13:20.483000 CVE-2025-37820,0,0,07b720f41c13319922ab7110691e34cd312eecb8e936f78160a56dd2e03ad7ae,2025-05-08T14:39:09.683000 CVE-2025-37821,0,0,357b1c4d7665ec49e8f2be1658872793179d340fe866355b6944224f4513027d,2025-05-18T07:15:17.197000 @@ -293313,7 +293318,7 @@ CVE-2025-37887,0,0,d501e8e6d87ed1b8b737a5e7088d34606bd3e31077eb75368763db3ddc244 CVE-2025-37888,0,0,020014162238f41e67f19d15a1e158498825e45c700cbc137777680b255d6dce,2025-05-12T17:32:32.760000 CVE-2025-37889,0,0,d691a0462d6d1c4318e7a1bd59d81a6ba15cdd959088d1461a482fccaccd9c7c,2025-05-12T17:32:32.760000 CVE-2025-3789,0,0,45bb126f4667ed3adb0e27c72ef15ba951797eb40c6f6ff30eb38b571923593a,2025-04-21T14:23:45.950000 -CVE-2025-37890,0,1,8d41bee0a02db946f720e7a761d6cfd46b40762ddf29a8209d792c3c786448de,2025-06-04T13:15:26.170000 +CVE-2025-37890,0,0,8d41bee0a02db946f720e7a761d6cfd46b40762ddf29a8209d792c3c786448de,2025-06-04T13:15:26.170000 CVE-2025-37891,0,0,dd8d38c07b085cbcd296f90abf5dc3236c1f0226591554d20c46afd843047c7e,2025-05-19T13:35:20.460000 CVE-2025-37892,0,0,46419048357e32c797b70fca1c97c8b1dcf7bc4b568868af8b9e5a4794acb8df,2025-05-21T20:25:16.407000 CVE-2025-37893,0,0,1c7e00a1f138c68a8becda210a2f7f5c050b21926a88bd645a98ecd2f3dbe99c,2025-04-29T16:54:26.433000 @@ -293333,14 +293338,14 @@ CVE-2025-37905,0,0,a11e4e4b2ff1e902f5216caa84d68cc5ce5943e440da9aa8df250dd8c479c CVE-2025-37906,0,0,1ea871c4320b1ce33d870d37a826dcd18ee7638d6dd4cf52ddc014f817e0bad0,2025-05-21T20:25:16.407000 CVE-2025-37907,0,0,d6b71d14dd2f85d7a5b211858ba89363f4afde488dbdb13a1da0238711b487c8,2025-05-21T20:25:16.407000 CVE-2025-37908,0,0,898bcaef08feb30cdf7e38b13259edfc42b2a4ae1227a30be29810833c8a4afc,2025-05-21T20:25:16.407000 -CVE-2025-37909,0,1,e7c174698e2e1bb9a83db009e309c1eb0a9b1a186e44b687855f7d97d68545f7,2025-06-04T13:15:26.290000 +CVE-2025-37909,0,0,e7c174698e2e1bb9a83db009e309c1eb0a9b1a186e44b687855f7d97d68545f7,2025-06-04T13:15:26.290000 CVE-2025-3791,0,0,d20c33083bfd93e39f5a750d845cd16bd304a896ad925ca36e8b55aad2095ef6,2025-04-21T14:23:45.950000 CVE-2025-37910,0,0,5feaebf746115510224d2ac91fd51599ebcc3d097977fd83e009868d4eedefb9,2025-05-21T20:25:16.407000 CVE-2025-37911,0,0,95acaf01dd9bc5ab77d0d378d57ade0f0cf711e756a442f79200fb07fb414a87,2025-05-21T20:25:16.407000 CVE-2025-37912,0,0,df0e8c2f7ec5599f06746783479134bcaa489f4e4be864cad2b7ffe430f17ed0,2025-05-21T20:25:16.407000 -CVE-2025-37913,0,1,dadd854f4f233eac171d9b83af441739fb901bb46b7a905430517bf2319c89ad,2025-06-04T13:15:26.490000 -CVE-2025-37914,0,1,1bd2e11276bbb1094d74d2ab68551c216c7a0f340d69651db4555027f1b867c5,2025-06-04T13:15:26.610000 -CVE-2025-37915,0,1,ebbb2f7094ed41f233f086fc26b9ab080585613a5ae0d120163ca9227c4a88a2,2025-06-04T13:15:26.730000 +CVE-2025-37913,0,0,dadd854f4f233eac171d9b83af441739fb901bb46b7a905430517bf2319c89ad,2025-06-04T13:15:26.490000 +CVE-2025-37914,0,0,1bd2e11276bbb1094d74d2ab68551c216c7a0f340d69651db4555027f1b867c5,2025-06-04T13:15:26.610000 +CVE-2025-37915,0,0,ebbb2f7094ed41f233f086fc26b9ab080585613a5ae0d120163ca9227c4a88a2,2025-06-04T13:15:26.730000 CVE-2025-37916,0,0,db3c52f689be2254345d5a76fbf1d6825c9a4a3781ac2a5445a346849ee60466,2025-05-21T20:25:16.407000 CVE-2025-37917,0,0,8e784200efb3160fc03b9429d8e2f53f15bf8ddf10ab928ac4b3ff73fef12d12,2025-05-21T20:25:16.407000 CVE-2025-37918,0,0,937aed34bff4bcb28dc86b54e04bf817bbf919db2c89ad3b053208051abda914,2025-05-21T20:25:16.407000 @@ -293349,17 +293354,17 @@ CVE-2025-3792,0,0,835915d780849fbc874e41c4b7de71b3d488ecd3483cf36e64bf5cb8084059 CVE-2025-37920,0,0,a19f8821aca92b84382f5f4fb63ec9413e20e91027ee4cd1955d1c0190b975e9,2025-05-21T20:25:16.407000 CVE-2025-37921,0,0,679e3172789a124bd02121e677adf066ac9319bf6e50d28a7e41141d65a3dc24,2025-05-21T20:25:16.407000 CVE-2025-37922,0,0,fb17d6cf8e006373c474fcbd58ce4b484035afa4114963a8b9328f38a4e170ba,2025-05-21T20:25:16.407000 -CVE-2025-37923,0,1,ec91b499fe8c7adfe37f03d631d3d46f722204b4a96c4006b78af2b06a2da212,2025-06-04T13:15:26.850000 +CVE-2025-37923,0,0,ec91b499fe8c7adfe37f03d631d3d46f722204b4a96c4006b78af2b06a2da212,2025-06-04T13:15:26.850000 CVE-2025-37924,0,0,fde7c9dc4cad3a988484f02075fc51cd1dbdb1ca9c6a70d597078bd361e9e9c3,2025-05-21T20:25:16.407000 CVE-2025-37925,0,0,f9576aed7c518b4f5aed7f76e7af003aca63baedaee9d9ef54d00e1623484d9b,2025-04-29T16:44:08.020000 CVE-2025-37926,0,0,0db68f314498f5ce3030e6ed36c29158ffd0c1c682538766b07862045049da78,2025-05-21T20:25:16.407000 -CVE-2025-37927,0,1,672441108a2edbb0440eb11102b0fd4d5a526f7acc04867ad6e92e941483aa30,2025-06-04T13:15:26.970000 +CVE-2025-37927,0,0,672441108a2edbb0440eb11102b0fd4d5a526f7acc04867ad6e92e941483aa30,2025-06-04T13:15:26.970000 CVE-2025-37928,0,0,d8ac99563646ec7da9bdb178b0de5755dfecc7abcd2cf9e3aa153e0eaef42879,2025-05-21T20:25:16.407000 CVE-2025-37929,0,0,70ef1abd670144c0539d8d2e83064f1b02315e3557933bd631249dea78262049,2025-05-21T20:25:16.407000 CVE-2025-3793,0,0,3fbdfdae3ba2312385d1e55e1013c3bba14ef84080933b19af3e5f161d0c534e,2025-04-29T13:52:47.470000 -CVE-2025-37930,0,1,a71c4531278bedb85da54e4d54566b10d2dfe62854843f9ab9b07cd86363e648,2025-06-04T13:15:27.087000 +CVE-2025-37930,0,0,a71c4531278bedb85da54e4d54566b10d2dfe62854843f9ab9b07cd86363e648,2025-06-04T13:15:27.087000 CVE-2025-37931,0,0,014de349b476a30edaee40d5b8f26a30278ec2b5798290d6c384bd353256f410,2025-05-21T20:25:16.407000 -CVE-2025-37932,0,1,e22191e3a51fdbd65e461ab2310801c68ab138ce96b03f5ec3696a2eaa4877fb,2025-06-04T13:15:27.210000 +CVE-2025-37932,0,0,e22191e3a51fdbd65e461ab2310801c68ab138ce96b03f5ec3696a2eaa4877fb,2025-06-04T13:15:27.210000 CVE-2025-37933,0,0,0037f071010caedc2b8388e04a0e9494442d1c3624edc4d6fa053aebbd14388c,2025-05-21T20:25:16.407000 CVE-2025-37934,0,0,0d6b8d36f363884b8ed84b985147c916ab6c8e6b878ce9be371fdc567225b995,2025-05-21T20:25:16.407000 CVE-2025-37935,0,0,363721af6fb6cbbe132a9c6fd6830539d759e6747afc791e2fd0161be19b77f9,2025-05-21T20:25:16.407000 @@ -293377,12 +293382,12 @@ CVE-2025-37945,0,0,5e8404902bfb92e4ab915987778a98c7cc4ea7aa145324cfccd5caa79cc92 CVE-2025-37946,0,0,8fb31f11d448e88aa233be66096b812a67e07de7585a485a90fc6530edbc9122,2025-05-21T20:24:58.133000 CVE-2025-37947,0,0,0e7060e1dfc725875c5c6a697df71c440b65488418c3ebc515395f22996575d8,2025-05-21T20:24:58.133000 CVE-2025-37948,0,0,a7eb8c602eca8711c4f74e1ef92c559bb0a071e57c88693866be24671f03b5bc,2025-05-21T20:24:58.133000 -CVE-2025-37949,0,1,6781a543704e9c013f18da825905061806d97ec67924a9c9ebcb6596075df88c,2025-06-04T13:15:27.320000 +CVE-2025-37949,0,0,6781a543704e9c013f18da825905061806d97ec67924a9c9ebcb6596075df88c,2025-06-04T13:15:27.320000 CVE-2025-3795,0,0,76d259997892e849d7fdd617e0e88fa943927e768558d8d394746f81795a3a48,2025-04-21T14:23:45.950000 CVE-2025-37950,0,0,7dd34153c93b256b4603b83fe921bd259fcb53bbfd822ed55f05670c1a551689,2025-05-21T20:24:58.133000 CVE-2025-37951,0,0,2e0be64448847add7d7185131c5966221f8d19a68626578ad4f84a8657563545,2025-05-21T20:24:58.133000 CVE-2025-37952,0,0,330364de26045fccfcea483eaaa1b37ca8b4292d3098b06d42eed78ccf3feff6,2025-05-21T20:24:58.133000 -CVE-2025-37953,0,1,9821136848bf44cd5e4739b700af75ed889c389324354cd9395b8e4aee22a53f,2025-06-04T13:15:27.437000 +CVE-2025-37953,0,0,9821136848bf44cd5e4739b700af75ed889c389324354cd9395b8e4aee22a53f,2025-06-04T13:15:27.437000 CVE-2025-37954,0,0,c8304842483255c84056910b5f41e9fefcdb60675fe160363df0dde6a3322319,2025-05-21T20:24:58.133000 CVE-2025-37955,0,0,16b831f7b5b17e72654b35ebec9fb3e64c8140d878682a27805610895061fa5e,2025-05-21T20:24:58.133000 CVE-2025-37956,0,0,59f25ce65fedcad266851257ed4310cb62aa89d15e82a2b7edca1bd1be257fdd,2025-05-21T20:24:58.133000 @@ -293399,9 +293404,9 @@ CVE-2025-37965,0,0,611e088d3be8c9e054c909e6d461516531481b516ac1ae832b3fabc5bd340 CVE-2025-37966,0,0,5c8084ef4b16dd32444c0e83039a9c9a7f5e76822662eef8063d1e5943442e73,2025-05-21T20:24:58.133000 CVE-2025-37967,0,0,e5fa6345ee01174a549f7578d037f80f934b0c19e446dafa1b92c3ba762f6ad9,2025-05-22T13:15:56.110000 CVE-2025-37968,0,0,4a108612d109eb7f9783dfc56d33ebc9f41288f8d822e7cfb26c542d8d6ebe4b,2025-05-22T13:15:56.220000 -CVE-2025-37969,0,1,010644874384aefa817d8d6db8059eb87a98e22ad4c791465a56507c3d8ae00e,2025-06-04T13:15:27.550000 +CVE-2025-37969,0,0,010644874384aefa817d8d6db8059eb87a98e22ad4c791465a56507c3d8ae00e,2025-06-04T13:15:27.550000 CVE-2025-3797,0,0,b4b0d73fead7954db5f04f38560e865b1311d2a480f141cc59f333fed0f5e8a7,2025-04-21T14:23:45.950000 -CVE-2025-37970,0,1,216a668b595c16fa2399564aed0127b41fcbbd937980328162fc95ee9d650d7d,2025-06-04T13:15:27.677000 +CVE-2025-37970,0,0,216a668b595c16fa2399564aed0127b41fcbbd937980328162fc95ee9d650d7d,2025-06-04T13:15:27.677000 CVE-2025-37971,0,0,e679e7e99f48d420591c2d31a8ca35892bb2cdcd9c675f4497e4457f0044a57c,2025-05-21T20:24:58.133000 CVE-2025-37972,0,0,b15ae4fc86e052083af22de60aa6da57fa73e9532de64fe0449a27ed90753607,2025-05-21T20:24:58.133000 CVE-2025-37973,0,0,367e5dbd70a49f01e8e8ad453981bab4bc634a7ad8d4b04ba1668ecaee77cb9e,2025-05-21T20:24:58.133000 @@ -293419,19 +293424,19 @@ CVE-2025-37983,0,0,4c1628e8ed62a9217bf160c1b6ff5b50d5ff00c21bcc34a21163b8bd46b8e CVE-2025-37984,0,0,60d0a45836d50afc53f7330261ae4213a629e28483684c41a86521346f7e4662,2025-05-21T20:24:58.133000 CVE-2025-37985,0,0,9fa8d62fe4c766b7b56c463949795268cf27120e5bbb53f65e4d9d8af6135c0a,2025-05-21T20:24:58.133000 CVE-2025-37986,0,0,084ebc52ca5420204a9b5f470ebeed7c5d3b6bd24c3557d1564a51aa4c16ec03,2025-05-21T20:24:58.133000 -CVE-2025-37987,0,1,c3016b9f89ba6c7d54006b656eab4f999cf0959161824e1ce1432083e0d19270,2025-06-04T13:15:27.810000 +CVE-2025-37987,0,0,c3016b9f89ba6c7d54006b656eab4f999cf0959161824e1ce1432083e0d19270,2025-06-04T13:15:27.810000 CVE-2025-37988,0,0,34958ee37db596ec690e32aa2b883994326eb552c5225088ddae42051f694ba6,2025-05-21T20:24:58.133000 CVE-2025-37989,0,0,f5298a88e932cc795b44e97e61429316df7f7b85e6035cb5ddb96aa18090aa93,2025-05-21T20:24:58.133000 CVE-2025-3799,0,0,236fd09211b9b7e24fb99aaaa780d5e7d68a70296647a11535d23ccab23988ae,2025-04-21T14:23:45.950000 -CVE-2025-37990,0,1,9cbda3cdb74c7773d6d4a36a179543ca72799c58e725a08b1998214f7cef96e6,2025-06-04T13:15:27.940000 -CVE-2025-37991,0,1,88310b5176778a9a3bfb71848b644f6f7ad8cc678680f0ddea21132e772928f4,2025-06-04T13:15:28.053000 -CVE-2025-37992,0,1,d9ef1126cd9d36bb544d5909f6edafc90105db392de94c58576bda527aed58de,2025-06-04T13:15:28.170000 +CVE-2025-37990,0,0,9cbda3cdb74c7773d6d4a36a179543ca72799c58e725a08b1998214f7cef96e6,2025-06-04T13:15:27.940000 +CVE-2025-37991,0,0,88310b5176778a9a3bfb71848b644f6f7ad8cc678680f0ddea21132e772928f4,2025-06-04T13:15:28.053000 +CVE-2025-37992,0,0,d9ef1126cd9d36bb544d5909f6edafc90105db392de94c58576bda527aed58de,2025-06-04T13:15:28.170000 CVE-2025-37993,0,0,c5f22c3347286a5ccf77470fb26af69267bc4cb6bf54f1ce35afce4b34dd4a82,2025-05-29T14:29:50.247000 -CVE-2025-37994,0,1,c22fade390809c66912f06b291191b84cdc40da333c2f7e52f813929efd4aa63,2025-06-04T13:15:28.283000 -CVE-2025-37995,0,1,31e99134060d89cfa86b27a8442619ed791aa4d30200b56428c5f02bdd555985,2025-06-04T13:15:28.403000 +CVE-2025-37994,0,0,c22fade390809c66912f06b291191b84cdc40da333c2f7e52f813929efd4aa63,2025-06-04T13:15:28.283000 +CVE-2025-37995,0,0,31e99134060d89cfa86b27a8442619ed791aa4d30200b56428c5f02bdd555985,2025-06-04T13:15:28.403000 CVE-2025-37996,0,0,e73ef6cb5a03c3a927ca6a5b120d5d1f99d2df7e0f98386b555c568209e3c939,2025-05-29T14:29:50.247000 -CVE-2025-37997,0,1,4819ef1d8db92e93f1def7730cd468798950d519dee1c3a5b4b3fa61f9a7dcab,2025-06-04T13:15:28.513000 -CVE-2025-37998,0,1,8b3a033de28c5250b92a20ec6656f25a5a6c680db94b831dccabfeb3cc39de92,2025-06-04T13:15:28.633000 +CVE-2025-37997,0,0,4819ef1d8db92e93f1def7730cd468798950d519dee1c3a5b4b3fa61f9a7dcab,2025-06-04T13:15:28.513000 +CVE-2025-37998,0,0,8b3a033de28c5250b92a20ec6656f25a5a6c680db94b831dccabfeb3cc39de92,2025-06-04T13:15:28.633000 CVE-2025-37999,0,0,a517cad338986973fd796cf391804bbba29e3fb988c03d4bcd238ff9e8610f40,2025-05-29T14:29:50.247000 CVE-2025-3800,0,0,6a524157d3ca2737fe4416bb6e9cbf5012a795b031353ff787810fd4eb72a4b6,2025-04-21T14:23:45.950000 CVE-2025-3801,0,0,6b6ff942433f61f662faba2077e387c7e727543b5aa46dfc81789b9bc5de9c1b,2025-04-21T14:23:45.950000 @@ -293545,7 +293550,7 @@ CVE-2025-3915,0,0,935e1ecf27d5fa416e70025659f2128a11b3a8714dcda09369d7a411a3da3b CVE-2025-3916,0,0,045ece3601bd5ccbedc31ea0240de6aa0afd0b9d1478dcdfa2e80b8a58fde7d6,2025-05-13T19:35:18.080000 CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000 CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000 -CVE-2025-3919,0,0,48fb0869933f7ce09ab76303acc656940035ec6365dfb8a6e2213932a18e943f,2025-06-02T23:15:20.757000 +CVE-2025-3919,0,1,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000 CVE-2025-3921,0,0,9797fba579692252283cd90745f54a1a6a5a7131fc66f684fa524a93339f9b2c,2025-05-07T14:13:20.483000 CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000 CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000 @@ -293895,7 +293900,7 @@ CVE-2025-4038,0,0,811046a13e982bc58a873e9f3dcdd8f0924b9962b393b0dcd42ae969573255 CVE-2025-4039,0,0,82997abe4f3d1a06f2c0c0c7affe39718ef0820c54c5fc54b87a7722e7f87a51,2025-04-29T21:08:47.950000 CVE-2025-4041,0,0,81f238f672f184f46ddf27c78435ddee43bf5343b5983877b97d104b8691f898,2025-05-07T14:13:20.483000 CVE-2025-4043,0,0,c5f411ffc1c0bfefdd17b991af2ebe0c8e5cb9dbd004f8186edb3edb010429e3,2025-05-08T16:15:28.283000 -CVE-2025-4047,0,0,836a95dd65686d0d682016e6fd63c4ead0b69b0b35553658665e8685f649c276,2025-06-03T03:15:27.910000 +CVE-2025-4047,0,1,697dde15b783c10558b99d9c3867d89fa2dd1910aca7332b9ebaf25195362a97,2025-06-04T14:54:33.783000 CVE-2025-4050,0,0,ccfe15f2834569ec41cc4a482172c37e9ee278c6a1d3b20eba7b56bd00075454,2025-05-28T20:08:51.557000 CVE-2025-4051,0,0,ff804ba52545392d7d95b067994000fe8637ebe480f1a272e743d510a5634584,2025-05-28T20:08:14.553000 CVE-2025-4052,0,0,517c90a400d1c4a1769ad78093028d80e32695c5738c9e0a5933de416f48d31d,2025-05-28T20:07:45.097000 @@ -294045,7 +294050,7 @@ CVE-2025-4136,0,0,b8475b2b882f1f1345ee88b0d17b9c4d6134110c252d26b338548acd634728 CVE-2025-41377,0,0,82ea15ae2890a38734e5e2f1f2c12a7594e41baf3f931c262286eb5faac8ce5f,2025-05-23T15:54:42.643000 CVE-2025-41378,0,0,5b6d8d5c702a8167efa977dcd19f35f0ca2360c022be8191a2107adcf7208804,2025-05-23T15:54:42.643000 CVE-2025-41379,0,0,f86511b9b1e0ab25605878d94a89c39fe68bd0e872e48361b86d201a5e51e7e4,2025-05-23T15:54:42.643000 -CVE-2025-4138,0,0,e84dabe01c3fdab4c4cca1263f006e46b57de6ffce446eb0d587b9c00d097405,2025-06-03T21:15:22.687000 +CVE-2025-4138,0,1,e7f056c9018dd391e1d53a4ea1f454274938ad4a295ebdfa4db295fc72471ce0,2025-06-04T14:54:33.783000 CVE-2025-41380,0,0,6a50932054dc502ee7c0d77cfea4430344ce4717310545d50ac9fc3a7b76dc81,2025-05-23T15:54:42.643000 CVE-2025-41385,0,0,f202cf376f952bff64515c4550ff9565840ff906c956113907527beb89e5cb1d,2025-05-30T16:31:03.107000 CVE-2025-4139,0,0,5054f893b63e445c1832a76be273932e408388835ee5cae9b0b72cff821e3844,2025-05-02T13:53:40.163000 @@ -294061,7 +294066,7 @@ CVE-2025-41414,0,0,e15bca7d4059421d15d5cb35dc483cbefc52e8d9cd9f55b31b9d84f79a125 CVE-2025-4142,0,0,78a1ea715ae46e4bda0a693a8542472224c3dca467cf3911b9ec4f409b46b000,2025-05-12T19:39:50.053000 CVE-2025-41423,0,0,3ae1e637900a2dfc5b6bacaa494e26a0b5d8e1e48accef6073153be61f7a9347,2025-04-29T13:52:47.470000 CVE-2025-41426,0,0,43242131e19ec18f330497e91493c38832fad38a58a843ab859c1d5a86371244,2025-05-21T20:24:58.133000 -CVE-2025-41428,0,0,05da2590e70d1e08d485e3c1627cbb1dfad00722d6df324d58ae8555e7344690,2025-06-03T08:15:19.467000 +CVE-2025-41428,0,1,fc08f7ea35799ab3606cd46f1d07e20352e815aa53e1342e37daae2258efbd39,2025-06-04T14:54:33.783000 CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17fbc,2025-05-19T13:35:20.460000 CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000 CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000 @@ -294131,7 +294136,7 @@ CVE-2025-4197,0,0,ed8ec740b973b92253a741cf6d5d0ac209bbd44763ac57f0fdc0af84aaf28e CVE-2025-4198,0,0,e5602874b7c5cc6f9012651f4a60dc8d2e789373501ddfec072de22c80a74167,2025-05-05T20:54:19.760000 CVE-2025-4199,0,0,553c17b65a2b6efd623dda6e1567d529495701f64dcb6b078b725c7f2893112f,2025-05-05T20:54:19.760000 CVE-2025-4204,0,0,add65f309bdc246d6795c562286e41c6c66577fba27c15ab2d96b83692acdeca,2025-05-02T13:52:51.693000 -CVE-2025-4205,0,0,2c141e5d9e41338cdcd1ebfdf5579522051df0e6935c94c94147aa7b09749577,2025-06-03T12:15:21.350000 +CVE-2025-4205,0,1,e5c422efa7296a5f9776daa32028189294bed6a05affab60f37bd65665314bf9,2025-06-04T14:54:33.783000 CVE-2025-4206,0,0,bb3cb9f07bfc9d08a2c0843d010f353ba8ba2d3caafa1bbc30e33b9667f14930,2025-05-12T17:32:32.760000 CVE-2025-4207,0,0,98d1135f1a385487da30c39cd5b8b4714c39d026b29a623db1f9e974ad20dd9e,2025-05-12T17:32:52.810000 CVE-2025-4208,0,0,cc84649383f4f5239cac290e4c572d2111da796611d3a4f7f84518996f0b2e35,2025-05-08T14:39:09.683000 @@ -294148,7 +294153,7 @@ CVE-2025-4220,0,0,5c86caee7e1d137cda1341728be0ecf7fbbff93f4260af3080c92a642cb601 CVE-2025-4221,0,0,0fd12a0e5b55ee42c307389a259ec1bd53c25a7a1b0cd952ead8bf19842b795b,2025-05-21T20:24:58.133000 CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208bc3,2025-05-13T18:15:41.657000 CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000 -CVE-2025-4224,0,0,bacedcc2a915ca9baa74deee54ca1a1e788f8cb42cf9f1bfafe6bf4f19529220,2025-06-03T03:15:28.093000 +CVE-2025-4224,0,1,1207737d79a1e90fb6c077a6a1097540732fecbc5b6d096024f04eb01ab32d8d,2025-06-04T14:54:33.783000 CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000 CVE-2025-4236,0,0,4a998b3d009e2e5b8d6c745dec0a05483fadfb16e9111b778387c6694f340a68,2025-05-16T15:04:03.170000 CVE-2025-4237,0,0,6e9102316b2d9622f5dbc1640c375fa9a5bfea77a1257bb79b559d426c098991,2025-05-16T15:03:54.820000 @@ -294254,7 +294259,7 @@ CVE-2025-4326,0,0,b744367347fcdc6325488ca30d0fb2ae6b89ccb51a35e88456cf45435deb24 CVE-2025-4327,0,0,b094135b5b47a7bd79bfcd45815e0460a9020df27d7ecc56f318e0e775dfd78d,2025-05-07T14:13:35.980000 CVE-2025-4328,0,0,e8bdcc0bd3fa88242159a44c5ca54793c131dd6edc873e6391897450ed26b86c,2025-05-07T14:13:35.980000 CVE-2025-4329,0,0,f1d879305600d1c851583b5c74d0d1aabeddb925980971909508f84a0c2f2037,2025-05-07T14:13:35.980000 -CVE-2025-4330,0,0,2cd951d0dc80b0d2640bcab44a88a7f687176c82103eb26cc436c950261ac356,2025-06-03T21:15:22.800000 +CVE-2025-4330,0,1,84e75ef63f996c57f2bc5a8781a2570e6b916f66000c210b824b7672d1ad3000,2025-06-04T14:54:33.783000 CVE-2025-4331,0,0,620e0da85354d81a367a41b7f2e39eeaeb31d846f9c0b35d1175b07ed628b224,2025-05-17T15:15:46.090000 CVE-2025-4332,0,0,db3fe613c2dc0144a41ad5ccdf0f64634590f7b602471c6e9907c2e2377073ab,2025-05-09T13:36:24.223000 CVE-2025-4333,0,0,df346cc767abe9739cdcb38e3128deec2b82a2cef52e4ce255a43a7764d0a6a8,2025-05-07T14:13:20.483000 @@ -294383,13 +294388,13 @@ CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9 CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000 CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000 CVE-2025-43919,0,0,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000 -CVE-2025-4392,0,0,dac40497d85d0008ac6df90c7725f33db178c5c730ecf0a95d45819f9fba527e,2025-06-03T10:15:22.397000 +CVE-2025-4392,0,1,ad8765de95d96f5f3ecd2241de3d94570cd4dddcf644fe825479abad5b84f49a,2025-06-04T14:54:33.783000 CVE-2025-43920,0,0,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 CVE-2025-43921,0,0,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 -CVE-2025-43923,0,0,da6e8263b74032f35bf428bc0766d5001c56f7c5442e780f5e968168aaf9acbb,2025-06-03T15:15:58.767000 -CVE-2025-43924,0,0,7bd9370679e298fe3412475b90e04f5f5caebf7be0bfaac9bee8139c30da1039,2025-06-03T15:15:58.883000 -CVE-2025-43925,0,0,eace4978fc4daa220a3cc7855aa7f60818a2dad1bc90af4972623202cacceb08,2025-06-03T19:15:38.960000 +CVE-2025-43923,0,1,ebb574b1e7481247030607edc53350b7e99cca638a1666b02a6fa67aa0715482,2025-06-04T14:54:33.783000 +CVE-2025-43924,0,1,784893f54887a7bdd79bcfa682125ccd13cedbd19d7ae92a578ebf9950e1df6f,2025-06-04T14:54:33.783000 +CVE-2025-43925,0,1,cb6260eff16c989f0f3892d6f36d7e2887b1529655ecf02afa4a17366917c277,2025-06-04T14:54:33.783000 CVE-2025-43926,0,0,2f3d1ec98578fa56e3654b3927ae44c5545787a634e6f39282c1fc647bb3404c,2025-05-12T19:15:49.287000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000 @@ -294434,7 +294439,7 @@ CVE-2025-44115,0,0,e194432c2a2036df7d0b31d6e2d69e2975f046b3a7abf8ba3214d5e1e234d CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc19,2025-05-28T15:01:30.720000 CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000 CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000 -CVE-2025-44148,0,0,93aff80f98678639b3aaf13a6bf91053b2fbdd7237bd1571e35a4f20f8d9d55d,2025-06-03T16:15:25.210000 +CVE-2025-44148,0,1,1651fccdbd5410d0e5da65453bd38e6424c23df6ed296570ac340e2703b11b24,2025-06-04T14:54:33.783000 CVE-2025-4415,0,0,842147d08c13efcbee3eee94c9e6b73fdc7bd886265d0112fafca4c76640377e,2025-05-21T20:24:58.133000 CVE-2025-4416,0,0,947e34b55b1f3a049a504a042d77855f4bb594e5af127c8b711744c73ee871aa,2025-05-21T20:24:58.133000 CVE-2025-44172,0,0,c78f9d9932a5093f6fd2dd92edb0ece1c73f28734d84b3772f8246b249ade2e9,2025-06-03T15:55:33.757000 @@ -294451,7 +294456,7 @@ CVE-2025-4419,0,0,280ab2097f0627a87fc9bc990e1fbeb501026297486a153453a713f412e7cb CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db312359e8,2025-05-12T19:42:18.530000 CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000 CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000 -CVE-2025-4420,0,0,ce038fb29a6692be764c07fd478227cfce695047a961e4cb45ef9ab346d0ddd9,2025-06-03T09:15:22.673000 +CVE-2025-4420,0,1,482e6cb0127b5cd1381f571129f0abb13f48f8e0b486724260c2eec90487cec8,2025-06-04T14:54:33.783000 CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000 CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000 CVE-2025-4429,0,0,fe6071399e142802408b914c5bdedf40a11e5b9791557c888b05a6344723a056,2025-05-30T16:31:03.107000 @@ -294460,7 +294465,7 @@ CVE-2025-4431,0,0,f9a9311c0ec05bc4663ed94b4ec1f8c56db08bd61ae75a55c59b8e564c2166 CVE-2025-4432,0,0,813cec0cb180e837181e2d39de9b9b934de385ad08a799d2cf0711f93bd8b820,2025-05-12T17:32:32.760000 CVE-2025-4433,0,0,21bfa3b45038dc83bff46fd300c483ce25e6e5c5938f9f5483c2a41e15b72262,2025-05-30T16:31:03.107000 CVE-2025-4434,0,0,680d6f1c8416e0c44eb562c208640fb3f26973e13f6fa443eed77fbf8e133505,2025-05-30T21:15:20.920000 -CVE-2025-4435,0,0,4947ce75520a2e3da427cecf7af2eb4233abcfb959158475944f0f5ba2474533,2025-06-03T21:15:22.907000 +CVE-2025-4435,0,1,330345f9ef9ca0539c81f86c17ed81e88f80e212a120bfee9f50aae80581e9f5,2025-06-04T14:54:33.783000 CVE-2025-4436,0,0,85a8f0318ccedc4ef4ef6314b458049fc833acf857a8e235d2ecff13798cf4d4,2025-05-20T23:15:19.440000 CVE-2025-4440,0,0,2664c1cf05645457f92ebc54a1f1ba520a15af0474bcfaabcae2efe1f592618e,2025-05-12T17:32:52.810000 CVE-2025-4441,0,0,b51083d28e8ffdf67b9f556d8821335246ec3c3d0df9af168bdc304029601b6d,2025-05-13T20:23:21.277000 @@ -294604,7 +294609,7 @@ CVE-2025-4513,0,0,07bb12809c9624505f96cc0b646724d4d7277016849e93a883dbac45774258 CVE-2025-4514,0,0,8ec1805f4f97bd70a1c948cf3cee2fc7b4e3869030a6e61bb33b5355ac6812fc,2025-05-12T17:32:32.760000 CVE-2025-4515,0,0,15842f64bc5158ee594ebc8bcc08fddcbccd67b13581d77b6c2aa4b49c2d35dc,2025-05-12T17:32:32.760000 CVE-2025-4516,0,0,796b8f07feac2cf0afff20513d00fadb85e8da28c0408ddb3453089e5fc0ed01,2025-06-03T14:15:49.697000 -CVE-2025-4517,0,0,35cf80c92fa8a493f8ac5520ce5e5ba6df78928172e536649465721ca657b7fd,2025-06-03T21:15:23.113000 +CVE-2025-4517,0,1,1f4ba21389ac3399ab6668c61f5accbece6546594399a508dc9e21dfb48d8b07,2025-06-04T14:54:33.783000 CVE-2025-4520,0,0,2649cd1b163a0622d5bf29e4b3dee5950ca643285f952a7b68fc954427092ffd,2025-05-16T14:43:56.797000 CVE-2025-45236,0,0,4ca5831e33dd66784c123f97c0a9d8265ca1feabbffaf4dc2d39d3c2f66d4ff5,2025-05-06T04:16:13.253000 CVE-2025-45237,0,0,414c6d4926aa8e975f1ceb6a1391c6c89ae9a0f19f49206e4657b3ab23d52111,2025-05-06T04:16:14.413000 @@ -294632,7 +294637,7 @@ CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845b CVE-2025-4536,0,0,a2b8008b92a195b68a0752c6339879ccac94f1f570a919d5eaed929b26125f6f,2025-05-12T17:32:32.760000 CVE-2025-4537,0,0,3541ad22bbf9e4ca3f8ea882220c2357e61730ded40620327b0ee2be0afe12a2,2025-05-12T17:32:32.760000 CVE-2025-4538,0,0,07b4ef4e2aa650ed3e988b65b74042af6da107251586e898e405db2b2886251a,2025-05-12T17:32:32.760000 -CVE-2025-45387,0,0,3143ab702bce51fa769e4b3671b9a2ca7c6c7461b3369ab6ee14ef0e416ad5ad,2025-06-02T21:15:21.913000 +CVE-2025-45387,0,1,bf00bb05a6c842840d9d65e3b1d918bcc6d20792d74ee8202f216c3c50916321,2025-06-04T14:54:53.980000 CVE-2025-45388,0,0,c14b2843d5b1ee33c4fb3ac5bcbe61dc58ca0366a4f22e5c98445035f444d3cb,2025-05-09T14:15:37.813000 CVE-2025-4539,0,0,4cea8fc534f9fe405b8ad908d4e6f097f4382bef617bc18109b8d5e8c637ff6d,2025-05-12T17:32:32.760000 CVE-2025-4540,0,0,8cc0219b9599542c1458321b60f6526b4a06d781c2bf124752cf69c701bf9208,2025-05-23T18:15:36.813000 @@ -294689,7 +294694,7 @@ CVE-2025-45617,0,0,45ec32c91fa8777f902c441e0ad6a5cbb4b231cb8d61355ddcbbf662a9985 CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51137,2025-05-06T04:16:18.347000 CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000 CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000 -CVE-2025-4567,0,0,ffbd9d458f5746aa5a54c261c2936b2984dd23145bb3c1e4e7db600626d86926,2025-06-03T16:15:26.270000 +CVE-2025-4567,0,1,58147eb394708580d7afe585e734cf01dd405d0c4de5ce4464b448a64c2b1169,2025-06-04T14:54:33.783000 CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcfb5,2025-05-16T14:43:56.797000 CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000 CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000 @@ -294699,7 +294704,7 @@ CVE-2025-45753,0,0,bd8859423a7b6be70ae6e0c0e7986212e85d9a790b182801d5c120cdc8ff4 CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000 CVE-2025-45755,0,0,3aff4885389fbce13fd812aa87a221389577cfe9b3d3275c80864cb5a5e7a902,2025-05-21T20:24:58.133000 CVE-2025-45779,0,0,c093a7d91bfb997294cab32f2ebe8a712075ae66c80f7c18bdd9520e3509f542,2025-05-12T22:15:26.173000 -CVE-2025-4578,0,0,2d64f22b15db76e0faf8c3dc454ef4649c90747fccfc4750e1699d7d63a1e278,2025-06-04T06:15:21.673000 +CVE-2025-4578,0,1,dad785b4efa32af5ede259d533fb52eadec49a3d03d5efde2e1a6f2ab57aa391,2025-06-04T14:54:33.783000 CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000 CVE-2025-45788,0,0,d9b27095f0d050912ccc839258566df73a65f9582f737413f53a8385c0736d6f,2025-05-16T15:38:16.100000 CVE-2025-45789,0,0,f858160e07c58f9fe8a5fa9cf4efea0858513974ad7eadfd57fc8ba86627a55d,2025-05-16T15:38:07.317000 @@ -294707,7 +294712,7 @@ CVE-2025-4579,0,0,924b6ba5009ddda522b04ef584d0e97bce3f299e29b887355bb9081d0f2176 CVE-2025-45790,0,0,b0642f4c2626cb850c4b1daaecff4bca5077e29c141343d3dcba5de5802f3f9a,2025-05-16T15:36:52.570000 CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c01ec,2025-05-16T15:36:45.023000 CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000 -CVE-2025-4580,0,0,62f1dc8778c5c06789a744262c70ff511387fff17a261844ff49340184fbabb4,2025-06-04T06:15:21.800000 +CVE-2025-4580,0,1,3e10c03c24d2fa721d2d40307e601085a50d8c0c44ab7604d8275f8e00eac1e9,2025-06-04T14:54:33.783000 CVE-2025-45800,0,0,673c9b0455398c84d2c7cc8f61d2a3d3049ebe057c151650e58b4755d18dc3e1,2025-05-12T16:15:25.303000 CVE-2025-45818,0,0,ff70f37828741ec84fd701ec516d2e47fd524f3492e5e5a9b54599674f88a183,2025-05-12T19:15:50.640000 CVE-2025-45819,0,0,953b124c0c056469f51ea2a8b8f4e09e6e367937c93f3e446a0df225a726d4a1,2025-05-12T19:15:50.797000 @@ -294721,8 +294726,8 @@ CVE-2025-45844,0,0,170e4458f6e69c5733a6ca0576787120453cf06374da04006dfb1f43b2021 CVE-2025-45845,0,0,93cb9b992f3083f016f98f51918ecbc05e2ba26a62766c25f0e76aaacb981d93,2025-05-16T15:39:26.913000 CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b231,2025-06-02T17:27:55.547000 CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000 -CVE-2025-45854,0,0,d7f6a10b6413c05e579ff440c489164e43ba35d6ca8e869da685611b87cad1bd,2025-06-03T16:15:25.600000 -CVE-2025-45855,0,0,0e09782588608d75ce046c4a08a620329b0b66d37a417e6c062fe23d2baebfa7,2025-06-03T19:15:39.097000 +CVE-2025-45854,0,1,ca7a3534daf825607fd5c0281c7ca129af19550635f92029e41c985cdddbb8dd,2025-06-04T14:54:33.783000 +CVE-2025-45855,0,1,93e6e50c29da0330b6825dbc4712cfa68cc989f69981bc9eb7685e5938173fae,2025-06-04T14:54:33.783000 CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000 CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000 CVE-2025-45859,0,0,7ccc8c579c3ded8b511a16ef9ebce8f599ee2988593652c331af7f7565fecb66,2025-05-14T15:15:59.213000 @@ -294757,7 +294762,7 @@ CVE-2025-46078,0,0,0eb88b6bfe107f39e1f01c9c7323500ca853b14a91822349f3833fbc9fae5 CVE-2025-46080,0,0,9dac460bdcd48bf067de342a171618029005d40237a5299adf62044164e1ba7a,2025-05-29T15:15:33.980000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 -CVE-2025-46154,0,0,c163f254d02cd8d61a891e3606f69308846a7c7b7635653ada2f8e83982eab5b,2025-06-03T14:15:48.880000 +CVE-2025-46154,0,1,cc2c84cb6e7f168c6e95a099aa414c9be2907f723633807dee885847f32ca0d9,2025-06-04T14:54:33.783000 CVE-2025-46173,0,0,f1e36ec33a02fee01307659dfca8b67a706a6ca070153a7459464089a027cd3e,2025-05-28T15:01:30.720000 CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000 CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000 @@ -294844,7 +294849,7 @@ CVE-2025-46349,0,0,1714a97271744ee922f4bd027ddde23d095fab400e525c7e78a72152293a3 CVE-2025-4635,0,0,dbd97ddcf9f06e6a17bd98831167ca852ef57632eda54b68ef8eca53b0008e92,2025-05-30T16:31:03.107000 CVE-2025-46350,0,0,e9c2d732d02d04db30379a06f4d06a3199d3f19fe29e090eebfdcec4aeb7f535,2025-05-09T13:57:36.823000 CVE-2025-46352,0,0,618391598a4bc31a1d4677ab5a474da78aeac6261ac4ae8b26099a8c01185f09,2025-05-30T16:31:03.107000 -CVE-2025-46355,0,0,1807f41563bddcc346794c010d8d1d00e0f382923616bb8bb587edc58bb97041,2025-06-03T08:15:19.813000 +CVE-2025-46355,0,1,5a064c3f281b9d23670e4671cbb55d7d2442f434945aa8aa1f5e2ef16f08e8ac,2025-06-04T14:54:33.783000 CVE-2025-4636,0,0,42769483161d9081ca44d7da54fb93931edabd656065d5921f77e2f9979ff65e,2025-05-30T16:31:03.107000 CVE-2025-4637,0,0,6a6f5a6b16c4a5dc9c7dfdefe827d1876d1a6cd89fb863be894c5faba3f21b65,2025-05-16T14:43:56.797000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 @@ -294989,7 +294994,7 @@ CVE-2025-46544,0,0,4120aae58d7c5277d6551ad1cdb9c175cafe443f251085276d872524c1be7 CVE-2025-46545,0,0,49c64419c783edc04be167542f9c9c5b3bb0718a9532c122371098e6fd9aab5b,2025-04-29T13:52:28.490000 CVE-2025-46546,0,0,96c9755ac24b0a80a46cd7d4b516355010ab85eac7107b893b6b384fa219f3a1,2025-04-29T13:52:28.490000 CVE-2025-46547,0,0,8acc1afe45e6a60f966cb7e5b4fe1e3f801c3ab7386ec5552ef5a599cdb15e24,2025-04-29T13:52:28.490000 -CVE-2025-46548,0,0,d6dd1f6a9acc386a17a90722db3b4926c5a7fe28e036f4a6d600060207766bb2,2025-06-03T18:15:25.910000 +CVE-2025-46548,0,1,acabdb3c90509c3bb3445c60d32b55e04d824b6d15f9f88ebbd13747e6aca53d,2025-06-04T14:54:33.783000 CVE-2025-46549,0,0,d16e6050d76f8adb18df47e56a286200cdec050678fcac3a8faadc8a470f689f,2025-05-09T13:59:06.793000 CVE-2025-46550,0,0,6a81f91460b68bcff7d1aabec24c95eeb7dcdf5ca7521f79c790b91d18cc58d2,2025-05-09T13:59:35.920000 CVE-2025-46551,0,0,374f0eaea258cbc432bcc1a6904795cec2ccd3999573fed32821ee79090bc308,2025-05-08T14:39:09.683000 @@ -295071,7 +295076,7 @@ CVE-2025-4669,0,0,54ec364588ee900808fd1aa8d968e01bed1a2da1f35945030ba5d2b9e5be2c CVE-2025-46690,0,0,973a37c2db031d79f10319288b5777f494d38cd710bbcf14cf819512ce030af8,2025-05-12T19:31:51.950000 CVE-2025-4670,0,0,b10edf3b6f71bdf8699eb65a94c6cf4caaaea0ef9ffd3b5514b32f41c78e11d6,2025-05-29T14:29:50.247000 CVE-2025-46701,0,0,deda192404567412c4b0078d632358a2acbdb043d7c4dcfd46aed0b54a6719a4,2025-05-30T16:31:03.107000 -CVE-2025-4671,0,0,a3a15760409cc2dae9dd8a50130dcff02497fe88bcaf05bef18e03df780b19dc,2025-06-03T12:15:22.443000 +CVE-2025-4671,0,1,6a90a1a21db3f0dd064a3ae6cf47d91b222f79983dd36d1d7a9509d95c189f20,2025-06-04T14:54:33.783000 CVE-2025-46712,0,0,0c073dcafa656dd770ca6df4993eba5d01868e4680b3acd34dd6f33ce4c7aa2a,2025-05-12T17:32:52.810000 CVE-2025-46713,0,0,52b5f47481eed81cdfa77d7fdf7e1eb397e2770a52108ac1a8158bbb54118740,2025-05-23T15:55:02.040000 CVE-2025-46714,0,0,0a41c2a9ca714c22e2b0866438762cfc18c811db79b3df98db455c7fc3a6108b,2025-05-23T15:55:02.040000 @@ -295120,7 +295125,7 @@ CVE-2025-46759,0,0,d2557e54a1599e07e7f02bcb48bd9d411ffb356c326c34b2d619ada448cc1 CVE-2025-46760,0,0,1aae8a3800bc8e61bd758d95ef9065321ebead4f3e5ea38e1c464070ada44bf6,2025-04-29T03:15:35.613000 CVE-2025-46761,0,0,059f0098d2c689539a71c18076deed8660ffa847e6a284cb8b6f047a46883f18,2025-04-29T03:15:35.670000 CVE-2025-46762,0,0,b5212fa70ab6b97b0e919d84579fe79d985a5fe2c78f1a7b704ec60e1655f94c,2025-05-13T20:25:00.003000 -CVE-2025-46777,0,0,9d54ce0e58a9330b9c6d60d00f2f3f611bbc649137939d411090b14bac09747e,2025-05-28T15:01:30.720000 +CVE-2025-46777,0,1,4c99b3c2cd506dc2615e6e8e33c5b9f4290116b197ae8af42d9b1d5b366de9dd,2025-06-04T15:37:37.577000 CVE-2025-46778,0,0,84fdcd667ddc60ff72e9bc53bf816d5ed8cbe6a8eb95254e6bac35e23e4c18a7,2025-04-30T03:15:19.170000 CVE-2025-46779,0,0,37c24e5b7e4a0045a4d100f0b48f14bc24b2b68a67fe538c22d10ef701f0dd5f,2025-04-30T03:15:19.250000 CVE-2025-46780,0,0,5993d506455854cf118c6763aa0e87cfcb5c499499a4d09b9c1fb1cc0884d3f3,2025-04-30T03:15:19.307000 @@ -295230,8 +295235,8 @@ CVE-2025-4729,0,0,073b70e77ba60376073b6bf036503b0e9d4ab1ba93aced39541912843c902c CVE-2025-47290,0,0,fef9205d946b23690e870377651d8631936053bea9e3a05a823cfda120b52c00,2025-05-21T20:24:58.133000 CVE-2025-47291,0,0,77c2613c093f23da4845bc4516f16594af2697fccb6f4c62fbf6122c314ea551,2025-05-21T20:24:58.133000 CVE-2025-47292,0,0,003b8605f8ea8a9037e2fac2df4fa9f5fdc2647fc3d7c35e2ccfb782c5f2c9a5,2025-05-16T14:43:56.797000 -CVE-2025-47294,0,0,75604d113ed1f70a77c671056269426e62414ea43c394514bad08348cdd5ec92,2025-05-28T15:01:30.720000 -CVE-2025-47295,0,0,81dae12a0b3efaa3738eee00295aa68366928a9087b7f7ac16487afbed576f8c,2025-05-28T15:01:30.720000 +CVE-2025-47294,0,1,223e1b23798dd663f9b2f1cda3955bb73692495135bcac4b4286fc640ed2b8d6,2025-06-04T15:37:29.883000 +CVE-2025-47295,0,1,f3a26be95f344a8cf0c1d0a91567fbdfbb39dad279a394e9c46f2d6f8d7aff0f,2025-06-04T15:37:21.417000 CVE-2025-47296,0,0,60d35aafaa963cf7985a99d465296c31b90c93a3f65a0bb82ff59377f5d6c146,2025-05-06T04:16:19.840000 CVE-2025-47297,0,0,246f42775ad934cb7a4bd511667657f75fe8614d98b9c2492da603476f75d810,2025-05-06T04:16:23.400000 CVE-2025-47298,0,0,0fdc2328a16976156d4849ddd2395dec68112f75979d43b00c59fb8ef91774b3,2025-05-06T04:16:23.463000 @@ -295393,7 +295398,7 @@ CVE-2025-47580,0,0,f8509d199a0124c7777f42c3b3494347d37d7adbf76a1a5ef4cb845905274 CVE-2025-47581,0,0,a2b90b6e19102770f82969843e18c9193d64518e2767de8ca901b634c37371ea,2025-05-21T20:25:16.407000 CVE-2025-47582,0,0,2a921e5b31e71f5b3852fe6f93684d3290e672b6b1f2c3bea5e75e1d9f215a53,2025-05-21T20:25:16.407000 CVE-2025-47583,0,0,1447e339117a9a31aae8a4edc7a31b549eb22fd590c4a31cc41a6525b62c14d6,2025-05-21T20:25:16.407000 -CVE-2025-47585,0,0,30964a57aa57d1e9adb58ba4a187b04158425b814d49506ed055aa17f584fceb,2025-06-02T20:15:22.780000 +CVE-2025-47585,0,1,470423a4100954df6f7551bcae69cda4785956e4c4ab28eb9b63a1e872aebd11,2025-06-04T14:54:33.783000 CVE-2025-47587,0,0,c69129af37bc8e41d28b40b1a600e9f976cf3e139ddd0ff0333903f8e74cc56f,2025-05-08T14:39:09.683000 CVE-2025-47589,0,0,d77c0dcf400db13a9ebaf0299e125dc013f6c4414d58c98a50eaa87722aba073,2025-05-08T14:39:09.683000 CVE-2025-4759,0,0,692e47a0363707f39adcc4448402c52b3a812a567b6a3e05960dde7e6e1d11d0,2025-06-03T15:57:29.763000 @@ -295508,11 +295513,11 @@ CVE-2025-47709,0,0,9c00b271893f53d1f52294cb240e92548326ebdfcea3825170f6a366a64bc CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d346e,2025-05-21T14:16:02.380000 CVE-2025-47710,0,0,3861e04e9e65074d020efa7dab9e00a25ecb80cf10fb272d3ea074fb3b627c14,2025-05-19T15:15:24.580000 CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000 -CVE-2025-47724,0,0,356662c92cfe1531405b3dc36737a94136a96b945656bce7d35d9ff9a900d454,2025-06-04T08:15:21.867000 -CVE-2025-47725,0,0,9308ff645f7d41a400c58e2d24a45e8d8369b5c840bb3b3d3898e81a9608c7b8,2025-06-04T08:15:22.057000 -CVE-2025-47726,0,0,0171f1f25c67f0b9f6a26634c482206ad0694d14a0af6538135c408007afe6d1,2025-06-04T08:15:22.190000 -CVE-2025-47727,0,0,0a58d7aff84a46074df0f158b644d00ecdc657301b54ecb30dfd1ac7b7fca595,2025-06-04T08:15:22.320000 -CVE-2025-47728,0,0,4c0ef4dad5be6dd03712130b45816586981223bdfefdc0ada7b3205a22d096ae,2025-06-04T08:15:22.453000 +CVE-2025-47724,0,1,c392ae279a9c6e1324e9d9c71628ad9f2bd31920b4d617428838fa9f83dc2fa5,2025-06-04T14:54:33.783000 +CVE-2025-47725,0,1,889f3515c44952cf57a8d17f0356726e20588e99515827ba927156d41cc6af64,2025-06-04T14:54:33.783000 +CVE-2025-47726,0,1,5b8e14c9ecb787c7d75c62228c72de82da938486c491feba0c6ef062e92deef2,2025-06-04T14:54:33.783000 +CVE-2025-47727,0,1,ae6b3ce01d1b5832a7e8908bdc96ece36860d0aed96a19118b190498f574571f,2025-06-04T14:54:33.783000 +CVE-2025-47728,0,1,49b6b5f86d81ff18297296525723bdfdd66229b7fde8008af8115765f4306be1,2025-06-04T14:54:33.783000 CVE-2025-47729,0,0,5840dd56191421d2692f93cc2a1893a68781531005d1e7155e40c9e73a0b9865,2025-05-14T13:12:53.603000 CVE-2025-4773,0,0,f64a68d0e35e414617bee17967e5c3c9909f1d1c34fed1a1c8d53f16a98c123a,2025-05-21T14:34:08.967000 CVE-2025-47730,0,0,32919bd9d895e6a4d64320c41f6d81f839bd7e464e3e623f1b4fc5607c47e300,2025-05-08T14:39:09.683000 @@ -295636,7 +295641,7 @@ CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefad CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000 CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000 CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000 -CVE-2025-4797,0,0,3b33b4b8ff654781dc2cc5a6aa49604ec89fee7c63e23b79f8fe7b1806f1e2d1,2025-06-03T05:15:20.323000 +CVE-2025-4797,0,1,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000 CVE-2025-4800,0,0,9318c6df70d36b773d7fc889153c4ccced0bd2fc6ace455b4d54f9e1c185a4a9,2025-05-28T15:01:30.720000 CVE-2025-48009,0,0,f2f593603a23342f1ed10e6e06b800747a948e9a47401b873fcb7b9febb49dba,2025-05-21T20:24:58.133000 CVE-2025-48010,0,0,29ecfb7056487f862ce3f3d52a72af1a1c7498499e974227523a3feeadf25999,2025-05-21T20:24:58.133000 @@ -295811,7 +295816,7 @@ CVE-2025-4838,0,0,cca1a773a7995c2ad406db6e7e45380cc26c88e64223942ad0ce97b436093f CVE-2025-48381,0,0,756a5877ed27d6f830d71523076b9f0b209034564b150120125feeff921c6b74,2025-05-30T16:31:03.107000 CVE-2025-48382,0,0,fda2abd3eb2ff59b8a0db4b2d2d0e0568f8fbaa2c9c79701d2a0f694e0b39ac6,2025-05-28T15:01:30.720000 CVE-2025-48383,0,0,cf4c4d78cccb4a8e745a90ad08bf26e619c1d79a5e63aba01e3bbb75890bb48a,2025-05-28T15:01:30.720000 -CVE-2025-48387,0,0,a21b56f5a6868c16d0ce555deaf4b7eb20aea4f3de13b5a45ecc780533f7fb47,2025-06-02T20:15:22.930000 +CVE-2025-48387,0,1,5a9701f9a81795a8700fe89d139a689f8cb6b45c5398ce1d738ebbe7a32c2c0c,2025-06-04T14:54:33.783000 CVE-2025-48388,0,0,e2ca6068c065f4a105a8f39d6b660dd099cc346e50585364b076d0cce43d9e36,2025-05-29T14:29:50.247000 CVE-2025-48389,0,0,e0a06862dbd5de9d0e30b39ba95e12152ebb3f987c91aebc43d8b22f341a7a82,2025-05-30T16:31:03.107000 CVE-2025-4839,0,0,3e65b07de0e0b2e6d627bc237ff1a0e673826cc1b3416686e2911073e2351e4f,2025-05-19T15:15:34.287000 @@ -295843,17 +295848,17 @@ CVE-2025-48472,0,0,934bb319d2253e00597f7f58fb2773ef535264083ba8f3e75953228945622 CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000 CVE-2025-48474,0,0,1b5617c927a4f3203821f0dae9b4591ef13d03a77e55a9eff2602e8bb0d7cb05,2025-05-30T16:31:03.107000 CVE-2025-48475,0,0,cc221468e2c81c464bbeb608aef3bd329a5e19afcff977fed2ff2390befd44f5,2025-05-30T16:31:03.107000 -CVE-2025-48476,0,0,1df644b08604624b8d4936be1529f4158b330d80c1062fa489d9ab222ef8e7c2,2025-05-30T16:31:03.107000 -CVE-2025-48477,0,0,3c9caae69a1c86b63cb8118c9de47ffe2ea456d2bbd0daa97fcdf4f08e1f0870,2025-05-30T16:31:03.107000 -CVE-2025-48478,0,0,54d08b31135c4a7bd5cd3f23492ad6e7b9e04ad90da46bb862d329f8d7f313e9,2025-05-30T16:31:03.107000 -CVE-2025-48479,0,0,e51b22c35daeb33f85f69abccea9f8edce96ca1a65f0e7f888a74b9a4f2186c7,2025-05-30T16:31:03.107000 +CVE-2025-48476,0,1,d201f7e24767859b0fac82b5743e774e3fc54235cf4a75eed90f9c91e105fbd0,2025-06-04T15:36:28.900000 +CVE-2025-48477,0,1,c80c60648098c37c79eae1fef60c12f48f7370042efa647fbcea39cb66d05e42,2025-06-04T15:36:20.617000 +CVE-2025-48478,0,1,633c384a0e6031195d8f4245429afd54b5c07e61e8ee9914392d503d39f51a75,2025-06-04T15:36:13.370000 +CVE-2025-48479,0,1,fd983f222f34301a22ebd4b67572cd163db7407323735c553fe2acf6f5bdb7d1,2025-06-04T15:36:04.267000 CVE-2025-4848,0,0,20503eb98509f13bb54ac642ba30f4216a8a40e637bf035c4e6248a1dfa9a5eb,2025-05-19T15:15:34.400000 -CVE-2025-48480,0,0,4f8e58f8058873e119e74e72fd1ab53ae4e5104911ebe3f56b9a5611a781c0e0,2025-05-30T16:31:03.107000 -CVE-2025-48481,0,0,61fb6f6b96103f97df4b2891f8310d19a72c805d9d37dfb427c270f03c81fcc7,2025-05-30T16:31:03.107000 -CVE-2025-48482,0,0,8b38250abe3b248b7db2072ada1b129c115444eff6c0abb2039634b13ed80f91,2025-05-30T16:31:03.107000 -CVE-2025-48483,0,0,600688086ba3360942db6295e3fad592aee30d91d348a3bcef0fccc2b4001893,2025-05-30T16:31:03.107000 -CVE-2025-48484,0,0,687b557c4d6aa052a2e6eb45de8cc1f0c1369599256ececd363db2bd9562f22b,2025-05-30T16:31:03.107000 -CVE-2025-48485,0,0,25039320b8c0b2ba1139265c23c059d69d97f9ded33a48d00d3b259af97a74f4,2025-05-30T16:31:03.107000 +CVE-2025-48480,0,1,7efa9a0f4c25f21b526ba3ca92444d46872765ef84c9cc2a82ece80d54db7d03,2025-06-04T15:35:54.750000 +CVE-2025-48481,0,1,7215e8a1a620d0e05fb6f17f044bd52c7b506d0ce4d83695b97bf5d9cd5f19fb,2025-06-04T15:35:47.287000 +CVE-2025-48482,0,1,1e83bce9fe230efbe0c528c48e46df48b24011a635fde2323aa83133bfd272c3,2025-06-04T15:35:32.910000 +CVE-2025-48483,0,1,c6bb70844936133fd65cdef3300ceca05ed3932661137870590a0b939d7a1a75,2025-06-04T15:35:21.950000 +CVE-2025-48484,0,1,2072f1759137b962f068b2a470fc02a735a01deff97f6528ccbdc3b67ae6e2cc,2025-06-04T15:34:51.920000 +CVE-2025-48485,0,1,9d42e8d54a038756e0ba17bf5a2542e4df8d3932f49638948b7cc209f8bac7bf,2025-06-04T14:32:26.220000 CVE-2025-48486,0,0,86d6d1791ce7dc95a43fbddf28c5c2fcf026bbbcd9d1462148937a75bf50a1a3,2025-05-30T16:31:03.107000 CVE-2025-48487,0,0,04a6ac36c0ebfdf64fe9606f6b7cadeab62b33964cb6c941c8f20e007cf21760,2025-05-30T16:31:03.107000 CVE-2025-48488,0,0,b5a0c5badb076ccbfdce1974f163adc65f6a69ee9d3b39d6093f740b0d7b909d,2025-05-30T16:31:03.107000 @@ -295885,7 +295890,7 @@ CVE-2025-4870,0,0,b9975f7dc89af7cfd09d0fdbb811b050a9e4120a956157701f81e28626493a CVE-2025-48701,0,0,35aa8b81bef67a8b475084f139411c80773326ef7d953cb76c543e9e2bb840a9,2025-05-23T15:54:42.643000 CVE-2025-48708,0,0,74d2d0f043ff5c865a6d0a1563d74024ae79bdc118ea29e39da5392ad954839c,2025-05-24T01:15:19.420000 CVE-2025-4871,0,0,3f055501a74b827c2979fd506b6a31da5aa1cc38fbff75b8f146849a462b3ed0,2025-05-19T15:15:35.460000 -CVE-2025-48710,0,0,e5cffc393e897d4d1855496eaec571defd1c29e53fbbf208f3dd93132f8a59ef,2025-06-04T06:15:21.390000 +CVE-2025-48710,0,1,f0402bb1ed6d8f6e40d35a516c63ba6d11524553c0fc1bb2ee868d959afc0447,2025-06-04T14:54:33.783000 CVE-2025-4872,0,0,31ba0e872a667df2b5f905b91ad79d23d6ae9f1d90fe7298a8e93eb9f4930329,2025-05-19T15:15:35.567000 CVE-2025-4873,0,0,63423bb9fd17f5cd0d086d7b5556b35e17f23a209119a6131192f7c612f8b1ea,2025-05-21T17:34:03.960000 CVE-2025-48734,0,0,32f5159e3649d709552e9d6060e2feb59065772785f70db027b9b029edf3a535,2025-05-28T18:15:27.410000 @@ -295983,35 +295988,38 @@ CVE-2025-48946,0,0,9e8302d4346a2222f59b2639a60bac20acececc93e94ce2ece2d40ebb9674 CVE-2025-48948,0,0,3dc5363d45860f970916d1ac03bdc1271b5feb7adf997122b609e1a438a9d971,2025-06-02T17:32:17.397000 CVE-2025-48949,0,0,62156b7897f2e3e419ce5967535cd6e746f097cb6d4066f4a89eda60c6dfbe12,2025-06-02T17:32:17.397000 CVE-2025-4895,0,0,451159abdd179506166eda92c0cc3ecdcfca15d4a903bf6a2c0ccf029c166653,2025-05-21T19:37:48.777000 -CVE-2025-48950,0,0,64b55289a1bc8607a3d082442a833b7b28ad9250f0cededa5a16674619656aa1,2025-06-03T19:15:39.230000 -CVE-2025-48951,0,0,24422204981b6df89352558382b6c9e770a33a2565905b3acf21f72ad9ec6cfb,2025-06-03T21:15:21.840000 -CVE-2025-48953,0,0,4ab48332b86d6fa4a7307bd72c0f1b236020d16fb38ea493c7eea73c5cb25dba,2025-06-03T19:15:39.423000 +CVE-2025-48950,0,1,cc973f7c5355f4974e0729310c9855d4650934cbce88e929f2539748e53aae88,2025-06-04T14:54:33.783000 +CVE-2025-48951,0,1,fee37bd0aba814c558556b05d254d5f30b7f4da36dd1ca6bfb7809044afe46ed,2025-06-04T14:54:33.783000 +CVE-2025-48953,0,1,70684a4684db41347c8126e913d4ccc37a9d8250a7889d7b10445edb04853791,2025-06-04T14:54:33.783000 CVE-2025-48955,0,0,635af14418567c50c9f62dcd2c50650fe7629bfb1694d02914be628a2ee55fa7,2025-06-02T17:32:17.397000 CVE-2025-48957,0,0,4dcb1f30e5e2aec3e21e37bae221cc13e1aae7a4a0ffd535052c26dd64dcb033,2025-06-02T17:32:17.397000 CVE-2025-48958,0,0,46fd5e9c83e8ade67c84942ff50f6e8ba5c9ec4365d7ad6ad95af9803a00d241,2025-06-02T17:32:17.397000 -CVE-2025-48959,1,1,df116f957ae503ffea2bf7709623f2610593544505eae5305cd92d17859fce13,2025-06-04T12:15:20.880000 +CVE-2025-48959,0,1,274814497f5703fcf3a7ae807070e8aff96e2761c8b0c63a15ded955eb77460d,2025-06-04T14:54:33.783000 CVE-2025-4896,0,0,eb43857d84c4e3c0ca9bf4ac15086d7606c87aaeb17237d45e10278d3431115c,2025-05-27T16:30:13.490000 +CVE-2025-48960,1,1,93f7fd9b74fe1fffbfcbbaf102f22a258bd7aba129214a2c64d0ca9bd95e335b,2025-06-04T14:54:33.783000 +CVE-2025-48961,1,1,a59d8ad86e14da858d0bea999138c2abff05ee9971d0086d8ddde32b64455cb8,2025-06-04T14:54:33.783000 +CVE-2025-48962,1,1,15294a34140f594ef80b51b3ca023944882e0df4f1a3fb2d6042aebef1f90b5b,2025-06-04T14:54:33.783000 CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000 CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000 CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000 CVE-2025-48990,0,0,3d637804381ef08042cb58db91b863fe4e22385581dabde03cf4a364dec0eac2,2025-06-02T17:32:17.397000 CVE-2025-48994,0,0,004623ecc6eb2d1d3509106543a6938cc0abfa24d5e2d84523819d9bd5ad928a,2025-06-02T17:32:17.397000 CVE-2025-48995,0,0,454d1911143e07368e22c698f209af43101d290055ed9218cfef91671d133926,2025-06-02T17:32:17.397000 -CVE-2025-48996,0,0,771901b67745e8164ed9257c4c348f92f5257035ca410c0abc96dd32db97c54f,2025-06-02T20:15:23.063000 -CVE-2025-48997,0,0,2ff84a28be4c02d37cff6a5dfc5d7aec310d475a25b7b71e5da49b23d5843170,2025-06-03T19:15:39.577000 -CVE-2025-48998,0,0,64739504bc71f2762bd88a8014fe2fd1cb7058573360a67edd94c54a6bbfcced,2025-06-03T21:15:21.997000 -CVE-2025-48999,0,0,05dd394064f5106ceb648fd6fc0b83c60a5836dbf3079938c35bc88df26fd7d7,2025-06-03T21:15:22.107000 +CVE-2025-48996,0,1,a5bc0462fba0b0454b69362838585b85b6432cd607f3470780f5a230a04991c5,2025-06-04T14:54:33.783000 +CVE-2025-48997,0,1,f8cf0c626626da2a845a3e6c5808d35b62f20f32b01c03fefd762b607f15feb3,2025-06-04T14:54:33.783000 +CVE-2025-48998,0,1,179ce0b1073d70dad4ff555b3610940ccbc92dbe442ffdd7e4a7279d8c90c02a,2025-06-04T14:54:33.783000 +CVE-2025-48999,0,1,9a2d488dfcad568e25e691f9dd5659af072760b96fe1134cc6b38cd3517f953f,2025-06-04T14:54:33.783000 CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee63,2025-05-21T19:37:15.790000 -CVE-2025-49000,0,0,8afbcd81846c1311b1b84def79c4f0d9b900e140742b5231d5789a74db494973,2025-06-03T21:15:22.250000 -CVE-2025-49001,0,0,6bfa9344fb1581b08a47801eda8998a7382228537be64efdaba625c908e7952d,2025-06-03T21:15:22.410000 -CVE-2025-49002,0,0,28181377853ed6e6ecd6afc3c60acc77f4d819593af353d87884a28aaddbf3cf,2025-06-03T21:15:22.550000 +CVE-2025-49000,0,1,f8cce1a2bdee8bde170fefa186e3e45152457ed27acc2f9d05d9f849c91c807b,2025-06-04T14:54:33.783000 +CVE-2025-49001,0,1,4a31bc7eedd1e5d52b5e6722483951b29d76bf7f2c5ca04ebe2191db078a4eb6,2025-06-04T14:54:33.783000 +CVE-2025-49002,0,1,77d53d5601ef324c2c2ee6afd2d7b9e91868404c589ddf809743a33d43e6beac,2025-06-04T14:54:33.783000 CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000 CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000 CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000 CVE-2025-4904,0,0,d7b6b9c62b4fa4e81411d46fa975a661fdf9f9acbbbf9c59e6a55eeb063418e5,2025-05-27T16:29:33.560000 CVE-2025-4905,0,0,72f083950e5c2b9609e1e3ad96e22a6906ac358b8ea48d3874848e6f315bb24a,2025-05-19T14:15:25.867000 CVE-2025-4906,0,0,9067f7b753e109ce29b812a4f41ca825ba7ff1d4ba914b271b4c49b49a105e4d,2025-05-21T17:33:25.100000 -CVE-2025-49069,0,0,bbbfece22dcf63dc6998c1329d874c73fcb486cb3dfe77ff16c1a52716bf1e15,2025-06-02T19:15:28.680000 +CVE-2025-49069,0,1,85c17ca27d4707197d4656ead7a2d4a3e357783b382cc504f2810ab6c0682e62,2025-06-04T14:54:33.783000 CVE-2025-4907,0,0,faa33c63c7cecd77dfa79228df8feba1d9b9297d2893ae52af491eb90f07f770,2025-05-21T17:33:11.603000 CVE-2025-4908,0,0,de60be5e9644ec87fb1afc243f75b0e5b1a22cdd347bf91d496fa5782bf1af05,2025-05-21T17:25:58.063000 CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d9b,2025-05-28T13:08:14.173000 @@ -296024,9 +296032,9 @@ CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 -CVE-2025-49162,0,0,0934e3250beffc21d4128bb1746955a06a20fce021d510d38b414f5358ff0814,2025-06-03T00:15:20.103000 -CVE-2025-49163,0,0,5ac2d3b4d109a877de24814e58aa1ebc7f91f2d2486be5a5e8624be49a6e92d9,2025-06-03T00:15:20.583000 -CVE-2025-49164,0,0,33e54d3e5b62607b96537468811ac3d84c787f83ce5aa0f13b239f92b783fa04,2025-06-03T00:15:20.740000 +CVE-2025-49162,0,1,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa7c1,2025-06-04T14:54:33.783000 +CVE-2025-49163,0,1,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000 +CVE-2025-49164,0,1,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 CVE-2025-4919,0,0,d317e3bd578018ad84a455f2232992db1a6397292bb6496f6e9135fa366be8bd,2025-05-28T14:08:29.293000 @@ -296041,7 +296049,7 @@ CVE-2025-49208,0,0,a8e96108da8f9e7efa92e227e5541e40bf6024b1bdd55d38cbd0bffbcfb12 CVE-2025-49209,0,0,293d4b58934d7545b7379d142ec4ec0556406a7f545f40e2a06e2176fbaac700,2025-06-04T03:15:27.057000 CVE-2025-4921,0,0,6764dccda373512b657fe3c8300f9213acc595572fe2b42c347ebcd82da48e2d,2025-05-18T20:15:19.273000 CVE-2025-49210,0,0,0d98b9f5865953f1015e0875c4ef02572a5474d0f348f574d55b17a2fdab9325,2025-06-04T03:15:27.127000 -CVE-2025-49223,0,0,5ee6e90cf628721bfcce151d18d285e9f3161a50d55830fb52943a581b9b611b,2025-06-04T03:15:27.190000 +CVE-2025-49223,0,1,cd4bc81f717f31f530cbbbcd345f91c89f8ab5a23dc20acec833942415054bef,2025-06-04T14:54:33.783000 CVE-2025-4923,0,0,9beba7071c51eba6c1d71d0a324059e1f5260406f92dc4aea21591df042815db,2025-05-28T12:50:28.590000 CVE-2025-4924,0,0,6342dffe7c54a8c2d32839791ad5c0a2c9552a698655503ab5c38da322aa6bba,2025-05-21T17:41:56.433000 CVE-2025-4925,0,0,c7c7b57edd485a39535f310e5e884e623df880c83d50cc9504511597c6a8f4a8,2025-05-21T12:58:28.507000 @@ -296128,7 +296136,7 @@ CVE-2025-5064,0,0,87518e9ed6daee720522048748a5340f904ec1b27742821c54fbc97a801d9e CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818fac,2025-05-29T15:50:57.497000 CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000 CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000 -CVE-2025-5068,0,0,2a2857b51afe406d8cfa48681676a3b448add552b1d8ba221cb6e1bf08b8548e,2025-06-03T03:15:28.280000 +CVE-2025-5068,0,1,af58b5783057d50107a2200ae821ace9102f6643f0069d015a5c6f9fbd4b50c5,2025-06-04T14:54:33.783000 CVE-2025-5073,0,0,baf1c84b4e2167692053943d4c0fd05e8f8f1a1d5bd906b6480eed1245a366ce,2025-05-23T15:55:02.040000 CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000 CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000 @@ -296139,12 +296147,12 @@ CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5 CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000 CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000 CVE-2025-5082,0,0,654b6f5ca85bdee04f191b4415361841f39b64a4d62ac7e373566ed9502c800a,2025-05-28T15:01:30.720000 -CVE-2025-5086,0,0,576e692795eaa257c180462b85151d0da8d5282543ca9b4e80084cdea5a69ddd,2025-06-03T07:15:21.380000 +CVE-2025-5086,0,1,a6cd7e037b880807c2087a0cc62e18cec32dfcc1b05281e63e13ff759a08d643,2025-06-04T14:54:53.980000 CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000 CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000 CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000 CVE-2025-5100,0,0,a54df1e8b0bff17450a1f67dfee2545841c6f379cdcd252b360f4d2a6c61fdc9,2025-05-27T16:15:34.280000 -CVE-2025-5103,0,0,af4594b973fdd953cec06d0755700664db10b8fb67ea2802be047b4e3fd3bb5b,2025-06-03T09:15:22.840000 +CVE-2025-5103,0,1,f1b367e9ab5c9aa335311c0ddd03a40fc8329185672276132da2e123330b9cc1,2025-06-04T14:54:33.783000 CVE-2025-5105,0,0,7ec1994145b2106c72a5e3c1031b0347b4a7435fd8dfdb2d41bb64c0d8abcf2a,2025-05-23T15:54:42.643000 CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68bb,2025-05-23T15:54:42.643000 CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000 @@ -296155,7 +296163,7 @@ CVE-2025-5111,0,0,ab3c47416b65781d53c047fed78dbbb335dd4bed9307ae97643de9e73c2c42 CVE-2025-5112,0,0,f0cd0b8c93be317d3a2c0e92912b455b4fb61ee919b7fe6bebacd87c921bdc33,2025-05-23T15:54:42.643000 CVE-2025-5113,0,0,0bd61b4abacfc5745f349f466d36dc6433bff2c84afe9ce5402853e11bea600a,2025-06-02T17:32:17.397000 CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000 -CVE-2025-5116,0,0,3a3248d5910bdfdea3cbcccc91a56e9fb901b18c52c8f2836052f1a9c085e6e7,2025-06-03T09:15:23.007000 +CVE-2025-5116,0,1,b6938e7bcf712294173537b38f61d79bb1a781951b36c05c0a08cc11ed4b2073,2025-06-04T14:54:33.783000 CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000 CVE-2025-5119,0,0,bf969a61748b203da4a3f2f501a91ebb4932bff138f2ad55051f80ff5d8eb019,2025-05-28T14:58:52.920000 CVE-2025-5122,0,0,f0e21910b241d49227076aad0272129f233644ba6bdfb930e332b9b2297be743,2025-05-29T14:29:50.247000 @@ -296305,9 +296313,9 @@ CVE-2025-5327,0,0,c122b41cd4784d743ae12bd66678d79115777b161337566718924549ff9d5a CVE-2025-5328,0,0,417fcf6f51b727567848f3720a3768648afbb392d247fa240c0094835655e393,2025-05-30T16:31:03.107000 CVE-2025-5330,0,0,d834ad4ad61a847f16cff13c2e41a3edc0634ba2b8cfe9a60897f96120871dc7,2025-05-30T16:31:03.107000 CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065a6,2025-05-30T16:31:03.107000 -CVE-2025-5332,0,0,82ee30c4e52e5834476106098d4d0bb383f3fc75f42e8372dd2b5af78b5ad6f8,2025-05-30T16:31:03.107000 +CVE-2025-5332,0,1,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5334,0,0,aae33d23bbf6c41c89830eb61bfdac6ed00173515e45aa173ca7510ab84466a1,2025-05-30T16:31:03.107000 -CVE-2025-5340,0,0,7020a70a3de2f6c094d459513197cd61ccd3c0da7f59f936f106febecd0be85a,2025-06-03T12:15:22.603000 +CVE-2025-5340,0,1,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5356,0,0,21392522e07ca9a487f30a83cb437c3946fac9f76c3d7bf47bcf1046c70d9769,2025-06-02T17:32:17.397000 CVE-2025-5357,0,0,6d225f1517736407e2a985f06fb943b8c693ee3a8fb797d8fef47d394fbcd075,2025-06-02T17:32:17.397000 CVE-2025-5358,0,0,db1fd286294db8040b1bdb4a6c8b2445c4920d6583d92ce80f74471f2c3e9ca3,2025-06-02T17:32:17.397000 @@ -296322,7 +296330,7 @@ CVE-2025-5367,0,0,d74e7f7b5df4373a6cb4c4912d3e92ada0700cf6b4dd42f020dd71a2e6663e CVE-2025-5368,0,0,9330ec771717069f27ceda5473a12198f97847c6ad28dab99e3c2364851c8dad,2025-06-03T15:32:13.583000 CVE-2025-5369,0,0,972604ef45925af569944bd9beb457f4f976d47cf3dd4c088b381c8005f3c50f,2025-06-02T17:32:17.397000 CVE-2025-5370,0,0,82a251850084559b91e242285060e0c4abaf9bc7e82cc860e4eab24b23ff9ab2,2025-06-02T17:32:17.397000 -CVE-2025-5371,0,0,9f397c17a7e949930d643fd08899e51e874df614daf6399186765ec917525b09,2025-06-02T17:32:17.397000 +CVE-2025-5371,0,1,16f45a240979d3e28a1f7ae1c207a37bd22e9e5d64cb4ee381668bed7ebf71f7,2025-06-04T14:31:41.573000 CVE-2025-5373,0,0,c749a6b1c61526825a3ec95e76f4d6286fc94a99723ecde6b20b472fbeaf94ea,2025-06-03T15:31:55.267000 CVE-2025-5374,0,0,08ec0fbe437c75568e797a6883653990f3916903b217127f6e162f78c26a7157,2025-06-03T15:31:45.257000 CVE-2025-5375,0,0,79ab6f61d55d13152e6cea237408e960f1fbc5f1ab43084ee7b9d3d96e5ce6a0,2025-06-03T15:31:34.527000 @@ -296353,7 +296361,7 @@ CVE-2025-5409,0,0,209b521ab5ccc30904997673163794c81e8bbcd661514ad5d6db90496c692a CVE-2025-5410,0,0,8f6aec665b1901bf160e99989f915904c0b12f976e27a46b4117cb6a4d26984d,2025-06-02T17:32:17.397000 CVE-2025-5411,0,0,bda57e821f06e7acb04b67298784cbbe1631c5e86f17b6a45cfc7ca79da6e664,2025-06-02T17:32:17.397000 CVE-2025-5412,0,0,753b4152a593f449df2c00057cf330d4f98993025991e4c159242de574477a9d,2025-06-02T17:32:17.397000 -CVE-2025-5419,0,0,c776bb9ab2faecd21cf664d5602ad17c914cf30eed820a8a672cba50f6bf30f1,2025-06-03T14:15:50.600000 +CVE-2025-5419,0,1,98f086303286ac3011e767984d1a01305772e3bb641e2f3963f06797bde914b1,2025-06-04T14:54:33.783000 CVE-2025-5420,0,0,febb25c16bce360c4a759b2a4127c671c1e4f8d4aafbd5e7bf731b1578cd725f,2025-06-02T17:32:17.397000 CVE-2025-5421,0,0,aaf7308ceb57221ad68dbb7db22ba2000af542ccf461039f6c7d796fca57cef7,2025-06-02T17:32:17.397000 CVE-2025-5422,0,0,9e450c046e1f91b7dd55771f187d3de2563113f044a3b50f5e4e98096355fb9a,2025-06-02T17:32:17.397000 @@ -296383,72 +296391,73 @@ CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000 CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000 CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000 -CVE-2025-5482,0,0,83d0f6229de344a3ff87ac74149e35d8119280f36f9106a32549ab2ab6965475,2025-06-04T08:15:22.613000 -CVE-2025-5492,0,0,b5038878420625bb26f8489e550a4b7b6eed1512f61db614ac007c24853837c9,2025-06-03T11:15:21.023000 -CVE-2025-5493,0,0,7c4c7427ac4f478c1fac76ad33eb9aa6e606061e63893081420b4dcedc256f44,2025-06-03T14:15:51.033000 -CVE-2025-5495,0,0,43edca9627a89460bd01070c801d65887312b95c9d61a9db86524fe113b90a84,2025-06-03T14:15:51.170000 -CVE-2025-5497,0,0,a8de3db2e2278b6fc7cafd662d5aa984c05704ded4a531c8dfc9f9a30c93da7f,2025-06-03T15:15:59.873000 -CVE-2025-5498,0,0,4fd881cb88c856d4f02decacef5f3bfebcdc60b0213fa3a73485c281982b83ac,2025-06-03T14:15:51.313000 -CVE-2025-5499,0,0,a432bd909af75fac9cb457ce4b5a51e444731b50dd1752d2e11039ebe1690e24,2025-06-03T14:15:51.513000 -CVE-2025-5501,0,0,1d92eab107d9e53a5a633ee870b2bd48694ac873329eb842d7ea7dbc8902262b,2025-06-03T15:16:00.003000 -CVE-2025-5502,0,0,357ad77fe133e9200902486817ff0da918ec75e0cc00e60428b08434d29a86ea,2025-06-03T15:16:00.167000 -CVE-2025-5503,0,0,ccdeb36a29da4538b170a70975f0b4d0ec0964e1627752fbf8e00064e21faf74,2025-06-03T15:16:00.350000 -CVE-2025-5504,0,0,519adfd18697319d23478620e8ad4cf49a90b8eea0f72f0181794d980eed6182,2025-06-03T15:16:00.533000 -CVE-2025-5505,0,0,c2f4eeb646708394355dfe8433bf9f300376e0a139884b40277c30dafce0254e,2025-06-03T15:16:00.717000 -CVE-2025-5506,0,0,9724d42823132dffb8d1392ad0cd8995fdf46fb303bf952172f9e364bdb4eb19,2025-06-03T15:16:00.897000 -CVE-2025-5507,0,0,225624b0453e32052f0901f3db812101c4aec337ec81b19d72f3607237835a16,2025-06-03T16:15:26.423000 -CVE-2025-5508,0,0,f6d7ac7136ae9e4e1a29b2a92cb6af9953acdcfcb02a9d3b3cf17657e73f78b7,2025-06-03T18:15:26.150000 -CVE-2025-5509,0,0,dfea098d4116b5d694c254bdfb9be86d79b3e7982b25e2d031131c6b8a308d40,2025-06-03T18:15:26.280000 -CVE-2025-5510,0,0,fdafa829e13998ada3025b42b5ba68580ba4f4eb613719c52595e2826fe66550,2025-06-03T18:15:26.413000 -CVE-2025-5511,0,0,9403918fe5771798f62b364f2caa1f024e6b877208f89bfc3194eeed27876426,2025-06-03T17:15:22.283000 -CVE-2025-5512,0,0,c62f1918e613a977196ab78657eb63507bdf54ff1b4944f5cfe94cf176e6aac7,2025-06-03T17:15:22.513000 -CVE-2025-5513,0,0,76706dc39a564f548bac166c55066c029cf8b60238b5de78ddf5d9b29f200192,2025-06-03T18:15:26.673000 -CVE-2025-5515,0,0,792cd7b0f94439a22bb6942400cb4becd043247148046d4e1c5f0870911852f4,2025-06-03T18:15:26.870000 -CVE-2025-5516,0,0,3facc42f49e771ba2b22b1f2dacedb1588d7193c3d3b2c3fd70c05abc114c36b,2025-06-03T19:15:39.880000 -CVE-2025-5520,0,0,f7ac75b3015c4e59dcbac543c95be20e654e882db1fc48aecdd92ef4468c27c4,2025-06-03T19:15:40 -CVE-2025-5521,0,0,650b31d0de51ced965ca46f62dbfa16605b04af8f53275e33508a8077f9402e0,2025-06-03T20:15:22.263000 -CVE-2025-5522,0,0,7750795c8473f462f7d0c216fdd89fd656b7793ab7a2bb8064fe6761bf7a019c,2025-06-03T19:15:40.283000 -CVE-2025-5523,0,0,92b0a33ee71f18494904416bb8418f559a13b8c17cd5063077b1e15b45993897,2025-06-03T21:15:23.223000 -CVE-2025-5525,0,0,2adf3342879b296c020ea6ce4786c659af3d0d3875afd52a67f40e5bf57ac7d6,2025-06-03T21:15:23.360000 -CVE-2025-5527,0,0,03310183d2aef227c6a1af19d90fe9ac6ecad6dbe77245588bea99fb6d9c40ba,2025-06-03T21:15:23.483000 -CVE-2025-5531,0,0,fba965cdd8a27900b957b36b69091b90b10705eef7bf0cddd692f4e99966f2b1,2025-06-04T04:15:54.140000 -CVE-2025-5532,0,0,20b483197f9b5c3f07d96aea8fc09d4c2845478041a4c227c1b3b1dea0ca76d7,2025-06-04T04:15:59.263000 -CVE-2025-5539,0,0,15d764d09b3dcc6f9a9dc2d7182821e482f3272f7fd15777444e5480e2910594,2025-06-04T05:15:24.733000 -CVE-2025-5542,0,0,1e6e744ebb0a2c1a2692d13778fb88132ad850afa28e615541ce79006c169f6d,2025-06-03T22:15:21.807000 -CVE-2025-5543,0,0,447d1d07ab39d91499ca8cf0d5888f436ad1047d9c468269401dd8672a2b072b,2025-06-03T23:15:20.953000 -CVE-2025-5544,0,0,a6bf184be32d4b28dc6ea6c64cedded3fff4ed129d6ee7e61f93554efced2c94,2025-06-03T23:15:21.147000 -CVE-2025-5545,0,0,2143597ebf76758a3c993bdf21d2076788d638aac22e98c1edba0a47936bae63,2025-06-04T00:15:25.333000 -CVE-2025-5546,0,0,8522740ba16e189a9b8302801828de4e6a88153386f6a0dc2b34f04f8972a43b,2025-06-04T00:15:25.540000 -CVE-2025-5547,0,0,869bd95cc8c8080c32873649b0b0dbeeb0275508ee1dc6fca87be38c63f264ba,2025-06-04T00:15:25.713000 -CVE-2025-5548,0,0,68d81ff412ea6615da97f34eec34fe154734e5acc046c6e66ad4317c007099a1,2025-06-04T01:15:19.873000 -CVE-2025-5549,0,0,05a6d069b1057abc17dc8cdb1a793e8a4efc6ecd5f1e563fdff29c4c6ea9477c,2025-06-04T01:15:20.083000 -CVE-2025-5550,0,0,ea3b4aeb88c500fd695ad65233d523362f997aec35c79c8018c66ace218a9ae9,2025-06-04T01:15:20.250000 -CVE-2025-5551,0,0,a9d0ae13a25ef644b6fe35ca6de3c9440f9de5bdfaaa73c4c4e323d054a128f8,2025-06-04T02:15:21.580000 -CVE-2025-5552,0,0,fb3235812088df6647c3a5044f9c34d0f2a86a72c12c70273a62205c4568b921,2025-06-04T03:15:27.317000 -CVE-2025-5553,0,0,85bd0d919e6a0a7013072fae87065f6bbf805d10036cc5ed961f1e262d703b67,2025-06-04T03:15:27.517000 -CVE-2025-5554,0,0,7eba4157558b584f8548b438bfe48e1f5ea389188f3763d56f8bda0cf181853a,2025-06-04T03:15:27.693000 -CVE-2025-5556,0,0,a9311307205c5a89ba73bd266c770b14e83d0ad085f305416a97da37b147ffde,2025-06-04T04:15:59.447000 -CVE-2025-5557,0,0,b86c3e7e70de2ab8df6c4c203ef74278f568b09676ad8b6ccf241975e892e5f2,2025-06-04T04:16:00.370000 -CVE-2025-5558,0,0,a6743c0f802a5067015b8716a1280d2c1c3c5cb449f9cd2c823cc13d24ed251f,2025-06-04T04:16:01.790000 -CVE-2025-5560,0,0,7cedf34968569ba14a67e94f5195fa1dc4d2a22400efe2accc91140784872807,2025-06-04T04:16:03.063000 -CVE-2025-5561,0,0,ebbf981e34c57bb03f1949c177465aeb4e91919773c1d0efdacc5858b9b3306c,2025-06-04T05:15:24.883000 -CVE-2025-5562,0,0,dc858550b3f9cfeda6580b08e0dc2be9d92af90dd920d910fc108c4e3b690840,2025-06-04T05:15:25.070000 -CVE-2025-5566,0,0,6a340d396d9491e3106268f6e669befa360ac82c7cbde42fb8c0ce2cfb721253,2025-06-04T05:15:25.247000 -CVE-2025-5569,0,0,49310d312c5dd52fe65b98b45bd845e195cfc46249e309f29c9957e813c7211d,2025-06-04T06:15:21.937000 -CVE-2025-5571,0,0,9a565584561b988daf821efefff307343a56bdeff72ee9da998017110a9f6d9f,2025-06-04T06:15:22.190000 -CVE-2025-5572,0,0,b13d6d006dd98b8fc6e0aea31b7a364dc6a370978231e3a68f72d5508d2710bc,2025-06-04T06:15:22.437000 -CVE-2025-5573,0,0,e11ff868d382d82e3502f73fbfa061e34c3bda72aa1c8eb9eac6468c7d5caa34,2025-06-04T06:15:22.677000 -CVE-2025-5574,0,0,1a8a59e1fb49ea78ea53ddec9638a192402502820719c70c927f5ed7e4172f18,2025-06-04T07:15:23.060000 -CVE-2025-5575,0,0,b4f360ded878f941dc681bf7e45141f9ee1edc00457c2628bd2b2982d6c479ae,2025-06-04T07:15:23.533000 -CVE-2025-5576,0,0,b1312e317aef6bf56eb3237450f51695f7e490227f79f1ad00aa7861404534b5,2025-06-04T08:15:22.810000 -CVE-2025-5577,0,0,9738c6c3077ef501d50cae557b808f7cffe5585a58c8fa527c752dc09e05afef,2025-06-04T08:15:22.997000 -CVE-2025-5578,0,0,b5efa5a302f1ef5f80e55262ac516b04a64a1d4e4d49c4848d2c63b7e67fceff,2025-06-04T08:15:23.177000 -CVE-2025-5579,0,0,b4ef0c7a641494a464cc35a23fba1574fa686d3a9e41f988bdcc4719d164da35,2025-06-04T08:15:23.360000 -CVE-2025-5580,0,0,866378ce3d7c4dfdb774e09456e6b9f17f01b11d3f3b25f9a6fc31dd4fd424c1,2025-06-04T09:15:20.800000 -CVE-2025-5581,0,0,cb5dd8bd11a61c024e6c526695b7a9f04a3a94d4060520f2e4a1660075297d59,2025-06-04T09:15:21.010000 -CVE-2025-5582,0,0,dd333dc84f994e81fa23f36c784f5640cb66811571538f536d6a0a40a853a20d,2025-06-04T09:15:21.227000 -CVE-2025-5583,0,0,d6c5ab1288fdf4d02127f96993f7a6a2045c26778c2ff6577da02cbee38dfeba,2025-06-04T10:15:21.640000 -CVE-2025-5584,0,0,595d69f785fa4180f25c9f219bcece6562704ec6ce02a92df1130f12b60b3339,2025-06-04T10:15:21.870000 -CVE-2025-5597,1,1,e28b14bfe92270e07ca6bc188a2796395c3d04795a0e5e7a7d59431eaf91be0f,2025-06-04T12:15:21.017000 -CVE-2025-5598,1,1,31ce5a85e2e524df4a1b7be3a773ec64a93604e417cd74446fa78b986f63595f,2025-06-04T12:15:21.173000 -CVE-2025-5601,0,1,d9b80bc12f81e35e445b5d5c0e77a94589b078d0406aeab477b31b3fa65f03ee,2025-06-04T11:15:22.110000 +CVE-2025-5482,0,1,010176165dc064c9d0f5c42c228b3c1b03d533e2fec3bc43624fb7ad3f4bc0b3,2025-06-04T14:54:33.783000 +CVE-2025-5492,0,1,5239a7cb50dec6b348e683d7a6c48897854a921e0d403f100d8eaef90a706bbd,2025-06-04T14:54:33.783000 +CVE-2025-5493,0,1,1efa27605551d4754ba55b2a6097a15a4076a1f74a911a4fa864a052324b89ba,2025-06-04T14:54:33.783000 +CVE-2025-5495,0,1,119827a376db9a3a9ce1110409fd703f076cb8ae90c38353380ea0b67ec862d6,2025-06-04T14:54:33.783000 +CVE-2025-5497,0,1,c3fb93fb2741ce4b0d4d7875815abfbddcb0f0be37c2c2c614518d48b9a6c7d7,2025-06-04T14:54:33.783000 +CVE-2025-5498,0,1,3b5a38a2aa87d4a3bd8bdfa90b8081a42500b6e8cafb2140e4a5c2fe8a26b6b8,2025-06-04T14:54:33.783000 +CVE-2025-5499,0,1,cd3d3ed5d5fb8c8fbe27922589daeaa9197814d18c151184287c55023aa5ed53,2025-06-04T14:54:33.783000 +CVE-2025-5501,0,1,fec642688768e0515c9938a7b29759d6d9542fc6469b13587cb3286b2b89817f,2025-06-04T14:54:33.783000 +CVE-2025-5502,0,1,9864431678913580a5bccbddfbaa5199e2f83443be10fb10b42a9ede5e2cf872,2025-06-04T14:54:33.783000 +CVE-2025-5503,0,1,0955847c248da4c18d595794b240de3862c80eb3860c7e19a8014999867ef785,2025-06-04T14:54:33.783000 +CVE-2025-5504,0,1,6c560d6ba4b2d7e35dd18761fbbed3d7abd6c2042c66d950d638625a6ba59d03,2025-06-04T14:54:33.783000 +CVE-2025-5505,0,1,446964e3eb0d4dd76d452f5358cb34395ed631d401919996fdbc4c2592cb8251,2025-06-04T14:54:33.783000 +CVE-2025-5506,0,1,3d9429b6b10a6b3e06443a8965e5b7b16b7fc4e72fd23941fb117dff70e6229c,2025-06-04T14:54:33.783000 +CVE-2025-5507,0,1,88ff57ec4c901427f803ec660f2ae97038e9ab3b77cea5b8bb8e00b7dddf7450,2025-06-04T14:54:33.783000 +CVE-2025-5508,0,1,cdf2dc10948b4f64ca4936f9fa9c510dc1778a78cee858d966871c028b96a465,2025-06-04T14:54:33.783000 +CVE-2025-5509,0,1,3539d4089740baa0eca62d43bab8c73fed0812e19e5915af924b9504eb2663fb,2025-06-04T14:54:33.783000 +CVE-2025-5510,0,1,7c73a3d3a6bffd7a0f894d33714060b119b1615808e95e627f2ffa67f393448b,2025-06-04T14:54:33.783000 +CVE-2025-5511,0,1,dc11727eeaf3ff134ac86f7744e483b4844b784d2fb5f0ebbc7688ff688397cc,2025-06-04T14:54:33.783000 +CVE-2025-5512,0,1,928bf241a04e6f233ea4797161d04d18b17e3498020465b77bbfd133375e0a8f,2025-06-04T14:54:33.783000 +CVE-2025-5513,0,1,8b9deb8bfd077eaa06e3766c71deddefc7ec160546ad93b5bea3e81778183cb6,2025-06-04T14:54:33.783000 +CVE-2025-5515,0,1,f79961a91b30f9e2454ef2ad8ea226c45534538ce6258faff70246141b067814,2025-06-04T14:54:33.783000 +CVE-2025-5516,0,1,ad68fd65647940b83d1362e59749ef29e2ccbd51f93dfc7ee01de4eadc2a2fcd,2025-06-04T14:54:33.783000 +CVE-2025-5520,0,1,44141505222ef241703ec614a1ff4a30be75907eff83ac39140f2bf22fc427eb,2025-06-04T14:54:33.783000 +CVE-2025-5521,0,1,2095aca7402553e86899f1ab452e6d8dccb9d483d7d614c6abf50daa71fc7d34,2025-06-04T14:54:33.783000 +CVE-2025-5522,0,1,a6f0feb7c3dd1459fe736f4f5982460ecbcab99d78d309661631c0ee8cbfc4d4,2025-06-04T14:54:33.783000 +CVE-2025-5523,0,1,3d6f767d22c6db3d901c9fe460993f574c4cc4a691383d638625efefbfde064b,2025-06-04T14:54:33.783000 +CVE-2025-5525,0,1,477ad6529ca0081701a09dd27019e99028d161ae7825de60804c5f6a4ef5cbfd,2025-06-04T14:54:33.783000 +CVE-2025-5527,0,1,5dead2f90bfa336b299d2790c248c3e2b665e86fc2c3c9c7ff0f4ee35f1af83c,2025-06-04T14:54:33.783000 +CVE-2025-5531,0,1,6d27f31038761ad0a1ccad441f88039d5d4e8afb6e2422d32c208713130619d5,2025-06-04T14:54:33.783000 +CVE-2025-5532,0,1,d307f7aa5ca0395a7c8a1bde45bdc53cca6e2426e0b9fc80212fdc7f65c5fbe7,2025-06-04T14:54:33.783000 +CVE-2025-5539,0,1,298ac745dff309bfc9c32d271927b52132f95cd6835d223a8ca6e238897e44d1,2025-06-04T14:54:33.783000 +CVE-2025-5542,0,1,d6f73127563d185f85d4ea7483a6651c4389b791fccb5a0f74ef856dec9c4d33,2025-06-04T14:54:33.783000 +CVE-2025-5543,0,1,1d8a435ed88a5df21f363a761b25c4a0cbf09f84f022d0fbe70e5e84f11f1af7,2025-06-04T14:54:33.783000 +CVE-2025-5544,0,1,020a516e79a3f89efe59dfb651e1ec3f5e799cf4a3d54ccd47ef877829750c60,2025-06-04T14:54:33.783000 +CVE-2025-5545,0,1,389e1c995ff3b8301f082d6239329a262b969461cdde480fd8a11ba009de114a,2025-06-04T14:54:33.783000 +CVE-2025-5546,0,1,c014aea6b5432f9ec15a4f9236a0abd58e7be7ace9bb9e49f7a344a566124468,2025-06-04T14:54:33.783000 +CVE-2025-5547,0,1,ad624e392a872fc040477ed96757114cbc2f98e534b38b49cf7cf171901251a1,2025-06-04T14:54:33.783000 +CVE-2025-5548,0,1,590c16f8c57c95c6b0fc54003176d2c57cd3a4ed604f2d3d418aed1b64c7d579,2025-06-04T14:54:33.783000 +CVE-2025-5549,0,1,4a87195804f85532846e2070b675494ebb2dc114b1e03afb9dda2a13b1a91926,2025-06-04T14:54:33.783000 +CVE-2025-5550,0,1,9f0963c1f449efb521dbc7cafbe3062160aa7a84498a39a10845a57f133b036a,2025-06-04T14:54:33.783000 +CVE-2025-5551,0,1,d4340840da64ad8e437c324f4c7e2e891a0f347f31a6bc79663bc7b670bf3136,2025-06-04T14:54:33.783000 +CVE-2025-5552,0,1,abba3e275efaa9b5b15cd58a4bc700d0b47553fee7bf598a342bbbb38eb89632,2025-06-04T14:54:33.783000 +CVE-2025-5553,0,1,f3a9e2bdcd04228f1abb8a03e479f9ca9155c875a12895a18cbb075d8067ecc6,2025-06-04T14:54:33.783000 +CVE-2025-5554,0,1,c2b5d14ea4feb40fe0081b98593638488f4ce059503a2bacd77de7b066d1bc3c,2025-06-04T14:54:33.783000 +CVE-2025-5556,0,1,1fc10a984c70e679e25f17dcf6d80db48358ad8ee2433e0b0867b4c050db4490,2025-06-04T14:54:33.783000 +CVE-2025-5557,0,1,367c267bc05d65b6a1a2399325fc46c9d81333e3642cdbb7198b85452213d8de,2025-06-04T14:54:33.783000 +CVE-2025-5558,0,1,2ac6d8dec4afd7e15c38ca1bcadede5871807c94fd2187d1936fb3e8f723e22b,2025-06-04T14:54:33.783000 +CVE-2025-5560,0,1,9af623a67baf1975e1c266a9dd2b23fb673ba32b97484cf97dfcbc25c8056283,2025-06-04T14:54:33.783000 +CVE-2025-5561,0,1,89bf58530abc9290057be65b322800672f7156f0149b4511ecbae6f44f339e6b,2025-06-04T14:54:33.783000 +CVE-2025-5562,0,1,343add22f2528d1ab365d74b6c653aeb153b343601b0ebacf12124363f3af2da,2025-06-04T14:54:33.783000 +CVE-2025-5566,0,1,6cd1b19db0a2abdf35ae21538de449c05d1cecfb40c37f0b82d89c2ca9b4dcf9,2025-06-04T14:54:33.783000 +CVE-2025-5569,0,1,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000 +CVE-2025-5571,0,1,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000 +CVE-2025-5572,0,1,ca9b685d75a3c1fa1a949d4d1a510c131dde7d574a807080acd6298c1e9cc248,2025-06-04T14:54:33.783000 +CVE-2025-5573,0,1,738f476890f8e2cd7666346bc7e6cc43335214dc033c038435905e50f2ac6faf,2025-06-04T14:54:33.783000 +CVE-2025-5574,0,1,d828c37825b04f9e6d6b2a7f019e3280cbd719b2e2fa72cc9964ddedc119f986,2025-06-04T14:54:33.783000 +CVE-2025-5575,0,1,915dbbdb39e9df1cb8290c02bb6e9f33a34ce46e1c3dd62d0109158d738d5a5a,2025-06-04T14:54:33.783000 +CVE-2025-5576,0,1,dad82aef616d3722e5997741bd564ceae30258bb7ed013d7534c6130eb7e3f1b,2025-06-04T14:54:33.783000 +CVE-2025-5577,0,1,40dfc079a793dd17646152f4349e8c11349d6896a1b4e545e48adc090f1a0817,2025-06-04T14:54:33.783000 +CVE-2025-5578,0,1,00b68f6b6294233898f1f455f3b3015a5bb5741ffb2f9cb66db6fb2728082da0,2025-06-04T14:54:33.783000 +CVE-2025-5579,0,1,77871383a1e4f3dc85798f6f553e7d11849bed9cc5bf6ef2b54c5824f899e9bc,2025-06-04T14:54:33.783000 +CVE-2025-5580,0,1,800f132c83a649be2197e1f36b399e2e4d09dce45eaf3b214479a0f464cc04fd,2025-06-04T14:54:33.783000 +CVE-2025-5581,0,1,b3fc05e619d28dacb93b496057968ed31f19e5527e5d8384f70b15f68629d8f2,2025-06-04T14:54:33.783000 +CVE-2025-5582,0,1,84306eefc6fd748eba2b31c3bcd74436111e77e4f753ce4c5532147272357a7c,2025-06-04T14:54:33.783000 +CVE-2025-5583,0,1,cebdac120a770e1cadfec80726f69621e8866e6fc117d3b53867e7cf5d7f3f1f,2025-06-04T14:54:33.783000 +CVE-2025-5584,0,1,33fb5e30c150aff6fd49d9e5053812971ddea6fb06de04e2dfe2862137521fb0,2025-06-04T14:54:33.783000 +CVE-2025-5592,1,1,788797f86c46be9691efa8bf5e6ca7f39860f123d70f12f2bbf93e8b3cfcaa8b,2025-06-04T15:15:24.060000 +CVE-2025-5597,0,1,78cf40616f985d3cad04554e5602b7505997259b6d0943c31793a653c75cd7ef,2025-06-04T14:54:33.783000 +CVE-2025-5598,0,1,efb7880317f0049799157d10855cf28fe4a9c31a69fac19c47da1815d7ffbdb7,2025-06-04T14:54:33.783000 +CVE-2025-5601,0,1,d110cb5e0e987f41c84d932ca577eb76fded00997009129ff3930d50ad06c883,2025-06-04T14:54:33.783000