Auto-Update: 2025-06-11T16:00:23.482082+00:00

This commit is contained in:
cad-safe-bot 2025-06-11 16:04:00 +00:00
parent adb3d5b8f1
commit 9a9b3e0e5d
75 changed files with 2960 additions and 322 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-18305",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T06:36:01.630",
"lastModified": "2024-11-21T05:08:31.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T14:57:21.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,43 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:extremenetworks:extremexos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "37518AD5-2C1D-4987-A763-C7FC979DE85E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:extremenetworks:extremexos:30.1:*:*:*:*:*:*:*",
"matchCriteriaId": "346C9759-A35D-4310-B8F1-2CBB50F183C8"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-43905",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-12-15T15:15:11.467",
"lastModified": "2024-11-21T06:30:00.253",
"vulnStatus": "Modified",
"lastModified": "2025-06-11T15:27:02.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -105,9 +105,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:microsoft:365_copilot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2110.13110.0",
"matchCriteriaId": "401A8F0F-CE48-4D97-871E-93952CBC8A3D"
"matchCriteriaId": "AFC8F04D-114D-45C9-B41F-6A22E6EA9A85"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43591",
"sourceIdentifier": "security@zoom.us",
"published": "2023-11-15T00:15:09.237",
"lastModified": "2024-11-21T08:24:27.223",
"lastModified": "2025-06-11T15:15:26.057",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -79,16 +79,6 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46849",
"sourceIdentifier": "security@openvpn.net",
"published": "2023-11-11T01:15:07.270",
"lastModified": "2024-11-21T08:29:25.337",
"lastModified": "2025-06-11T15:15:26.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47335",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-16T06:15:31.923",
"lastModified": "2024-11-21T08:30:10.297",
"lastModified": "2025-06-11T15:15:27.043",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47488",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-09T06:15:24.290",
"lastModified": "2024-11-21T08:30:20.677",
"lastModified": "2025-06-11T15:15:27.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47674",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-11-16T08:15:33.147",
"lastModified": "2024-11-21T08:30:39.267",
"lastModified": "2025-06-11T15:15:27.487",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-306"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48197",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-15T23:15:08.903",
"lastModified": "2024-11-21T08:31:11.990",
"lastModified": "2025-06-11T15:15:27.713",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-1243",
"sourceIdentifier": "41c37e40-543d-43a2-b660-2fee83ea851a",
"published": "2025-06-11T02:15:20.270",
"lastModified": "2025-06-11T02:15:20.270",
"lastModified": "2025-06-11T15:15:28.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in the Wazuh agent for Windows prior to version 4.8.0 allows an attacker with control over the Wazuh server or agent key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine account NetNTLMv2 hash, which can be relayed for remote code execution or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta en el agente de Wazuh para Windows anterior a la versi\u00f3n 4.8.0 permite que un atacante con control sobre el servidor o la clave del agente de Wazuh configure el agente para conectarse a una ruta UNC maliciosa. Esto provoca la filtraci\u00f3n del hash NetNTLMv2 de la cuenta de la m\u00e1quina, que puede retransmitirse para la ejecuci\u00f3n remota de c\u00f3digo o utilizarse para escalar privilegios al SYSTEM mediante la falsificaci\u00f3n de certificados de AD CS y otros ataques similares."
}
],
"metrics": {
@ -85,6 +89,10 @@
{
"url": "https://pentraze.com/vulnerability-reports/CVE-2024-1243/",
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
},
{
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-3crh-39qv-fxj7",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13865",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:40.247",
"lastModified": "2025-05-20T20:15:36.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T14:55:38.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:s3bubble:s3player:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.2.1",
"matchCriteriaId": "638239B7-7E77-4A5F-A6F9-BC720D52B828"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/9cc7c5cb-983f-4593-abc5-7e224b275a23/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/9cc7c5cb-983f-4593-abc5-7e224b275a23/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1663",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:41.293",
"lastModified": "2025-05-20T15:16:03.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T14:48:53.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texttheater:ultimate_noindex_nofollow_tool_ii:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.6",
"matchCriteriaId": "AFAC5D11-C185-4A63-9F31-586C76139542"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/6d101f2b-e903-4e64-92cc-e550abb52d6f/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/6d101f2b-e903-4e64-92cc-e550abb52d6f/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2643",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:49.837",
"lastModified": "2025-05-20T15:16:04.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T14:45:57.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.8",
"matchCriteriaId": "283CEB14-D05B-484F-8121-EF109834DFA0"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/194ebf81-8fe4-4c74-8174-35d0ac00ac93/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/194ebf81-8fe4-4c74-8174-35d0ac00ac93/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27628",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-28T19:15:05.180",
"lastModified": "2024-11-21T09:04:49.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:22:56.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:offis:dcmtk:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A80B78-3210-466A-B051-3516CBDD6B84"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://support.dcmtk.org/redmine/issues/1108",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://support.dcmtk.org/redmine/issues/1108",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33788",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T13:15:49.667",
"lastModified": "2024-11-21T09:17:29.797",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:39:33.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34500",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T19:15:07.123",
"lastModified": "2024-12-04T21:15:23.877",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T14:44:14.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,99 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.39.6",
"matchCriteriaId": "6A7D7611-D088-4AF6-8CE0-EACBE4FF4492"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.40.0",
"versionEndExcluding": "1.40.2",
"matchCriteriaId": "3EF19DE5-1D79-4001-ABA1-D648AD6610D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.41.0",
"versionEndExcluding": "1.41.1",
"matchCriteriaId": "314B0F2D-27BD-486B-B528-FD8A7AAE53E6"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://phabricator.wikimedia.org/T357203",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://phabricator.wikimedia.org/T357203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34509",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T20:15:07.367",
"lastModified": "2024-11-21T09:18:50.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:35:22.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,97 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.6.9",
"matchCriteriaId": "469288BA-64CF-4825-A5A9-843595A8E58E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.dcmtk.org/redmine/issues/1114",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.dcmtk.org/redmine/issues/1114",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-37394",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T18:15:29.527",
"lastModified": "2025-06-10T18:15:29.527",
"lastModified": "2025-06-11T15:15:28.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Project Dashboards of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Dashboard title' and 'Dashboard content' text boxes. This can lead to the execution of malicious scripts when the dashboard is viewed. Users are recommended to update to version 14.2.1 or later to mitigate this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en los paneles de control del proyecto REDCap 13.1.9 permite a los usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los cuadros de texto \"T\u00edtulo del panel\" y \"Contenido del panel\". Esto puede provocar la ejecuci\u00f3n de scripts maliciosos al acceder al panel. Se recomienda a los usuarios actualizar a la versi\u00f3n 14.2.1 o posterior para mitigar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
@ -24,6 +63,10 @@
{
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-37395",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T18:15:29.660",
"lastModified": "2025-06-10T18:15:29.660",
"lastModified": "2025-06-11T15:15:28.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Public Survey function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Survey Title' and 'Survey Instructions' fields. This vulnerability could be exploited by attackers to execute malicious scripts when the survey is accessed through its public link. It is advised to update to version 14.2.1 or later to fix this issue."
},
{
"lang": "es",
"value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en la funci\u00f3n de Encuesta P\u00fablica de REDCap 13.1.9 permite a usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los campos \"T\u00edtulo de la encuesta\" e \"Instrucciones de la encuesta\". Esta vulnerabilidad podr\u00eda ser explotada por atacantes para ejecutar scripts maliciosos al acceder a la encuesta a trav\u00e9s de su enlace p\u00fablico. Se recomienda actualizar a la versi\u00f3n 14.2.1 o posterior para solucionar este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
@ -24,6 +63,10 @@
{
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-37396",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T18:15:29.773",
"lastModified": "2025-06-10T18:15:29.773",
"lastModified": "2025-06-11T15:15:28.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Calendar function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Notes' field of a calendar event. This could lead to the execution of malicious scripts when the event is viewed. Updating to version 14.2.1 or later is recommended to remediate this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en la funci\u00f3n Calendario de REDCap 13.1.9 permite a usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el campo \"Notas\" de un evento del calendario. Esto podr\u00eda provocar la ejecuci\u00f3n de scripts maliciosos al visualizar el evento. Se recomienda actualizar a la versi\u00f3n 14.2.1 o posterior para corregir esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
@ -24,6 +63,10 @@
{
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-3932",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-18T00:15:08.033",
"lastModified": "2024-11-21T09:30:43.703",
"lastModified": "2025-06-11T14:15:29.120",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Totara LMS 18.0.1 Build 20231128.01. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261369 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability classified as problematic has been found in Totara LMS up to 18.7. This affects an unknown part of the component User Selector. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 13.46, 14.38, 15.33, 16.27, 17.21 and 18.8 is able to address this issue. It is recommended to upgrade the affected component."
},
{
"lang": "es",
@ -16,17 +16,61 @@
}
],
"metrics": {
"cvssMetricV31": [
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
@ -34,7 +78,7 @@
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
],
@ -44,17 +88,17 @@
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
@ -67,16 +111,24 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://totara.community/mod/forum/discuss.php?d=27644",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.261369",
"source": "cna@vuldb.com"

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41502",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T20:15:21.470",
"lastModified": "2025-06-10T20:15:21.470",
"lastModified": "2025-06-11T14:15:29.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) via the form field \"Observaces\" (observances) in the \"Pessoas\" (persons) section when creating or editing either a legal or a natural person."
},
{
"lang": "es",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo de formulario \"Observaces\" (observancias) en la secci\u00f3n \"Pessoas\" (personas) al crear o editar una persona jur\u00eddica o f\u00edsica."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://jetimob.com",
@ -20,6 +59,10 @@
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41502",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41502",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41503",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T20:15:21.610",
"lastModified": "2025-06-10T20:15:21.610",
"lastModified": "2025-06-11T14:15:29.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the field \"Ttulo\" (title) inside the filter Save option in the \"Busca\" (search) function."
},
{
"lang": "es",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) en el campo \"Ttulo\" (t\u00edtulo) dentro de la opci\u00f3n Guardar filtro de la funci\u00f3n \"Busca\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://jetimob.com",
@ -20,6 +59,10 @@
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41503",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41503",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41504",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T20:15:21.733",
"lastModified": "2025-06-10T20:15:21.733",
"lastModified": "2025-06-11T14:15:30.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS). In the \"Oportunidades\" (opportunities) section of the application when creating or editing an \"Atividade\" (activity), the form field \"Descrico\" allows injection of JavaScript."
},
{
"lang": "es",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a ataques de cross site scripting (XSS). En la secci\u00f3n \"Oportunidades\" de la aplicaci\u00f3n, al crear o editar una \"Actividad\", el campo de formulario \"Descripci\u00f3n\" permite la inyecci\u00f3n de JavaScript."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://jetimob.com",
@ -20,6 +59,10 @@
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41504",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41504",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-41505",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T20:15:21.850",
"lastModified": "2025-06-10T20:15:21.850",
"lastModified": "2025-06-11T14:15:30.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the \"Pessoas\" (persons) section via the field \"Profisso\" (professor)."
},
{
"lang": "es",
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) en la secci\u00f3n \"Pessoas\" (personas) a trav\u00e9s del campo \"Profisso\" (profesor)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://jetimob.com",
@ -20,6 +59,10 @@
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41505",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rafaelbaldasso/CVE-2024-41505",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42009",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T19:15:38.220",
"lastModified": "2025-06-10T01:00:02.087",
"vulnStatus": "Modified",
"lastModified": "2025-06-11T15:46:19.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -143,7 +143,8 @@
"url": "https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/",
"source": "cve@mitre.org",
"tags": [
"Technical Description"
"Technical Description",
"Third Party Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45194",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-21T17:15:15.440",
"lastModified": "2024-11-21T18:15:07.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-11T15:40:45.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,268 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.9",
"matchCriteriaId": "CC78301D-6403-496F-A349-1C7BAC37797D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "32AFCE22-5ADA-4FF7-A165-5EC12B325DEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "D3577FE6-F1F4-4555-8D27-84D6DE731EA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "931BD98E-1A5F-4634-945B-BDD7D2FAA8B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "2E7C0A57-A887-4D29-B601-4275313F46B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "B7248B91-D136-4DD5-A631-737E4C220A02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "494F6FD4-36ED-4E40-8336-7F077FA80FA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "9DF8C0CE-A71D-4BB1-83FB-1EA5ED77E0C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "E0648498-2EE5-4B68-8360-ED5914285356"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "24282FF8-548B-415B-95CA-1EFD404D21D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "ACFDF2D9-ED72-4969-AA3B-E8D48CB1922D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "2B7D0A8B-7A72-4C1A-85F2-BE336CA47E0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "019AFC34-289E-4A01-B08B-A5807F7F909A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7E7B3976-DA6F-4285-93E6-2328006F7F4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "062E586F-0E02-45A6-93AD-895048FC2D4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "3EE37BEE-4BDB-4E62-8DE3-98CF74DFBE01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "ADF51BCA-37DD-4642-B201-74A6D1A545FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "39611F3D-A898-4C35-8915-3334CDFB78E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "40AB56B7-7222-4C44-A271-45DFE3673F72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p24.1:*:*:*:*:*:*",
"matchCriteriaId": "2AE8F501-4528-4F15-AE50-D4F11FB462DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "AB9E054B-7790-4E74-A771-40BF6EC71610"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "DD924E57-C77B-430B-A615-537BB39CEA9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "F43F4AC0-7C82-4CF4-B0C7-3A4C567BC985"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "7991F602-41D7-4377-B888-D66A467EAD67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "2193FCA2-1AE3-497D-B0ED-5B89727410E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "FA310AFA-492D-4A6C-A7F6-740E82CB6E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "FF95618B-0BFB-403C-83BE-C97879FC866D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "A82346A9-9CC2-4B91-BA2F-A815AAA92A7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "2E800348-E139-418D-910B-7B3A9E1E721C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "C7DE1A7E-573B-42F3-B0A4-D2E676954FE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "E60BC1D0-8552-4E6B-B2C5-96038448C238"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "3924251E-13B0-420E-8080-D3312C3D54AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "AEBE75F9-A494-4C78-927A-EA564BDCCE0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "900BECBA-7FDB-4E35-9603-29706FB87BD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "5024FD58-A3ED-43B1-83EF-F4570C2573BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "3CC9D046-4EB4-4608-8AB7-B60AC330A770"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "2AF337B5-B296-449B-8848-7636EC7C46C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "A4535EC5-74D5-41E8-95F1-5C033ADB043E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "52232ACA-C158-48C8-A0DB-7689040CB8FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "3B4D0040-86D0-46C3-8A9A-3DD12138B9ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "D2BB9BC7-078D-4E08-88E4-9432D74CA9BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "F04D4B77-D386-4BC8-8169-9846693F6F11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "992370FA-F171-4FB3-9C1C-58AC37038CE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C936B30B-C717-442B-8656-CF9EE3FC7C10"
}
]
}
]
}
],
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50564",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.490",
"lastModified": "2025-02-03T22:11:08.317",
"lastModified": "2025-06-11T14:55:09.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -92,8 +92,13 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.4.1",
"matchCriteriaId": "6089DAFE-EBC1-4082-BBFE-72D88B53A430"
"versionEndExcluding": "7.2.9",
"matchCriteriaId": "82E4143C-57CE-40F5-BBBE-F82B89153749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "6B512696-8596-4458-ADC9-24DD3C6C377B"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51406",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T14:15:07.073",
"lastModified": "2024-11-04T19:35:17.410",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-11T14:15:56.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,18 +39,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectfloodlight:open_sdn_controller:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "77E9C7A7-16A2-4634-95C8-F54852F36396"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/floodlight/floodlight",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/floodlight/floodlight/issues/870",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://ieeexplore.ieee.org/document/10246976",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6335",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:54.923",
"lastModified": "2025-05-20T20:15:37.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:46:57.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:data443:tracking_code_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "1B600CE7-27B7-4154-BCFA-38F156C90DE7"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/3bfb6b3f-8642-4807-b6b3-f214b26e96c2/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/3bfb6b3f-8642-4807-b6b3-f214b26e96c2/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6462",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:55.007",
"lastModified": "2025-05-20T20:15:37.467",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:43:50.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dyadyalesha:dl_yandex_metrika:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "950A2803-25BD-489B-AF1B-6783850F3258"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0880fa33-3efa-4f50-83c8-4c90cb805eb9/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/0880fa33-3efa-4f50-83c8-4c90cb805eb9/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6478",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:55.120",
"lastModified": "2025-05-20T20:15:37.603",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:41:54.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.2.13",
"matchCriteriaId": "9736EDF6-3A35-4684-9B60-6F6907E657CE"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/39a78741-eeae-4a27-8136-7d0bb0bf2263/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/39a78741-eeae-4a27-8136-7d0bb0bf2263/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6486",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:55.220",
"lastModified": "2025-05-20T20:15:37.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:40:01.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:orangelab:imagemagick_engine:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.11",
"matchCriteriaId": "22542741-483D-44AE-9A47-87ADD3CDB1F5"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/a57c0c59-8b5c-4221-a9db-19f141650d9b/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/a57c0c59-8b5c-4221-a9db-19f141650d9b/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6690",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:55.700",
"lastModified": "2025-05-20T20:15:38.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T14:59:33.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-buy:wp_content_copy_protection_\\&_no_right_click:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "89176D33-3BF5-4C73-8405-21A41A09A590"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/09c6848d-30dc-4382-ae74-b470f586e142/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/09c6848d-30dc-4382-ae74-b470f586e142/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0163",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-11T15:15:29.177",
"lastModified": "2025-06-11T15:15:29.177",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7236314",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22996",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T00:15:45.053",
"lastModified": "2025-01-15T17:15:21.837",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:38:44.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-2.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-2.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22997",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T00:15:45.167",
"lastModified": "2025-01-15T17:15:22.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-11T15:35:40.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-1.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-1.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link",
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25193",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-10T22:15:38.450",
"lastModified": "2025-03-26T13:14:32.087",
"lastModified": "2025-06-11T15:36:22.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -73,6 +73,7 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -85,6 +86,17 @@
"matchCriteriaId": "A71F5AEF-CB1E-41D1-A0D8-804DCF674542"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-26412",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2025-06-11T09:15:22.067",
"lastModified": "2025-06-11T09:15:22.067",
"lastModified": "2025-06-11T14:15:30.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands."
},
{
"lang": "es",
"value": "El m\u00f3dem SIMCom SIM7600G admite un comando AT no documentado que permite a un atacante ejecutar comandos del sistema con permisos de root en el m\u00f3dem. Un atacante necesita acceso f\u00edsico o acceso remoto a un dispositivo que interact\u00fae directamente con el m\u00f3dem mediante comandos AT."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-26521",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-10T23:15:23.840",
"lastModified": "2025-06-10T23:15:23.840",
"lastModified": "2025-06-11T14:15:31.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A member of the project who can access the CKS-based Kubernetes cluster, can also access the API key and secret key of the 'kubeadmin' user of the CKS cluster's creator's account. An attacker who's a member of the project can exploit this to impersonate and perform privileged actions that can result in complete compromise of the confidentiality, integrity, and availability of resources owned by the creator's account.\n\nCKS users are recommended to upgrade to version 4.19.3.0 or 4.20.1.0, which fixes this issue.Updating Existing Kubernetes Clusters in ProjectsA service account should be created for each project to provide limited access specifically for Kubernetes cluster providers and autoscaling. Follow the steps below to create a new service account, update the secret inside the cluster, and regenerate existing API and service keys:1. Create a New Service AccountCreate a new account using the role \"Project Kubernetes Service Role\" with the following details:\n\nAccount Name\nkubeadmin-<FIRST_EIGHT_CHARACTERS_OF_PROJECT_ID>\nFirst Name\nKubernetes\nLast Name\nService User\nAccount Type\n0 (Normal User)\nRole ID\n<ID_OF_SERVICE_ROLE>\n\n\n\n2. Add the Service Account to the ProjectAdd this account to the project where the Kubernetes cluster(s) are hosted.\n3. Generate API and Secret KeysGenerate API Key and Secret Key for the default user of this account.\n4. Update the CloudStack Secret in the Kubernetes ClusterCreate a temporary file `/tmp/cloud-config` with the following data:\n\u00a0\u00a0\u00a0api-url = <API_URL> \u00a0 \u00a0 # For example: <MS_URL>/client/api\n\u00a0 api-key = <SERVICE_USER_API_KEY>\n\u00a0 secret-key = <SERVICE_USER_SECRET_KEY>\n\u00a0 project-id = <PROJECT_ID>\n\n\n\n\nDelete the existing secret using kubectl and Kubernetes cluster config:\n\u00a0\u00a0\u00a0./kubectl --kubeconfig kube.conf -n kube-system delete secret cloudstack-secret\n\n\n\n\nCreate a new secret using kubectl and Kubernetes cluster config:\n\u00a0 \u00a0 ./kubectl --kubeconfig kube.conf -n kube-system create secret generic cloudstack-secret --from-file=/tmp/cloud-config\n\n\n\n\nRemove the temporary file:\n\u00a0 \u00a0 rm /tmp/cloud-config5. Regenerate API and Secret KeysRegenerate the API and secret keys for the original user account that was used to create the Kubernetes cluster."
},
{
"lang": "es",
"value": "Cuando una cuenta de usuario de Apache CloudStack crea un cl\u00faster de Kubernetes basado en CKS en un proyecto, la clave API y la clave secreta del usuario \"kubeadmin\" de la cuenta del autor de la llamada se utilizan para crear la configuraci\u00f3n secreta en el cl\u00faster de Kubernetes basado en CKS. Un miembro del proyecto con acceso al cl\u00faster de Kubernetes basado en CKS tambi\u00e9n puede acceder a la clave API y la clave secreta del usuario \"kubeadmin\" de la cuenta del creador del cl\u00faster. Un atacante miembro del proyecto puede aprovechar esto para suplantar la identidad y realizar acciones privilegiadas que pueden comprometer por completo la confidencialidad, integridad y disponibilidad de los recursos de la cuenta del creador. Se recomienda a los usuarios de CKS actualizar a la versi\u00f3n 4.19.3.0 o 4.20.1.0, que soluciona este problema. Actualizaci\u00f3n de cl\u00fasteres de Kubernetes existentes en proyectos. Se debe crear una cuenta de servicio para cada proyecto a fin de proporcionar acceso limitado, espec\u00edficamente para los proveedores de cl\u00fasteres de Kubernetes y el escalado autom\u00e1tico. Siga los pasos a continuaci\u00f3n para crear una nueva cuenta de servicio, actualizar el secreto dentro del cl\u00faster y regenerar las claves de API y de servicio existentes: 1. Cree una nueva cuenta de servicio. Cree una nueva cuenta con el rol \"Rol de servicio de Kubernetes del proyecto\" con la siguiente informaci\u00f3n: Nombre de la cuenta: kubeadmin- Nombre: Kubernetes Apellido: Usuario de servicio Tipo de cuenta: 0 (Usuario normal) ID de rol: 2. Agregue la cuenta de servicio al proyecto. Agregue esta cuenta al proyecto donde se alojan los cl\u00fasteres de Kubernetes. 3. Genere las claves de API y secretas. Genere la clave de API y la clave secreta para el usuario predeterminado de esta cuenta. 4. Actualice el secreto de CloudStack en el cl\u00faster de Kubernetes. Cree un archivo temporal `/tmp/cloud-config` con los siguientes datos: api-url = # Por ejemplo: /client/api api-key = secret-key = project-id = Elimine el secreto existente usando kubectl y la configuraci\u00f3n del cl\u00faster de Kubernetes: ./kubectl --kubeconfig kube.conf -n kube-system delete secret cloudstack-secret Cree un nuevo secreto usando kubectl y la configuraci\u00f3n del cl\u00faster de Kubernetes: ./kubectl --kubeconfig kube.conf -n kube-system create secret generic cloudstack-secret --from-file=/tmp/cloud-config Elimine el archivo temporal: rm /tmp/cloud-config5. Regenerar API y claves secretasRegenere la API y las claves secretas para la cuenta de usuario original que se utiliz\u00f3 para crear el cl\u00faster de Kubernetes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-2884",
"sourceIdentifier": "cret@cert.org",
"published": "2025-06-10T18:15:30.617",
"lastModified": "2025-06-10T19:15:28.847",
"lastModified": "2025-06-11T15:15:29.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0"
"value": "TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 and advisory VRT0009 of TCG standard TPM2.0"
},
{
"lang": "es",
"value": "La funci\u00f3n auxiliar CryptHmacSign de la implementaci\u00f3n de referencia TCG TPM2.0 es vulnerable a lecturas fuera de los l\u00edmites debido a la falta de validaci\u00f3n del esquema de firma con el algoritmo de la clave de firma. Consulte la errata 1.83 del est\u00e1ndar TCG TPM2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://trustedcomputinggroup.org/about/security/",
@ -21,6 +60,10 @@
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf",
"source": "cret@cert.org"
},
{
"url": "https://trustedcomputinggroup.org/wp-content/uploads/VRT0009-Advisory-FINAL.pdf",
"source": "cret@cert.org"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2025-32711",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-11T14:15:31.530",
"lastModified": "2025-06-11T14:15:31.530",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-33053",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:18.853",
"lastModified": "2025-06-11T01:00:01.443",
"vulnStatus": "Received",
"lastModified": "2025-06-11T14:11:11.517",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network."
},
{
"lang": "es",
"value": "El control externo del nombre o ruta del archivo en WebDAV permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red."
}
],
"metrics": {

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3473",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-11T15:15:29.827",
"lastModified": "2025-06-11T15:15:29.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-277"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7236356",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-35940",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2025-06-10T21:15:22.210",
"lastModified": "2025-06-10T21:15:22.210",
"lastModified": "2025-06-11T14:15:33.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ArchiverSpaApi\u00a0ASP.NET application uses a hard-coded JWT signing key. An unauthenticated remote attacker can generate and use a verifiable JWT token to access protected ArchiverSpaApi URL endpoints."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n ASP.NET ArchiverSpaApi utiliza una clave de firma JWT codificada de forma r\u00edgida. Un atacante remoto no autenticado puede generar y usar un token JWT verificable para acceder a los endpoints URL protegidos de ArchiverSpaApi."
}
],
"metrics": {
@ -51,6 +55,10 @@
{
"url": "https://www.tenable.com/security/research/tra-2025-17",
"source": "vulnreport@tenable.com"
},
{
"url": "https://www.tenable.com/security/research/tra-2025-17",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-35941",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2025-06-11T14:15:33.797",
"lastModified": "2025-06-11T14:15:33.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A password is exposed locally."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2025-18",
"source": "vulnreport@tenable.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-40914",
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"published": "2025-06-11T14:15:34.007",
"lastModified": "2025-06-11T15:15:29.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow.\n\nCryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://github.com/advisories/GHSA-j3xv-6967-cv88",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://github.com/libtom/libtommath/pull/546",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://metacpan.org/release/MIK/CryptX-0.086/source/src/ltm/bn_mp_grow.c",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36328",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-43697",
"sourceIdentifier": "security@salesforce.com",
"published": "2025-06-10T12:15:24.097",
"lastModified": "2025-06-10T12:15:24.097",
"lastModified": "2025-06-11T14:15:34.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (DataMapper) allows exposure of encrypted data.\nThis impacts OmniStudio: before Spring 2025"
},
{
"lang": "es",
"value": "La vulnerabilidad de conservaci\u00f3n inadecuada de permisos en Salesforce OmniStudio (DataMapper) permite la exposici\u00f3n de datos cifrados. Esto afecta a OmniStudio: antes de la primavera de 2025."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@salesforce.com",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-43698",
"sourceIdentifier": "security@salesforce.com",
"published": "2025-06-10T12:15:24.227",
"lastModified": "2025-06-10T12:15:24.227",
"lastModified": "2025-06-11T14:15:34.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for Salesforce objects. \nThis impacts OmniStudio: before Spring 2025"
},
{
"lang": "es",
"value": "La vulnerabilidad de conservaci\u00f3n incorrecta de permisos en Salesforce OmniStudio (FlexCards) permite eludir los controles de seguridad de campo para objetos de Salesforce. Esto afecta a OmniStudio: antes de la primavera de 2025."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@salesforce.com",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-4605",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2025-06-11T14:15:36.847",
"lastModified": "2025-06-11T14:15:36.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a denial-of-service (DoS), or cause data corruption."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-789"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0011",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-47713",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-10T23:15:58.320",
"lastModified": "2025-06-10T23:15:58.320",
"lastModified": "2025-06-11T14:15:35.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts.\u00a0A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that\u00a0could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:\n * Strict validation on Role Type hierarchy: the caller's user-account role must be equal to or higher than the target user-account's role.\n * API privilege comparison: the caller must possess all privileges of the user they are operating on. \n * Two new domain-level settings (restricted to the default Admin): \n\u2003- role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: \"Admin, DomainAdmin, ResourceAdmin\". \n\u00a0 \u00a0- allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de escalada de privilegios en Apache CloudStack, versiones 4.10.0.0 a 4.20.0.0, donde un usuario administrador de dominio malintencionado en el dominio ROOT puede restablecer la contrase\u00f1a de las cuentas de usuario con el rol de administrador. Esta operaci\u00f3n no est\u00e1 restringida adecuadamente y permite al atacante asumir el control de cuentas de usuario con privilegios m\u00e1s altos. Un atacante malintencionado de dominio puede suplantar una cuenta de usuario administrador y obtener acceso a API y recursos confidenciales, lo que podr\u00eda comprometer la integridad y confidencialidad de los recursos, la p\u00e9rdida de datos, la denegaci\u00f3n de servicio y la disponibilidad de la infraestructura administrada por CloudStack. Se recomienda a los usuarios actualizar a Apache CloudStack 4.19.3.0 o 4.20.1.0, que soluciona el problema con lo siguiente: * Validaci\u00f3n estricta en la jerarqu\u00eda de tipos de rol: el rol de la cuenta de usuario del llamante debe ser igual o superior al rol de la cuenta de usuario de destino. * Comparaci\u00f3n de privilegios de API: el usuario que realiza la llamada debe tener todos los privilegios del usuario con el que opera. * Dos nuevas configuraciones a nivel de dominio (restringidas al administrador predeterminado): - role.types.allowed.for.operations.on.accounts.of.same.role.type: Define qu\u00e9 tipos de rol pueden actuar sobre usuarios del mismo tipo. Predeterminado: \"Admin, DomainAdmin, ResourceAdmin\". - allow.operations.on.users.in.same.account: Permite o impide las operaciones de usuario dentro de la misma cuenta. Predeterminado: true."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-47849",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-10T23:15:58.453",
"lastModified": "2025-06-10T23:15:58.453",
"lastModified": "2025-06-11T14:15:35.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.\n\nUsers are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:\n\n\n * Strict validation on Role Type hierarchy: the caller's role must be equal to or higher than the target user's role.\u00a0\n * API privilege comparison: the caller must possess all privileges of the user they are operating on.\u00a0\n * Two new domain-level settings (restricted to the default admin):\u00a0\n\u2003- role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: \"Admin, DomainAdmin, ResourceAdmin\".\u00a0\n\u2003- allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de escalada de privilegios en Apache CloudStack, versiones 4.10.0.0 a 4.20.0.0, donde un usuario administrador de dominio malintencionado en el dominio ROOT puede obtener la clave API y la clave secreta de las cuentas de usuario con el rol de administrador en el mismo dominio. Esta operaci\u00f3n no est\u00e1 restringida adecuadamente y permite al atacante asumir el control sobre cuentas de usuario con mayores privilegios. Un atacante malintencionado de dominio puede suplantar una cuenta de usuario administrador y obtener acceso a API y recursos confidenciales que podr\u00edan comprometer la integridad y confidencialidad de los recursos, la p\u00e9rdida de datos, la denegaci\u00f3n de servicio y la disponibilidad de la infraestructura administrada por CloudStack. Se recomienda a los usuarios actualizar a Apache CloudStack 4.19.3.0 o 4.20.1.0, que soluciona el problema con lo siguiente: * Validaci\u00f3n estricta en la jerarqu\u00eda de tipos de rol: el rol del llamante debe ser igual o superior al rol del usuario objetivo. * Comparaci\u00f3n de privilegios de API: el usuario que realiza la llamada debe tener todos los privilegios del usuario con el que opera. * Dos nuevas configuraciones a nivel de dominio (restringidas al administrador predeterminado): - role.types.allowed.for.operations.on.accounts.of.same.role.type: Define qu\u00e9 tipos de rol pueden actuar sobre usuarios del mismo tipo. Predeterminado: \"Admin, DomainAdmin, ResourceAdmin\". - allow.operations.on.users.in.same.account: Permite o impide las operaciones de usuario dentro de la misma cuenta. Predeterminado: true."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-48013",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-06-11T15:15:41.830",
"lastModified": "2025-06-11T15:15:41.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from 0.0.0 before 2.0.0."
}
],
"metrics": {},
"weaknesses": [
{
"source": "mlhess@drupal.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-065",
"source": "mlhess@drupal.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-48444",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-06-11T15:15:42.143",
"lastModified": "2025-06-11T15:15:42.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from 0.0.0 before 2.0.0."
}
],
"metrics": {},
"weaknesses": [
{
"source": "mlhess@drupal.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-064",
"source": "mlhess@drupal.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-48445",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-06-11T15:15:42.270",
"lastModified": "2025-06-11T15:15:42.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability in Drupal Commerce Eurobank (Redirect) allows Functionality Misuse.This issue affects Commerce Eurobank (Redirect): from 0.0.0 before 2.1.1."
}
],
"metrics": {},
"weaknesses": [
{
"source": "mlhess@drupal.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-066",
"source": "mlhess@drupal.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-48446",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-06-11T15:15:42.427",
"lastModified": "2025-06-11T15:15:42.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability in Drupal Commerce Alphabank Redirect allows Functionality Misuse.This issue affects Commerce Alphabank Redirect: from 0.0.0 before 1.0.3."
}
],
"metrics": {},
"weaknesses": [
{
"source": "mlhess@drupal.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-067",
"source": "mlhess@drupal.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-48447",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-06-11T15:15:42.607",
"lastModified": "2025-06-11T15:15:42.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Lightgallery allows Cross-Site Scripting (XSS).This issue affects Lightgallery: from 0.0.0 before 1.6.0."
}
],
"metrics": {},
"weaknesses": [
{
"source": "mlhess@drupal.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-069",
"source": "mlhess@drupal.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-48448",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-06-11T15:15:42.733",
"lastModified": "2025-06-11T15:15:42.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Allocation of Resources Without Limits or Throttling vulnerability in Drupal Admin Audit Trail allows Excessive Allocation.This issue affects Admin Audit Trail: from 0.0.0 before 1.0.5."
}
],
"metrics": {},
"weaknesses": [
{
"source": "mlhess@drupal.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-068",
"source": "mlhess@drupal.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-49146",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-11T15:15:42.850",
"lastModified": "2025-06-11T15:15:42.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. This vulnerability is fixed in 42.7.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/pgjdbc/pgjdbc/commit/9217ed16cb2918ab1b6b9258ae97e6ede244d8a0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-hq9p-pm7w-8p54",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49148",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-11T15:15:43.043",
"lastModified": "2025-06-11T15:15:43.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ClipShare is a lightweight and cross-platform tool for clipboard sharing. Prior to 3.8.5, ClipShare Server for Windows uses the default Windows DLL search order and loads system libraries like CRYPTBASE.dll and WindowsCodecs.dll from its own directory before the system path. A local, non-privileged user who can write to the folder containing clip_share.exe can place malicious DLLs there, leading to arbitrary code execution in the context of the server, and, if launched by an Administrator (or another elevated user), it results in a reliable local privilege escalation. This vulnerability is fixed in 3.8.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://github.com/thevindu-w/clip_share_server/security/advisories/GHSA-rc47-h83g-2r8j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49709",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-11T12:15:26.977",
"lastModified": "2025-06-11T12:15:26.977",
"lastModified": "2025-06-11T14:15:36.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Ciertas operaciones de canvas podr\u00edan haber provocado corrupci\u00f3n de memoria. Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 139.0.4."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1966083",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49710",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-11T12:15:27.083",
"lastModified": "2025-06-11T12:15:27.083",
"lastModified": "2025-06-11T14:15:36.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se produjo un desbordamiento de entero en `OrderedHashTable` utilizado por el motor JavaScript. Esta vulnerabilidad afecta a Firefox &lt; 139.0.4."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1970095",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-4922",
"sourceIdentifier": "security@hashicorp.com",
"published": "2025-06-11T14:15:37.140",
"lastModified": "2025-06-11T14:15:37.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nomad Community and Nomad Enterprise (\u201cNomad\u201d) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2025-12-nomad-vulnerable-to-incorrect-acl-policy-lookup-attached-to-a-job/75396",
"source": "security@hashicorp.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-4929",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T11:15:19.493",
"lastModified": "2025-05-21T17:42:52.510",
"lastModified": "2025-06-11T14:54:00.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -163,9 +163,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.48.3",
"matchCriteriaId": "8C6BB08B-59CD-4524-AC16-55130113AE69"
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-4954",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-06-10T06:15:22.403",
"lastModified": "2025-06-10T06:15:22.403",
"lastModified": "2025-06-11T14:15:37.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Axle Demo Importer WordPress plugin through 1.0.3 does not validate files to be uploaded, which could allow authenticated users (author and above) to upload arbitrary files such as PHP on the server"
},
{
"lang": "es",
"value": "El complemento Axle Demo Importer de WordPress hasta la versi\u00f3n 1.0.3 no valida los archivos que se cargar\u00e1n, lo que podr\u00eda permitir que usuarios autenticados (autor y superiores) carguen archivos arbitrarios como PHP en el servidor."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/673f35ff-e1d5-4099-86e7-8b6e3e410ef8/",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-5139",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-25T01:15:23.710",
"lastModified": "2025-05-28T14:58:52.920",
"lastModified": "2025-06-11T14:15:37.437",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Qualitor 8.20. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability was found in Qualitor 8.20/8.24. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php of the component Office 365-type Connection Handler. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 8.20.56 and 8.24.31 is able to address this issue. It is recommended to upgrade the affected component."
},
{
"lang": "es",
@ -22,11 +22,11 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
@ -36,7 +36,7 @@
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
@ -66,11 +66,11 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
@ -78,7 +78,7 @@
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
],
@ -88,17 +88,17 @@
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
@ -111,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5268",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-05-27T13:15:22.610",
"lastModified": "2025-06-11T12:15:28.087",
"vulnStatus": "Modified",
"lastModified": "2025-06-11T14:51:14.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -67,14 +67,21 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
"versionEndExcluding": "130.0",
"matchCriteriaId": "474427D8-84E9-4C4B-8B0B-D5961AF6B28E"
"versionEndExcluding": "139.0",
"matchCriteriaId": "E2C0FE7C-6F8E-4F1D-A768-914194586E0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionEndExcluding": "128.11.0",
"matchCriteriaId": "1495D4C0-92D7-4384-8730-B59560AD0BEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionStartIncluding": "129.0",
"versionEndExcluding": "139.0",
"matchCriteriaId": "2BC51636-40B4-4FB9-975F-CBF61A91A8AC"
"matchCriteriaId": "D3A0DDA7-A6CB-43C3-BF53-F21FFB089AD6"
}
]
}
@ -105,11 +112,17 @@
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-45/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-46/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5687",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-11T12:15:29.023",
"lastModified": "2025-06-11T12:15:29.023",
"lastModified": "2025-06-11T14:15:37.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad en Mozilla VPN para macOS permite la escalada de privilegios de un usuario normal a root. *Este error solo afecta a Mozilla VPN en macOS. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Mozilla VPN 2.28.0 &lt; (macOS)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1953736",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-5958",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-06-11T01:15:20.890",
"lastModified": "2025-06-11T01:15:20.890",
"lastModified": "2025-06-11T14:15:37.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "Use After Free en Multimedia en Google Chrome anterior a la versi\u00f3n 137.0.7151.103 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +49,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-5959",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-06-11T01:15:21.030",
"lastModified": "2025-06-11T01:15:21.030",
"lastModified": "2025-06-11T14:15:38.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la versi\u00f3n 137.0.7151.103 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario dentro de un entorno de pruebas mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +49,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5978",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T21:15:22.793",
"lastModified": "2025-06-10T21:15:22.793",
"lastModified": "2025-06-11T14:15:38.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda FH1202 1.2.0.14. Se ha clasificado como cr\u00edtica. La funci\u00f3n fromVirtualSer del archivo /goform/VirtualSer est\u00e1 afectada. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un desbordamiento del b\u00fafer basado en la pila. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
},
{
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-fromVirtualSer-20b53a41781f80b7a6c7e727f93d7d9f",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5979",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T21:15:22.970",
"lastModified": "2025-06-10T21:15:22.970",
"lastModified": "2025-06-11T14:15:38.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects School Fees Payment System 1.0. This affects an unknown part of the file /branch.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects School Fees Payment System 1.0. Esta afecta a una parte desconocida del archivo /branch.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.592463",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/jiangffffd/cve/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5980",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T21:15:23.150",
"lastModified": "2025-06-10T21:15:23.150",
"lastModified": "2025-06-11T14:15:38.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Restaurant Order System 1.0. This vulnerability affects unknown code of the file /order.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Restaurant Order System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /order.php. La manipulaci\u00f3n del argumento tabidNoti provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.592467",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/jiangffffd/cve/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5986",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-06-11T12:15:29.183",
"lastModified": "2025-06-11T12:15:29.183",
"lastModified": "2025-06-11T14:15:38.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un correo electr\u00f3nico HTML manipulado que utiliza enlaces mailbox:/// puede desencadenar descargas autom\u00e1ticas no solicitadas de archivos .pdf al escritorio o directorio personal del usuario sin previo aviso, incluso con el guardado autom\u00e1tico desactivado. Este comportamiento puede utilizarse para llenar el disco con datos innecesarios (p. ej., usando /dev/urandom en Linux) o para filtrar credenciales de Windows mediante enlaces SMB al visualizar el correo electr\u00f3nico en modo HTML. Si bien se requiere la interacci\u00f3n del usuario para descargar el archivo .pdf, la ofuscaci\u00f3n visual puede ocultar el desencadenador de la descarga. Ver el correo electr\u00f3nico en modo HTML es suficiente para cargar contenido externo. Esta vulnerabilidad afecta a Thunderbird (versi\u00f3n anterior a la 128.11.1) y Thunderbird (versi\u00f3n anterior a la 139.0.2)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1958580%2C1968012",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-11T14:00:19.698145+00:00
2025-06-11T16:00:23.482082+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-11T13:58:02.947000+00:00
2025-06-11T15:46:57.620000+00:00
```
### Last Data Feed Release
@ -33,46 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
297718
297733
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `15`
- [CVE-2025-3302](CVE-2025/CVE-2025-33xx/CVE-2025-3302.json) (`2025-06-11T12:15:25.377`)
- [CVE-2025-49709](CVE-2025/CVE-2025-497xx/CVE-2025-49709.json) (`2025-06-11T12:15:26.977`)
- [CVE-2025-49710](CVE-2025/CVE-2025-497xx/CVE-2025-49710.json) (`2025-06-11T12:15:27.083`)
- [CVE-2025-5144](CVE-2025/CVE-2025-51xx/CVE-2025-5144.json) (`2025-06-11T13:15:24.823`)
- [CVE-2025-5687](CVE-2025/CVE-2025-56xx/CVE-2025-5687.json) (`2025-06-11T12:15:29.023`)
- [CVE-2025-5986](CVE-2025/CVE-2025-59xx/CVE-2025-5986.json) (`2025-06-11T12:15:29.183`)
- [CVE-2025-0163](CVE-2025/CVE-2025-01xx/CVE-2025-0163.json) (`2025-06-11T15:15:29.177`)
- [CVE-2025-32711](CVE-2025/CVE-2025-327xx/CVE-2025-32711.json) (`2025-06-11T14:15:31.530`)
- [CVE-2025-3473](CVE-2025/CVE-2025-34xx/CVE-2025-3473.json) (`2025-06-11T15:15:29.827`)
- [CVE-2025-35941](CVE-2025/CVE-2025-359xx/CVE-2025-35941.json) (`2025-06-11T14:15:33.797`)
- [CVE-2025-40914](CVE-2025/CVE-2025-409xx/CVE-2025-40914.json) (`2025-06-11T14:15:34.007`)
- [CVE-2025-4605](CVE-2025/CVE-2025-46xx/CVE-2025-4605.json) (`2025-06-11T14:15:36.847`)
- [CVE-2025-48013](CVE-2025/CVE-2025-480xx/CVE-2025-48013.json) (`2025-06-11T15:15:41.830`)
- [CVE-2025-48444](CVE-2025/CVE-2025-484xx/CVE-2025-48444.json) (`2025-06-11T15:15:42.143`)
- [CVE-2025-48445](CVE-2025/CVE-2025-484xx/CVE-2025-48445.json) (`2025-06-11T15:15:42.270`)
- [CVE-2025-48446](CVE-2025/CVE-2025-484xx/CVE-2025-48446.json) (`2025-06-11T15:15:42.427`)
- [CVE-2025-48447](CVE-2025/CVE-2025-484xx/CVE-2025-48447.json) (`2025-06-11T15:15:42.607`)
- [CVE-2025-48448](CVE-2025/CVE-2025-484xx/CVE-2025-48448.json) (`2025-06-11T15:15:42.733`)
- [CVE-2025-49146](CVE-2025/CVE-2025-491xx/CVE-2025-49146.json) (`2025-06-11T15:15:42.850`)
- [CVE-2025-49148](CVE-2025/CVE-2025-491xx/CVE-2025-49148.json) (`2025-06-11T15:15:43.043`)
- [CVE-2025-4922](CVE-2025/CVE-2025-49xx/CVE-2025-4922.json) (`2025-06-11T14:15:37.140`)
### CVEs modified in the last Commit
Recently modified CVEs: `21`
Recently modified CVEs: `58`
- [CVE-2024-27447](CVE-2024/CVE-2024-274xx/CVE-2024-27447.json) (`2025-06-11T12:53:35.083`)
- [CVE-2024-33117](CVE-2024/CVE-2024-331xx/CVE-2024-33117.json) (`2025-06-11T12:04:14.130`)
- [CVE-2024-33752](CVE-2024/CVE-2024-337xx/CVE-2024-33752.json) (`2025-06-11T12:06:35.033`)
- [CVE-2024-41588](CVE-2024/CVE-2024-415xx/CVE-2024-41588.json) (`2025-06-11T13:54:06.133`)
- [CVE-2024-41590](CVE-2024/CVE-2024-415xx/CVE-2024-41590.json) (`2025-06-11T13:49:57.290`)
- [CVE-2024-41596](CVE-2024/CVE-2024-415xx/CVE-2024-41596.json) (`2025-06-11T13:40:06.773`)
- [CVE-2024-9529](CVE-2024/CVE-2024-95xx/CVE-2024-9529.json) (`2025-06-11T13:58:02.947`)
- [CVE-2025-3877](CVE-2025/CVE-2025-38xx/CVE-2025-3877.json) (`2025-06-11T13:15:24.007`)
- [CVE-2025-49651](CVE-2025/CVE-2025-496xx/CVE-2025-49651.json) (`2025-06-11T13:15:24.483`)
- [CVE-2025-49652](CVE-2025/CVE-2025-496xx/CVE-2025-49652.json) (`2025-06-11T13:15:24.613`)
- [CVE-2025-49653](CVE-2025/CVE-2025-496xx/CVE-2025-49653.json) (`2025-06-11T13:15:24.720`)
- [CVE-2025-5263](CVE-2025/CVE-2025-52xx/CVE-2025-5263.json) (`2025-06-11T12:15:27.183`)
- [CVE-2025-5264](CVE-2025/CVE-2025-52xx/CVE-2025-5264.json) (`2025-06-11T12:15:27.373`)
- [CVE-2025-5265](CVE-2025/CVE-2025-52xx/CVE-2025-5265.json) (`2025-06-11T12:15:27.553`)
- [CVE-2025-5266](CVE-2025/CVE-2025-52xx/CVE-2025-5266.json) (`2025-06-11T12:15:27.730`)
- [CVE-2025-5267](CVE-2025/CVE-2025-52xx/CVE-2025-5267.json) (`2025-06-11T12:15:27.910`)
- [CVE-2025-5268](CVE-2025/CVE-2025-52xx/CVE-2025-5268.json) (`2025-06-11T12:15:28.087`)
- [CVE-2025-5269](CVE-2025/CVE-2025-52xx/CVE-2025-5269.json) (`2025-06-11T12:15:28.270`)
- [CVE-2025-5270](CVE-2025/CVE-2025-52xx/CVE-2025-5270.json) (`2025-06-11T12:15:28.457`)
- [CVE-2025-5271](CVE-2025/CVE-2025-52xx/CVE-2025-5271.json) (`2025-06-11T12:15:28.647`)
- [CVE-2025-5272](CVE-2025/CVE-2025-52xx/CVE-2025-5272.json) (`2025-06-11T12:15:28.840`)
- [CVE-2025-22996](CVE-2025/CVE-2025-229xx/CVE-2025-22996.json) (`2025-06-11T15:38:44.620`)
- [CVE-2025-22997](CVE-2025/CVE-2025-229xx/CVE-2025-22997.json) (`2025-06-11T15:35:40.463`)
- [CVE-2025-25193](CVE-2025/CVE-2025-251xx/CVE-2025-25193.json) (`2025-06-11T15:36:22.693`)
- [CVE-2025-26412](CVE-2025/CVE-2025-264xx/CVE-2025-26412.json) (`2025-06-11T14:15:30.987`)
- [CVE-2025-26521](CVE-2025/CVE-2025-265xx/CVE-2025-26521.json) (`2025-06-11T14:15:31.137`)
- [CVE-2025-2884](CVE-2025/CVE-2025-28xx/CVE-2025-2884.json) (`2025-06-11T15:15:29.487`)
- [CVE-2025-33053](CVE-2025/CVE-2025-330xx/CVE-2025-33053.json) (`2025-06-11T14:11:11.517`)
- [CVE-2025-35940](CVE-2025/CVE-2025-359xx/CVE-2025-35940.json) (`2025-06-11T14:15:33.690`)
- [CVE-2025-43697](CVE-2025/CVE-2025-436xx/CVE-2025-43697.json) (`2025-06-11T14:15:34.253`)
- [CVE-2025-43698](CVE-2025/CVE-2025-436xx/CVE-2025-43698.json) (`2025-06-11T14:15:34.417`)
- [CVE-2025-47713](CVE-2025/CVE-2025-477xx/CVE-2025-47713.json) (`2025-06-11T14:15:35.560`)
- [CVE-2025-47849](CVE-2025/CVE-2025-478xx/CVE-2025-47849.json) (`2025-06-11T14:15:35.727`)
- [CVE-2025-4929](CVE-2025/CVE-2025-49xx/CVE-2025-4929.json) (`2025-06-11T14:54:00.567`)
- [CVE-2025-4954](CVE-2025/CVE-2025-49xx/CVE-2025-4954.json) (`2025-06-11T14:15:37.287`)
- [CVE-2025-49709](CVE-2025/CVE-2025-497xx/CVE-2025-49709.json) (`2025-06-11T14:15:36.387`)
- [CVE-2025-49710](CVE-2025/CVE-2025-497xx/CVE-2025-49710.json) (`2025-06-11T14:15:36.527`)
- [CVE-2025-5139](CVE-2025/CVE-2025-51xx/CVE-2025-5139.json) (`2025-06-11T14:15:37.437`)
- [CVE-2025-5268](CVE-2025/CVE-2025-52xx/CVE-2025-5268.json) (`2025-06-11T14:51:14.950`)
- [CVE-2025-5687](CVE-2025/CVE-2025-56xx/CVE-2025-5687.json) (`2025-06-11T14:15:37.730`)
- [CVE-2025-5958](CVE-2025/CVE-2025-59xx/CVE-2025-5958.json) (`2025-06-11T14:15:37.870`)
- [CVE-2025-5959](CVE-2025/CVE-2025-59xx/CVE-2025-5959.json) (`2025-06-11T14:15:38.037`)
- [CVE-2025-5978](CVE-2025/CVE-2025-59xx/CVE-2025-5978.json) (`2025-06-11T14:15:38.197`)
- [CVE-2025-5979](CVE-2025/CVE-2025-59xx/CVE-2025-5979.json) (`2025-06-11T14:15:38.320`)
- [CVE-2025-5980](CVE-2025/CVE-2025-59xx/CVE-2025-5980.json) (`2025-06-11T14:15:38.623`)
- [CVE-2025-5986](CVE-2025/CVE-2025-59xx/CVE-2025-5986.json) (`2025-06-11T14:15:38.880`)
## Download and Usage

View File

@ -152159,7 +152159,7 @@ CVE-2020-18280,0,0,a9cfb6ea53a948cf0e342ecc74a2dca2fdaa7c7b9c577376593dea94ce260
CVE-2020-18282,0,0,fe4eba486f70f3a3cc1bb03e6652192f2f18e2129c2628985cfedb2aca0116fe,2025-01-29T17:15:10.627000
CVE-2020-1829,0,0,4400c1c20020eb794399c17dd64935689a5a7a7d2746f03b085f845dd3cb71c6,2024-11-21T05:11:26.960000
CVE-2020-1830,0,0,0ddce4b6a7b14fd50fb01fd83ac721a18ad075608807f694e075ac74b09960bc,2024-11-21T05:11:27.083000
CVE-2020-18305,0,0,f3b0647b6159a86952b6442e3b6532af547f436496dadc4128ecdf1fe6d9110a,2024-11-21T05:08:31.600000
CVE-2020-18305,0,1,78e88e61eeac2d0f895e6f06b9ee5211070c6670f420b83d3548d910f3b39c5a,2025-06-11T14:57:21.840000
CVE-2020-1831,0,0,bf047f809ce06f3652b0ad05858afab7c0a10d9bdd8deb5396a064f23b190d96,2024-11-21T05:11:27.207000
CVE-2020-1832,0,0,a5379d3de9d87ca1f4c2f3c869d9df03d88d520fc4adc307c04a099c784520d5,2024-11-21T05:11:27.330000
CVE-2020-18324,0,0,f27a404289abbb4dd3bff4d8964c2865181bea9a08ee9c8e021397de4d101543,2024-11-21T05:08:31.823000
@ -185229,7 +185229,7 @@ CVE-2021-43893,0,0,83c2b062c1bf318433a78f16824511f05a8e975f4509d93564b2672be6494
CVE-2021-43896,0,0,5a5de57168b4daf05754a217ea61d4778ae325d6caa5a5f558b7b41691048a65,2024-11-21T06:30:00.013000
CVE-2021-43899,0,0,f98df78e0f6a9d56123d89aee7e2089e0298067fdca83f4ec45a79af53338ec4,2024-11-21T06:30:00.137000
CVE-2021-4390,0,0,f480971a47a33e54aadb44c3bfffba7d444515713962bf1728f577c64be9d2cd,2024-11-21T06:37:34.873000
CVE-2021-43905,0,0,cb114456ba8acd11de724d84eef3dc3431add41fac4b657ee212db1d6b30528b,2024-11-21T06:30:00.253000
CVE-2021-43905,0,1,3caa28adc749d6ee8faee4b16c19e43afb080bcde35d0f4090aa5ea92829fb13,2025-06-11T15:27:02.517000
CVE-2021-43907,0,0,84c7124b996d2741fd86d8fae9c03ba9e8ecb5e7f360f5baf94ec75222ca0e29,2024-11-21T06:30:00.367000
CVE-2021-43908,0,0,938da751d1a63ef167c78541cda960e411157cb3ab02ffb97d3ccd76c8075a51,2024-11-21T06:30:00.473000
CVE-2021-4391,0,0,820923a9ae9bad29e982f47ca4386e54fe0a49316963a7abf8a208f4d6872a69,2024-11-21T06:37:35.053000
@ -235164,7 +235164,7 @@ CVE-2023-43586,0,0,0b179b1973420f89695bd4033aa5b4a7070a9f607b4d363509cf96797c77e
CVE-2023-43588,0,0,779f8c46f256b6dc6c509095540e7cca1b778b261a9122490bb338004c250d70,2024-11-21T08:24:26.977000
CVE-2023-4359,0,0,c526edc2eda072a9f787def5c5634b44a07e8f184f5668a09865baa12054ef85,2024-11-21T08:34:55.737000
CVE-2023-43590,0,0,a24b0a4d4fbd849cf9c8576934def2996908e56c45e589c0a4718de3c52b705a,2024-11-21T08:24:27.107000
CVE-2023-43591,0,0,7089bdd917ed1a6d5c9808def1f484fb67c2e6a88e9a9ee81ab645fde8d2e80f,2024-11-21T08:24:27.223000
CVE-2023-43591,0,1,861183d95cbe5163fd4eaffaf48e44beda937f7ad3929622dbe4bec2b13503ba,2025-06-11T15:15:26.057000
CVE-2023-4360,0,0,bf776b564f3d9f4caa1d912b4d5307249bcc398bd846123f845e5bb5ceeeb373,2024-11-21T08:34:55.873000
CVE-2023-43608,0,0,6c27dbdafa55f2b7aa33c3b628ee6a7a91ecbd84b5bb3689ac1f00133224f13b,2024-11-21T08:24:27.367000
CVE-2023-43609,0,0,75f30095c4f4e4e457e17ae12eff03d46c5fbd1c1d424a29e6514e4d8050cc7c,2025-06-10T19:15:26.357000
@ -237500,7 +237500,7 @@ CVE-2023-46845,0,0,8cca69f35c18b37d1e400c1780d51f45ac93f2d00dcfe2123c24403e52459
CVE-2023-46846,0,0,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000
CVE-2023-46847,0,0,25226d6c3ea5f3ae387efea28db924389911d043f96c3ee615accfee7a912619,2024-11-21T08:29:25
CVE-2023-46848,0,0,fc1a3cbe733e7d75d5767c3bf972500d8208d1d249d69703d688044c0e53a543,2024-11-21T08:29:25.190000
CVE-2023-46849,0,0,d939db9ad23b15e2c76e72ad352b3bf6d630c9fe03bd4a9ee0d93213deca79b3,2024-11-21T08:29:25.337000
CVE-2023-46849,0,1,feab4a74864884fe4c1f0bc90f1c801b388b79ae3c68ce83cc030b25eae0192b,2025-06-11T15:15:26.793000
CVE-2023-4685,0,0,01f57904079cf1486cf9c3b39be3f5ef970724886f67adcadb32146d37100d87,2024-11-21T08:35:40.977000
CVE-2023-46850,0,0,d3e49645b8e5224f7ccc9a68e9bc661c5d6870d2a7540848cc979d9532ef9df1,2024-11-21T08:29:25.480000
CVE-2023-46851,0,0,95521f9ee5bfe22433c7bdb3d910a9994749139964e2e9dc9b9f71db17626997,2024-11-21T08:29:25.597000
@ -237848,7 +237848,7 @@ CVE-2023-47325,0,0,64c4a3c263fdb1b7b2856ddcac672fcec2e6bdc32fd55784f6f9223aa35de
CVE-2023-47326,0,0,f8ae019487cdb5a73bdaf9901b0c7c8370bd0eae62e999d224b4ead1cd422864,2024-11-21T08:30:10.017000
CVE-2023-47327,0,0,7e1735cd8110b984c51f8790c647d737852287cb7ddabda3f7101ec50e44b751,2024-11-21T08:30:10.157000
CVE-2023-4733,0,0,f64bc1cd14515c3e2f0ffd57a2c6ddf0ebb49770cbcd875940ceea7d5922513c,2024-11-21T08:35:51.280000
CVE-2023-47335,0,0,d507cff56867e141e9b35e917d642811138f4f3418bbdb0b2bda100510e4ec09,2024-11-21T08:30:10.297000
CVE-2023-47335,0,1,7f0f1b3ede790346f8fdc95c28bd4aafa8ce52c0d8ba1eb98786b97523ac59b0,2025-06-11T15:15:27.043000
CVE-2023-4734,0,0,fa674d9bfa6149b4cd75315307dcee77ad9f41f1eb4299d08b9ed964b7651e72,2024-11-21T08:35:51.477000
CVE-2023-47345,0,0,c1afca5fed4bd2fea915f1410e3af656e88ec1a4f8a86fac2c05cfee6023b97a,2024-11-21T08:30:10.440000
CVE-2023-47346,0,0,f0345c801d164d12b269122c80a5ca2bc3338a6ea8f01bfc839bdd5327c36e73,2024-11-21T08:30:10.577000
@ -237922,7 +237922,7 @@ CVE-2023-47471,0,0,32f43880fab73f05f590bf4ae7a80f5aae9c2e32aa967e7aee7491151341c
CVE-2023-47473,0,0,d622eae7627e9a5cab25305aab5189a781012f765170cec24ebf78583cecf7f9,2024-11-21T08:30:20.240000
CVE-2023-4748,0,0,8663095fccf5eff2d0970e24775dfab925ddc57ca3819cd539c72d83d5072af8,2024-11-21T08:35:53.580000
CVE-2023-47480,0,0,5f1bc70735285e7f17e688622b8302ddd92cfe9fa40c1ad6149d2b2ea01d7f12,2024-11-21T08:30:20.460000
CVE-2023-47488,0,0,1530eb6da15eb63c7f014815704b70974b4f5a7e99aa62f9d0484837b8894197,2024-11-21T08:30:20.677000
CVE-2023-47488,0,1,1e55d1d8648bcc44ad730e4706833754dd03b7c6f8a0dbc969fd67bb265443b6,2025-06-11T15:15:27.260000
CVE-2023-47489,0,0,e90a28b4fe0f175eb4ea0e3160524e16396ee8b9ead64f7259cb2e16cf8380ac,2024-11-21T08:30:20.820000
CVE-2023-4749,0,0,ca6e00963a427aee3acbbc8d24dc61f96bd67c4c853715d4eab60b5c01e7a8e9,2024-11-21T08:35:53.720000
CVE-2023-4750,0,0,9d45405700fae72668fa764ee604d5c3a396ef6133cf85d1aafea757c35ead25,2024-11-21T08:35:53.867000
@ -238085,7 +238085,7 @@ CVE-2023-47670,0,0,7645b4d9cd07d33c825e377864a7ee069ca2942aba7ebaf883928a7f6bf6b
CVE-2023-47671,0,0,150f2889cf9716f4330007aabcea7dc3947d225a0fdf861656db93facb2c4aad,2024-11-21T08:30:38.880000
CVE-2023-47672,0,0,7a32ee70b53201a29d0fb10a0628e7c1f353340f632da50099e170710e302eff,2024-11-21T08:30:39.013000
CVE-2023-47673,0,0,521b4a22397c0b0b603c5b9c441b52d38a22242d3767568bb9889bfd3c0299c3,2024-11-21T08:30:39.140000
CVE-2023-47674,0,0,13e92f1c68ee32fccae49e819128ad8764f72000557cd58de7f6c9bd5ef885b3,2024-11-21T08:30:39.267000
CVE-2023-47674,0,1,8588486fc47222e8a69584a304b545b0c53386704bf80ce94bb3abfdc7b41fc8,2025-06-11T15:15:27.487000
CVE-2023-47675,0,0,c86344aaed815eec4ee17290ba6358516495f8d51a918dee1a4e4b6eee2fa5fc,2024-11-21T08:30:39.423000
CVE-2023-47677,0,0,3caebbd65cda08c6ddb656fd37c737c3e9211c156e00b441627180836d2293b8,2024-11-21T08:30:39.543000
CVE-2023-47678,0,0,bd43ee5401534c70b4dd1db98e6c2d8e8ef452acc10c37d537580fa6a5a6a699,2024-11-21T08:30:39.673000
@ -238386,7 +238386,7 @@ CVE-2023-4819,0,0,071e675aad05bfa8cb649b9b25d4c0c3f5a75f8cb8287b9cc5279791856262
CVE-2023-48192,0,0,4240cd8250bfc3eb14f439d678088098f9702795e0b43f8d895e1ca458b6137c,2024-11-21T08:31:11.440000
CVE-2023-48193,0,0,527bc3f183def1e9c17e3340d1cf773745c4085555f2641c3faa604e93f7ac4e,2024-11-21T08:31:11.587000
CVE-2023-48194,0,0,89ed483ac6c22c85dd7489b795e294c3a4fb1883ed272f16d543b939692756f7,2024-11-21T08:31:11.740000
CVE-2023-48197,0,0,541e2e2dbadf4c1fc33a37b79d38875bdb81d89915a88dc61cd7177cc00c0dd6,2024-11-21T08:31:11.990000
CVE-2023-48197,0,1,2a8d5fa0eeb5fb5d829e67c9d58f8f5cfd2ad44c21835b251cbbd84f8b166774,2025-06-11T15:15:27.713000
CVE-2023-48198,0,0,e914d510dc94ba3802fedfbde5ce0c09e7bbfb1ed10c2616609647a73a58c5bc,2024-11-21T08:31:12.140000
CVE-2023-48199,0,0,02d93cf4dc9ab71c968304332cfbd654d91ace976c5191aacfefe4728b8d3636,2024-11-21T08:31:12.297000
CVE-2023-4820,0,0,a231d8e236cec098509c357874409b1b9aff7f97a915cf7a95f688fac9290237,2025-03-05T17:15:12.883000
@ -247569,7 +247569,7 @@ CVE-2024-12426,0,0,e28649f93ee0f137724688a87f52bd9672834bc574f6f02af35105ba38dad
CVE-2024-12427,0,0,86507f7f094bd68cc6d848d7d1a03f7517cc83f79982983f55ec3c43fb57f866,2025-03-04T17:24:20.370000
CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000
CVE-2024-12429,0,0,df12f7abbef94c2382f1dae8fbc46ef25fa72524515700b274279ec69b985d4c,2025-01-07T17:15:20.527000
CVE-2024-1243,0,0,6ca5350df3abbfb06b377ab24d0559ebadb310b91ffad1201598980b13c2dcc7,2025-06-11T02:15:20.270000
CVE-2024-1243,0,1,390c6bcaa6fe14d46e623a93ee7f54c5976f87585670b1e2585fac75e06a0df6,2025-06-11T15:15:28.230000
CVE-2024-12430,0,0,3623fd73564e8c219fafc425eac3c2c16708d4d7c0f61297e30059f08601a297,2025-01-07T17:15:20.703000
CVE-2024-12431,0,0,5644edd69c348df2239cdc93e705cfed1755dba38cc5e3639c6fa22724a9f624,2025-01-08T21:15:11.760000
CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000
@ -249052,7 +249052,7 @@ CVE-2024-13861,0,0,360211110586d48dd70dc723db2b58a14ced33576691ad94d58c50e823722
CVE-2024-13862,0,0,a57c4fd8f73c8f2ef94b8d9a3f5417da4d83ca39674a155ef66d664233e36faf,2025-05-21T19:33:15.200000
CVE-2024-13863,0,0,c7caee7e5c93d81b9af8b0138e75c688fb9febb3d7538b5b3534c3b224573bb9,2025-04-29T17:35:22.800000
CVE-2024-13864,0,0,c8005b10478f0295163ea4c5800d8b7b3333680590f2b8cc9e73f5cd9636efe3,2025-05-06T15:05:46.537000
CVE-2024-13865,0,0,43bd178e19baead4cb7ac71c7cec0c8d0b10d0e9d09c994c9739aa715cdd0945,2025-05-20T20:15:36.660000
CVE-2024-13865,0,1,50363ee1a4dd2aad050e587c8479124b097c749bbfa0e978e0deb9bccb0eac8f,2025-06-11T14:55:38.617000
CVE-2024-13866,0,0,a701a4a58094c13382e4ccc07ff53f8edcaa8a7b85d65b60e80e37b7129c441c,2025-03-05T09:15:09.587000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-13868,0,0,5f90da423a6fd804019ae30399be671545219c7108740f7ff15c5b00d0b55e4b,2025-05-21T15:28:50.360000
@ -249401,7 +249401,7 @@ CVE-2024-1659,0,0,89ae27a5a9ba7c42d9a91c4b580358dd8ae6b774fde1ed1f21377fc2426997
CVE-2024-1660,0,0,bcc7a96f40649c3702a4d488bfefc13113e0fc4577fc23a0f7fcc4b75f320a14,2025-05-08T16:48:49.267000
CVE-2024-1661,0,0,57419dfac19fc8b1117ab03280b3c2a88810749b66775f5fc9b43a910e481cd7,2024-11-21T08:51:01.803000
CVE-2024-1662,0,0,147b493f649bc748f75384551192827ffc56f17812a25b829b7ebf0a1ed43a45,2024-11-21T08:51:01.957000
CVE-2024-1663,0,0,18b59c28a9054f4610ca76e76fd8125e8b963a367dbb4128ba7f29df0d0e6592,2025-05-20T15:16:03.367000
CVE-2024-1663,0,1,399541b36c7116de33186c7cee0ffafbb6e6d644b9c5d194c0e56fd4b5a72071,2025-06-11T14:48:53.673000
CVE-2024-1664,0,0,1445c655402916291b15040a6ae8d2de79ad43087a8039e72ecfdff51d852516,2025-05-13T00:44:51.903000
CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a098,2024-06-07T17:15:49.850000
CVE-2024-1666,0,0,089335f87a6dcbe16f454cd776a838285b6d754521e9a0f8137d17bef352cfba,2025-01-10T14:34:01.473000
@ -254763,7 +254763,7 @@ CVE-2024-2639,0,0,45a532020fe06674d823d0b4e264d15e0ee33a5111617c7171979d4c53ef78
CVE-2024-2640,0,0,2d97cdb3e462b6f0c784d4db1a7d7c20cbceea5fa11206e832577d8c929d2bf6,2024-11-21T09:10:11.623000
CVE-2024-2641,0,0,70a70be0b042731ccdc73536925161bf9a9aa50cb2b7e715353e185314654c4e,2024-11-21T09:10:11.820000
CVE-2024-2642,0,0,52ad972556cc065c34954675f727e5508f8caab5590185ce6cde82cc71dc74fb,2024-11-21T09:10:11.963000
CVE-2024-2643,0,0,ce30534635125a64f23d3444d51d6d5c210731228d7b19e111eda7d15cdd9ea7,2025-05-20T15:16:04.070000
CVE-2024-2643,0,1,05a64080cba78cf699d29a6069ac5af707170ffbce5faa54487afbdb0e9edb1e,2025-06-11T14:45:57.147000
CVE-2024-2644,0,0,4048e8752f27add71acd228a0d07e2962cd563fe85cb710df0b865d642724f8c,2025-02-07T15:07:30.080000
CVE-2024-26445,0,0,1e1692a3ab92c100abf93e1b088c041121edd2a6fdb5057ec8a7e9ed1a7b0946,2025-03-25T16:59:36.567000
CVE-2024-2645,0,0,6fb823d4a9b88e90db41973fcb8e2b731f2971c605b6e0b00e416d679a1621d0,2025-01-30T15:39:23.947000
@ -255746,7 +255746,7 @@ CVE-2024-27441,0,0,8627ee176bbd8db9047f0ac2824f85227251736cca8356f59d7164883e716
CVE-2024-27442,0,0,b113225cd79b3d0b44b8bc15a83e3bd1b29f742e07843ffbf5a451ca58f7ad33,2024-08-13T17:30:36.833000
CVE-2024-27443,0,0,3c0a90cacc761474c320235ca1b019a4cad7bf02e5db3b5bcee9676fec4b0c87,2025-05-21T18:43:52.287000
CVE-2024-27444,0,0,f2782679746ac825122096e332d365a1377f937908fa850657f47ae7562722ec,2024-11-21T09:04:37.470000
CVE-2024-27447,0,1,f6d6d9fad48a31686fdab5f9950d31651bead604f5590caf8910094e154c5642,2025-06-11T12:53:35.083000
CVE-2024-27447,0,0,f6d6d9fad48a31686fdab5f9950d31651bead604f5590caf8910094e154c5642,2025-06-11T12:53:35.083000
CVE-2024-27448,0,0,8d84df435d462af3b84b4a4f1503868d7e64fb34bcf7329beab88ef9e1029260,2025-03-13T15:15:42.293000
CVE-2024-2745,0,0,28743d3482c4dc2cc7e95a6a28bdb765faa2729a76e91dd4c556600c182f0f12,2025-02-25T18:36:41.020000
CVE-2024-27453,0,0,d7a686cd701b8be9d28be91ce51b1a48b487049402a86408c25fdcdc51bc0bfb,2025-06-10T17:58:18.297000
@ -255827,7 +255827,7 @@ CVE-2024-27623,0,0,0b8613e0438e050befc8caafef4caeb2c7fedf67a19158500b4830afaf3b8
CVE-2024-27625,0,0,6b594fcfc101fa835d824b87493f4b5d8cf00a7664f013cc884858d547c79926,2025-03-28T16:07:53.420000
CVE-2024-27626,0,0,9a1abf5d0b8cb2d3b863768b43ec83911190b875da99fdca947dfb8d0f43eff6,2024-11-21T09:04:49.480000
CVE-2024-27627,0,0,64e619d9251dac6d6016764b95186a6975a71f8714a3967a40144f57f22acc23,2024-11-21T09:04:49.697000
CVE-2024-27628,0,0,1f8afca8560984d1e89d56d5ba3d725ffacfb46d6fb433f79a414003de710b28,2024-11-21T09:04:49.920000
CVE-2024-27628,0,1,46387e1fb6677fef5f092ea931a292681d4b56138363088d2c6117deec1853a1,2025-06-11T15:22:56.587000
CVE-2024-27629,0,0,925d6c515470e75988e5c00e502d5ff2d6b8836f5e5c3c8e1facf7db93bb0b30,2024-11-21T09:04:50.130000
CVE-2024-2763,0,0,3f18bfa4fd358968aa90c50d9ee28b19b5412989c011c855e39ada9c410ddc2c,2024-12-12T17:31:50.877000
CVE-2024-27630,0,0,87a64c68353f0154cf4feee5b64e5623b367aa0302eeabb3b4300ca1b5a106e5,2025-03-13T17:15:30.070000
@ -260018,7 +260018,7 @@ CVE-2024-33110,0,0,6ffbc94f167a52dfbd0ed621b524235b74f27a94f81d2620691ca07e335ee
CVE-2024-33111,0,0,17f4a588b6771453aae4fc0d8fe54488d2c27b36ab3b37893b9ded6fd2912f18,2025-05-21T13:02:32.660000
CVE-2024-33112,0,0,f8ad2bcf8d7e340ab8b56d4ec4e1bfe3463c718134abce8b16f9a87aaa63e418,2025-05-21T13:02:30.203000
CVE-2024-33113,0,0,7cf7987cc0dd6caecd85afedffd5aa13c551f5a0cf5e90dfd19e9f43dd0dd370,2025-05-21T13:02:27.457000
CVE-2024-33117,0,1,528352eca85edaf59d5ef88e311d6c940ccae0f464a8c238d0cc95b7c6f9cd01,2025-06-11T12:04:14.130000
CVE-2024-33117,0,0,528352eca85edaf59d5ef88e311d6c940ccae0f464a8c238d0cc95b7c6f9cd01,2025-06-11T12:04:14.130000
CVE-2024-33118,0,0,72c8999c88c2b5558e4a8f33a58e566f4eb8caa38d2e54a61703d28769d04715,2025-06-10T19:43:40.383000
CVE-2024-3312,0,0,5f7abfea07e26708b46deb725eba9cf7ab27075e45367056ede9366567e02312,2024-11-21T09:29:22.277000
CVE-2024-33120,0,0,6059ae7834dce7456d75514ab19c32a74ce0bc8de7f67b7ab7f5e8e4997c2e7a,2025-05-01T14:55:22.393000
@ -260413,7 +260413,7 @@ CVE-2024-3374,0,0,420f73150af02275166b9c440c567922c144b0ea7f73169b89eb730ef81c3a
CVE-2024-33748,0,0,acc248d0cfbd8692cea48635d656011bb983fa9bd242614a24fa39140acf6529,2024-11-21T09:17:26.140000
CVE-2024-33749,0,0,2749a1eef01de8a6200de4cabc78dc3e00a5a4d8cb932c669d1e90435b0ca346,2025-04-01T18:05:32.370000
CVE-2024-3375,0,0,9705036410c25948012494141e27b48a4ee424b1500d49272b52c98930b4fb01,2024-11-21T09:29:29.443000
CVE-2024-33752,0,1,cb9a92a990be6bf2f2831adfde5bc6f3b734cb86e9dd2d39a6e6c3426345c897,2025-06-11T12:06:35.033000
CVE-2024-33752,0,0,cb9a92a990be6bf2f2831adfde5bc6f3b734cb86e9dd2d39a6e6c3426345c897,2025-06-11T12:06:35.033000
CVE-2024-33753,0,0,d6dd9a560aacef7fbfdb8e582f966b14086954aa85705d5f248034003e649ad3,2024-11-21T09:17:26.740000
CVE-2024-3376,0,0,d0b726129a0cb4aa357ddbea81c1414fafc204c7b2176615db21f058e6802519,2025-01-17T17:41:21.647000
CVE-2024-33763,0,0,efdd783f0638df5aefc0de37545ea93326aee139131b46e1d8e52abd6f3fb384,2025-04-15T17:14:08.027000
@ -260434,7 +260434,7 @@ CVE-2024-33782,0,0,7fd2e15e493f98e5511ac2818217f87418960726424b1be6b5b59f20ba784
CVE-2024-33783,0,0,3efb6717dc071bcd4966a7972f6670fd4553a3d85347d37b83769ae70d5d4aa4,2024-11-21T09:17:29.247000
CVE-2024-33786,0,0,e1fb385dd8747da32e59253a9ffdea319cd8cdf03f2ca73f386cdc040ae670ac,2024-11-21T09:17:29.420000
CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f0a5,2024-11-21T09:17:29.593000
CVE-2024-33788,0,0,43883aa11c8f8d9e2b0e9c2a3228de314f0cbb5388933699b91e2c176c156f8e,2024-11-21T09:17:29.797000
CVE-2024-33788,0,1,d9e631d68ae2203702b7e708decaf819d9af63c25e4d0516bd7f43a761e5472b,2025-06-11T15:39:33.297000
CVE-2024-33789,0,0,5986e92c6ccb4c451262b2b9902891f0ea70e1b2b0fa3b4355e2c35998fcde42,2025-06-10T18:01:58.607000
CVE-2024-3379,0,0,ff4b29a94fdd9578584432ff10eeb3895455cc484ac7d59b569ca6f419a0ff31,2024-11-18T21:30:49.947000
CVE-2024-33791,0,0,cd712f1b08608ec404f57f0c2d9228e781ce3c7f5333a295e303b9e9ebade340,2024-11-21T09:17:30.170000
@ -261005,12 +261005,12 @@ CVE-2024-34488,0,0,1c8363a756b1db7c16aa9d13bb9481a58a515d14b8b4ad97e6464e737eefc
CVE-2024-34489,0,0,e38724172e0a0c52a247f1048d162135594d6d51d73ed3946e5efab6231bf9c3,2025-04-15T17:39:08.930000
CVE-2024-3449,0,0,e1530ccb36d47a9f2f107bc6ba4716b9b546171ff116ec5264773a56f263e670,2025-02-11T02:15:34.650000
CVE-2024-34490,0,0,99bee308a871b5c1e5cc8ac5d90e0aff0732098a9a5af8f52bdfc4827b12fbed,2024-11-21T09:18:49.207000
CVE-2024-34500,0,0,ad0d4277fb282ffeba130e48b29d422feab82a804fbd90a55147b70fa341bf7e,2024-12-04T21:15:23.877000
CVE-2024-34500,0,1,890c3fc863628ee6244d3590d0d4f94a07e3f72d4f15b7f39f4ce19c729fc4da,2025-06-11T14:44:14.040000
CVE-2024-34502,0,0,76aeea82543e0b722fdedcdb5720bd94dbdd5a58653d6c0fe9797dd2b1c558cc,2024-11-21T09:18:49.567000
CVE-2024-34506,0,0,765d28adb88f0afe403385b61b81ec66e649746dec0e99fdef13c9e005ff0645,2024-11-21T09:18:49.790000
CVE-2024-34507,0,0,d148d49269b067aac1ed2e5c7c327d93c5f56910a5e7ae430eca8a9fbf2ef9eb,2024-11-21T09:18:49.997000
CVE-2024-34508,0,0,c837d85f215debfd4876cf202e711a6ae35fdcbae2f4f24a57d2ef7ef10c5af2,2025-06-10T17:44:33.870000
CVE-2024-34509,0,0,18b67055124fa20b0e91c183169f58ecae6378de7abdd8b999f1e0307f71e986,2024-11-21T09:18:50.360000
CVE-2024-34509,0,1,244a1e513fdb31a71b9a2847887cf351dcaa2d407387468ade35178704c29e41,2025-06-11T15:35:22.570000
CVE-2024-34510,0,0,0cd296a8ed9ad583e4681fc3af8f3a5c25699e2d2db65e494d34dafe2b8c0615,2024-11-21T09:18:50.597000
CVE-2024-34511,0,0,c1d20a47728b6c5526364d02e8958d8fb0539448423cf5c76333bac10d97f143,2024-05-14T15:39:15.780000
CVE-2024-34515,0,0,b2a5f6a619eb7e9f032aeb367dbb16cc9eea3104e0bc1ce005d69ffe8c66635e,2024-11-21T09:18:50.773000
@ -263350,9 +263350,9 @@ CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d7
CVE-2024-37391,0,0,83604059a0a3493e2890c3d7d2ec3ff1f78123fc0b5c774b0cb9659167e26236,2025-03-13T15:15:45.533000
CVE-2024-37392,0,0,2ddcfdda121ccf673d3c3575ba342373b49a9baac2c6a11d1f9b50a7a51a719f,2025-03-20T14:15:19.487000
CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000
CVE-2024-37394,0,0,8659e7677c2e6a6b5663456a11183774f367d0f5f5c99a0e7ee7c8cc4159dda3,2025-06-10T18:15:29.527000
CVE-2024-37395,0,0,fbc3f124796da6de01089ac670eed86fa687af889d780a1b50b5136c8c1fa4d8,2025-06-10T18:15:29.660000
CVE-2024-37396,0,0,ecc5302a6eb03fa788bfa1b2bb89251461d308c62303a273d379d93f827194ba,2025-06-10T18:15:29.773000
CVE-2024-37394,0,1,c396580351084a76f64893ffc3fbae6cbf4d916fac300f0625e760c38ae7779e,2025-06-11T15:15:28.363000
CVE-2024-37395,0,1,9b1b4238374b8a3a078af760cc5f8279324e38e6bdbc11e60f9342e52b652c2b,2025-06-11T15:15:28.567000
CVE-2024-37396,0,1,f604338138787f47fc5eafce537dc52b61f551d3945633e08dc1ff1b419d3eb0,2025-06-11T15:15:28.753000
CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000
CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000
CVE-2024-37399,0,0,91513a99b1995bb678a44db233b24968cd7625f00c77086c4c8d80914d8fefca,2024-08-15T17:31:49.067000
@ -264896,7 +264896,7 @@ CVE-2024-39316,0,0,45ccc4606c1ced74f32c315d82c11378f05d7721ddef5999e7262273275ce
CVE-2024-39317,0,0,a0fc4d71b5cabdaeb3b999c76cc981eac10eecf8294b24aaf6ecf119a554904f,2024-11-21T09:27:26.850000
CVE-2024-39318,0,0,6764e76c817e87d695ea3993b86a3354d209bb056859b5c07dcb19565385d010,2024-08-01T12:42:36.933000
CVE-2024-39319,0,0,6b3c8929f0aadf0dfeafabdb305420267b5eaf52a130cb6d182c3fd60933f087,2025-03-05T15:16:44.403000
CVE-2024-3932,0,0,e1e6e934d506d463f318dcd7b6195b8fede3f030a5382e5fa87592a6b9829b2f,2024-11-21T09:30:43.703000
CVE-2024-3932,0,1,bf553d895b692d20f52023342a9d74746f30bd6954940b547fda40e0807d0ed4,2025-06-11T14:15:29.120000
CVE-2024-39320,0,0,e4877e1d00ea378952f1c53c996ffb9e5141d5f98d9781e6944ef5bef1cdbd3c,2024-11-21T09:27:27.230000
CVE-2024-39321,0,0,801cf361a46239e192f4acfd721bba0cfca689a711cbfe4c715ecc082a7cb3ff,2024-11-21T09:27:27.390000
CVE-2024-39322,0,0,68c3b3a36d7457c8578c4e6cf1f0ffa507f2e1e008544080cce5882e03d76176,2024-11-21T09:27:27.537000
@ -266451,10 +266451,10 @@ CVE-2024-41482,0,0,0a596a5cf7b27067c86547cf8e385cb1be782f18b5f9b3af58ba9ccf7350b
CVE-2024-4149,0,0,ce35c5dabaf9e62f62b27cc2db90363703ad2249bc96cfb9d4c9aa830d3e1498,2025-03-26T15:15:52.433000
CVE-2024-41492,0,0,0f8b4f7028b46594d815901b3c46f498a5d62420cc14f100e4b212c233005a09,2025-04-07T17:27:14.087000
CVE-2024-4150,0,0,2e8c0a57bcb392581939b062355027d1d8486c47fcac2388b6838611dbf235a6,2024-11-21T09:42:17.333000
CVE-2024-41502,0,0,5029d7ae53258a3cbf50ec4c92c2614074d439128dd03a3ee865a2a5eaf5fd4d,2025-06-10T20:15:21.470000
CVE-2024-41503,0,0,3f2bf3e731d782e3e7ef0d8c1c0b40b826a768bdc0773a433e02bd2f6c25b5fb,2025-06-10T20:15:21.610000
CVE-2024-41504,0,0,37067d42d1b425849206a99c4fa3d1a775facce230487c29a50bf5bc10a01177,2025-06-10T20:15:21.733000
CVE-2024-41505,0,0,123247ab5738cc46457400910d8683f2f005356335856263f36c4cc9a0d308a4,2025-06-10T20:15:21.850000
CVE-2024-41502,0,1,035d055d0e91c1527d137373b8062b2150c5cd7aa2dc7be14e3cacd66fa5a35e,2025-06-11T14:15:29.773000
CVE-2024-41503,0,1,8da4af5d3a50d54b27269f49fa1056a51abe7cb78e69c01744b410880ee07958,2025-06-11T14:15:29.950000
CVE-2024-41504,0,1,cce64627de2833ddfd9a8fa00aa06bb5e2cfad2aa56ce998456ee0b655d2b2e4,2025-06-11T14:15:30.113000
CVE-2024-41505,0,1,38b74bf275a77be87813a8a3b3a4c994cb401dc3608de63a6be612a5f2abcf29,2025-06-11T14:15:30.277000
CVE-2024-4151,0,0,337c26dffc6a0b1164159cb60fac00060ef9443ae253113be62690b03c8c28be,2025-01-31T11:15:10.620000
CVE-2024-41511,0,0,6347d6e8bdca9e61881aa8b3e3ce915cd91cf5be437f01825e5d12236e6d66dd,2025-06-02T17:41:35.250000
CVE-2024-41512,0,0,6c48f03f5a62a673b28167efa2657e1883db56964e6cb4fe91d57cc6cf6d0d2b,2025-06-02T17:40:46.877000
@ -266485,16 +266485,16 @@ CVE-2024-41584,0,0,8ee9ae082d5209bf32a9612fbd142972ee3d4ff51fed2ea5dd87a62b3ae6a
CVE-2024-41585,0,0,f603abcc7adc50c0f0418039db97e6157e5d644c828ff6d6a43a1148e2cbdcd7,2025-04-10T13:41:39.553000
CVE-2024-41586,0,0,2ca5c96a0d26f43109380a195dfb7e58cb016f80ea656e1dca0934dfc33fbe62,2025-04-10T13:41:46.850000
CVE-2024-41587,0,0,49423dacd1b4227d5ab73e5f650b6e45277b0abc6417b9dfb6a350665edb1b90,2025-03-18T16:15:22.733000
CVE-2024-41588,0,1,43c1fa557b9ca13f5d6e637d1577733d0e70b7fd248ce3a14c85fc6e91bf133e,2025-06-11T13:54:06.133000
CVE-2024-41588,0,0,43c1fa557b9ca13f5d6e637d1577733d0e70b7fd248ce3a14c85fc6e91bf133e,2025-06-11T13:54:06.133000
CVE-2024-41589,0,0,e9c30a32e1d5bd5f4b6364fc650d57d72e5e61f9fa07da023f0932b49a18787a,2025-04-10T13:43:37.377000
CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000
CVE-2024-41590,0,1,4bd11c0a5a16ea227fdd8eebb5961a9e31a379af597a578b269e3cd5b756015e,2025-06-11T13:49:57.290000
CVE-2024-41590,0,0,4bd11c0a5a16ea227fdd8eebb5961a9e31a379af597a578b269e3cd5b756015e,2025-06-11T13:49:57.290000
CVE-2024-41591,0,0,fbe56be2c7d21e58694890c979fd5b2525d6606e74bcf44af4f4eb9ebfc7cb62,2025-03-14T16:15:34.730000
CVE-2024-41592,0,0,da34ad5373a3e4f26de17396b443b16c2b3db924958258ea30640b9d1bddd551,2025-06-03T13:52:04.560000
CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c063,2025-03-13T19:15:47.260000
CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000
CVE-2024-41595,0,0,55147bb2c7f980be0e8dfce69050f7ac0e8d3bd44beedc81b56dc3a9145dbb12,2025-04-10T14:37:24.073000
CVE-2024-41596,0,1,4c9a2c20ad07ecda2ee244a2fc0a6001029f77098a96d1bb2f0e364c0927f005,2025-06-11T13:40:06.773000
CVE-2024-41596,0,0,4c9a2c20ad07ecda2ee244a2fc0a6001029f77098a96d1bb2f0e364c0927f005,2025-06-11T13:40:06.773000
CVE-2024-41597,0,0,8bc3478a40fad9fe08a5b14f99fcfb65827e68ea30f05fc2a19957f05a35e7ba,2024-11-21T09:32:49.140000
CVE-2024-41599,0,0,19010d159a05e51c251b0e87e5efe7d7695f4c30ed161561b8ad7fb41917cdd4,2025-03-19T18:15:21.827000
CVE-2024-4160,0,0,77018d19c3c59babab69bb4c4bd714918ace7f45db9fbec548c4760db9a196a9,2025-03-21T19:16:41.813000
@ -266864,7 +266864,7 @@ CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447
CVE-2024-42006,0,0,757a5058e2b20a07332e18e1715746958f2fc29b54fe8104fb4e99ba507aa82a,2025-03-18T20:15:23.103000
CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000
CVE-2024-42008,0,0,de59590c5b8ea2dcb20a78d933da654dd773353d185cc7aa221b80b9d6c81d30,2025-03-13T16:15:21.240000
CVE-2024-42009,0,0,02c0fe508080971857c7db434c0f0da2e38c91601d9214f3de7a413be892a884,2025-06-10T01:00:02.087000
CVE-2024-42009,0,1,10993e2bf6b23d2ff0e1d3487dcfdf278ed8ac849a52251c7979ea0a9e3512c8,2025-06-11T15:46:19.810000
CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000
CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000
CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000
@ -269377,7 +269377,7 @@ CVE-2024-45190,0,0,0f9f782c7151454e0d4128d12af9212beba44978a9aed3b521bd26751a906
CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344cd0d,2024-09-10T19:35:09.727000
CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000
CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000
CVE-2024-45194,0,0,77254ca1b6587eb5e8e927e61ac00c230760a8a07d84f59977c03150f9f0d924,2024-11-21T18:15:07.483000
CVE-2024-45194,0,1,9783d58640443ee6c7d2887d64899b280a28c39c9bf615b886231c0519c40c7c,2025-06-11T15:40:45.710000
CVE-2024-45195,0,0,66d7d17610be0ce972b0de44bf228f2798ff0c35e717addb513b69a67e048bdf,2025-03-06T20:29:26.130000
CVE-2024-45198,0,0,134993cac349ebf82d298e5073984534c7242ddbcd9101d3655d2204b035998d,2025-04-07T14:18:34.453000
CVE-2024-45199,0,0,c6602917531b3a4a24fe09da269c6b74fc73422a338a1c1c0a7fd7dffcb01ea2,2025-04-07T14:18:34.453000
@ -273516,7 +273516,7 @@ CVE-2024-50560,0,0,e5560d8e099bbdb75ebe3a313d5a07fb60056609d630bea2b282b04cbeaa1
CVE-2024-50561,0,0,51d6a6886183d861209a55cd82d08c7368f7ca6eecb96cadd88bb86e0f75077f,2025-02-11T11:15:14.037000
CVE-2024-50562,0,0,042b4aeddf47a9bcff9798cf964b7b33e5086afb18b03d175d7830e3a694130b,2025-06-10T17:19:25.360000
CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000
CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000
CVE-2024-50564,0,1,0e1e7fec697ee256225ff7e16bee08bf2f06557383d2dd0ee126195057be5996,2025-06-11T14:55:09.987000
CVE-2024-50565,0,0,0052767052bb2f202b3f6a2bb66a26d0a376b1c95ba46901bccf288399e729ed,2025-04-08T18:13:53.347000
CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000
CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000
@ -273931,7 +273931,7 @@ CVE-2024-51382,0,0,b29a41a05c02a579a31b439784c85636e755f22c82dcce149f258b89de6db
CVE-2024-51392,0,0,c28913cf9578463f4763dccada8773c2d0b70c039999d2c8d3d568551fd804da,2025-05-30T16:31:03.107000
CVE-2024-51398,0,0,cea8f8f4881380dbaa2cfe732dffbd060c56c48b06b04f4d982be54dbdad46e4,2024-11-05T18:35:17.420000
CVE-2024-51399,0,0,7797cfea236d02f4c030090ec48621397eecdb65349aff9b28f04a876b406896,2024-11-05T18:35:18.260000
CVE-2024-51406,0,0,f0c5227154ac5602f5879eec080ba39cd868714523a47e46ddfa70a2bcc161e3,2024-11-04T19:35:17.410000
CVE-2024-51406,0,1,ff7f5bed93e0663e64325b72687508a30c88e876c1fbe113aa4481856c831ede,2025-06-11T14:15:56.927000
CVE-2024-51407,0,0,c0aa8974878c98334b1faedb8239e3516705bb72c5942bd1756bad8c0fbb4d24,2025-05-27T20:26:46.583000
CVE-2024-51408,0,0,7abace5757c3676b38c24efc3b646081438e7b877d38f1cc5dedc735e58c63f0,2024-11-06T22:06:43.100000
CVE-2024-51409,0,0,cd9d1809dedee806ed461a1ec4b55cc7a32280d7a8caa4ca197781f860925802,2025-04-11T15:04:42.957000
@ -278975,7 +278975,7 @@ CVE-2024-6331,0,0,772eddbeab74e601c91d9e66a54877a39bfee2ccfd2127fd1320d8b1de466d
CVE-2024-6332,0,0,71321842be6854901825e6d202d86e613e3a01b657ba056279e33400be9b7fba,2024-09-12T12:45:37.917000
CVE-2024-6333,0,0,7736e33d674f924b13c6c3992b2833d5607d1a4f69fe6597724045c2bfc36fb9,2024-11-21T09:49:27.033000
CVE-2024-6334,0,0,e7609a76396a51aa6736d9d83a9522b392f46b7ee8c3a77686e795c0dc0753bf,2025-05-21T19:11:47.023000
CVE-2024-6335,0,0,71e0ae9edb81dd50cf0694793267e523cec364805fcca0ea49bab4f2c0f60013,2025-05-20T20:15:37.317000
CVE-2024-6335,0,1,d7ccbd0672458e87e9e90c63226f6f73ed1cd4bce0d6c75e2ec3a5ee89c477ba,2025-06-11T15:46:57.620000
CVE-2024-6336,0,0,26517f2e20d4fb8ecd3c1f8bc7496625a0971605d0451d59c8cc6ca534ab9907,2024-11-21T09:49:27.270000
CVE-2024-6337,0,0,272172a7579d97389777f5f196faaa6e46e696b9238bb3d61e675c02f4ed1da5,2024-09-27T17:48:00.977000
CVE-2024-6338,0,0,66a83af084575500ee819176a1b51e0408d0568ef8a208443ffad480bc0c423b,2024-11-21T09:49:27.480000
@ -279096,7 +279096,7 @@ CVE-2024-6458,0,0,b11ced7b48e4999cb2402c171f587f9305fd15589abc8a139c63445b66e9d6
CVE-2024-6459,0,0,02da8f469a7fce55d4b5322dd98716cc4dad8ed243a9ca848d0651f501b6d543,2025-05-27T17:48:22.140000
CVE-2024-6460,0,0,4a5b5776701d673ed02efe26edfd5560edf8cba65f5cfdd74c96f161b28fb3a6,2025-05-27T18:04:55.703000
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
CVE-2024-6462,0,0,7eb67d80f606d7cc126245724a0550a023d01fea849142b7dc667cdb8eb5da9a,2025-05-20T20:15:37.467000
CVE-2024-6462,0,1,bca90aee5abe34e7cf1e13c1c4ec816335a558f87a928abc5700f53135bdfe7a,2025-06-11T15:43:50.453000
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
CVE-2024-6465,0,0,68d8747a1edb551a38d59b6ec4dd4815476646c814dc40035dcb46acd92026f8,2024-11-21T09:49:42.103000
@ -279110,7 +279110,7 @@ CVE-2024-6472,0,0,e26f0ed33b9352737fba2c7a5901be2204823366dc7f964b880fceddc7f136
CVE-2024-6473,0,0,1dafd6b50b11af3a55a60927aceae7fdee5db46502c399f03ce389e747a46480,2024-09-05T14:19:45.153000
CVE-2024-6476,0,0,a0cbdf8db7abbf40af298419f002b432eaa0907f370a1f5866689f4a683a61f6,2024-11-26T07:15:05.697000
CVE-2024-6477,0,0,f8f6847d32a610415a7c2ca805a1a46e2c4ada6ffccb0f2d3fc8c2c8f1cf2f4b,2025-06-06T16:12:25.440000
CVE-2024-6478,0,0,d355f87d3d08b7198675f904b84d8494a8a121b6cd2dde7851c549ddd2d28d25,2025-05-20T20:15:37.603000
CVE-2024-6478,0,1,d5c89c514729f7d3a87caf1cfa92ac2829fe96ec3b0309bbbe410913dac39ffd,2025-06-11T15:41:54.610000
CVE-2024-6479,0,0,e61c30f16f0abfc9f93099b9bc147874bff7bedf1b6bcc46dd42e617eef67181,2024-11-01T12:57:03.417000
CVE-2024-6480,0,0,4266a2448f7419be28cb4214e61c8f9e0c911904bbcd8a264d7b98190c25fc16,2024-11-01T12:57:03.417000
CVE-2024-6481,0,0,f62914d193bbade2d691f703d4d0b1ff9521548f9a943b29212b08069c7f73c7,2025-05-28T19:35:54.520000
@ -279118,7 +279118,7 @@ CVE-2024-6482,0,0,4d53ead5e6325e4c3d18efe067c9e334be2a3f79da1bea9751adecc767a7d1
CVE-2024-6483,0,0,1c0fe2a973a2c4a1c74a0f15ec1936460845aedf2e4fbff62d44c77b139ab2a5,2025-03-20T10:15:32.863000
CVE-2024-6484,0,0,2321b3e4cac43e4cb38252b77fbd5ab74d6875fab07b3d2a29d1bb66c757d2cc,2025-02-07T20:22:49.117000
CVE-2024-6485,0,0,5de38639f840b10385a78b6c25abdb8a0ace1dba6d9d706af40210e5d356fe95,2024-11-21T09:49:43.863000
CVE-2024-6486,0,0,77b36134bae3fedd62d4eaf5dbb50da10a2950728aa18338706c3b9cc71a3906,2025-05-20T20:15:37.750000
CVE-2024-6486,0,1,e3e8287edf58aebbb325462088534af79c8c5b34fb9e80e3b3c36ce91d99ed46,2025-06-11T15:40:01.067000
CVE-2024-6487,0,0,a2c8cd4457ed5bbd74124022b13e31b4932a2b8cb2e05c9f365ffeaf9708b2d7,2025-05-30T16:55:49.913000
CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000
CVE-2024-6489,0,0,231e9813e515f1abdef06bf7e87ae67da0b47c391d532eef0539e6f69c239697,2025-02-04T18:04:39.737000
@ -279308,7 +279308,7 @@ CVE-2024-6685,0,0,acc7767f83fdbfe4c0fb5ba835f368c963250f5aaf7c65cf81f0787fc28c42
CVE-2024-6687,0,0,87c94841e1b3441b473f4dee1081640b0718b68a0f4720cc6a84faf16a103b21,2024-11-23T00:50:45.110000
CVE-2024-6688,0,0,138f7669c50b5717eb30bf085e4de138dfdabfc0c6e798fc83a2112dc36bbf73,2024-08-27T13:01:37.913000
CVE-2024-6689,0,0,d3f1c978802e38e7ab22e4ab168036a480da837e523ef6438c9b42604f0fc4b9,2024-11-21T09:50:08.143000
CVE-2024-6690,0,0,99a94a6785ee88e3de908cb60f4e053ceeceb40866229f09850c0bd71f17c263,2025-05-20T20:15:38.047000
CVE-2024-6690,0,1,f415c11b87cd6811eab628cbbad4b655985ce33419cef0be8be9cfc0d567c653,2025-06-11T14:59:33.023000
CVE-2024-6691,0,0,f4b0c8ba9d849a887a840b11a7ced71b334b6811834c4c0436e7f424db226869,2025-02-07T17:06:37.413000
CVE-2024-6692,0,0,b93ab5a4c1a77950586e4d26ff9d5ac1dc50208142450c48467964da3007a929,2025-02-07T17:07:33.633000
CVE-2024-6693,0,0,28eab152ce9e10a577535de17ed173510cba4df1dc884c3da07cb2ac8e6a6517,2025-05-20T20:15:38.207000
@ -281984,7 +281984,7 @@ CVE-2024-9522,0,0,81a7015961146d67081255db9702f745971d5b01a572ccb06cd379a82785f7
CVE-2024-9524,0,0,c0e0025075860eb301ff4ff643bd32cf5eb6831d27ec91d35b567d38c9af7c09,2025-05-12T17:32:32.760000
CVE-2024-9526,0,0,acc606f8e9195e546a271d256c6ec9cc804f4a841580ecb828b473fe7b0b33c3,2024-11-18T17:11:17.393000
CVE-2024-9528,0,0,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000
CVE-2024-9529,0,1,e0835773ff2868f746ad772bca71cef0b4d7976759453aa0ec2fad83ec18fe03,2025-06-11T13:58:02.947000
CVE-2024-9529,0,0,e0835773ff2868f746ad772bca71cef0b4d7976759453aa0ec2fad83ec18fe03,2025-06-11T13:58:02.947000
CVE-2024-9530,0,0,d9770d6d9d81aca35282dd37cad0ec897a8e52cf92a99657df0b6283cc63f82d,2024-10-25T18:52:10.810000
CVE-2024-9531,0,0,bd5dea9af3b5acebc7a9498df783f0aa08a3c09d57316df4d5faf9fd73c9b899,2025-06-05T16:56:56.240000
CVE-2024-9532,0,0,ee74e81fcd3228028851cbf05d2cfbe5eea8f3421ccb07415d383b1bab6b2af5,2024-10-09T11:18:49.027000
@ -282518,6 +282518,7 @@ CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2
CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000
CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000
CVE-2025-0162,0,0,bfc97d5f6ed4ab16ebe8a6375b0a746ab06e7cd3ea0b56d09c090c3478f06f58,2025-03-13T02:22:58.683000
CVE-2025-0163,1,1,85d2f9d0c7d45f5de5d0462db5f35ca226d1d9eb0bf5279e96141b3f41725fc9,2025-06-11T15:15:29.177000
CVE-2025-0167,0,0,ed36d641b1afaa7c32911291bfc917507cd4d73e70e05d582a250550abe355b0,2025-03-07T01:15:12.110000
CVE-2025-0168,0,0,a3bb306c5c1038cf3ae7cdc9fefc0119ef962391dad7848c675894c708a175c1,2025-02-25T21:26:07.113000
CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000
@ -286220,8 +286221,8 @@ CVE-2025-22984,0,0,18fe379899d6b594231ed65cfa5066d6988b73d940081f95379b94407f66b
CVE-2025-2299,0,0,e5251f8f8b5480e3d6b1edda7846f7e604c0e4f1539fa12e57972bd741386bf2,2025-05-15T19:54:41.610000
CVE-2025-22992,0,0,9c2224e338558ccc5fdf942d723bafbe861c5e19d73a3269c58858cc57989795,2025-02-06T21:15:23.317000
CVE-2025-22994,0,0,d9527179d5c850c6866754d31e77f1c2fd06d9e1a13bd3d3f0bd861c8c0f83ff,2025-03-19T15:15:53.990000
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
CVE-2025-22996,0,1,4e06fe7c28c86750661bce485b34b36a54b344f7aacd75b38774e4741d9661fa,2025-06-11T15:38:44.620000
CVE-2025-22997,0,1,4e109c31d40a3d1d29cc0bcfb1e52b19c2b7198f22da9a6cbc1072f86f1f6a98,2025-06-11T15:35:40.463000
CVE-2025-2300,0,0,c13f99b53ddc4e83bf9bce2feb564c630777b7016e2470e35d22e31f3440ca55,2025-04-23T14:08:13.383000
CVE-2025-23001,0,0,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000
CVE-2025-23006,0,0,7a5bf6bad719976a640fb90f39e240f5ae9344d4363a556047b151d1633075a7,2025-04-02T20:32:48.097000
@ -288138,7 +288139,7 @@ CVE-2025-2519,0,0,53e1da806e7009c99eda2ae100302d54ee976e1f2e910b31b9e64f58222ac8
CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000
CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000
CVE-2025-25192,0,0,7a6038d36a5b17930d67880843054b23e0b2ef4833586c77fe6880c7c0ea5e18,2025-04-23T18:46:00.540000
CVE-2025-25193,0,0,88436b550c54718a716525af3a09ec30c4fcff693af51cc8d334b1b5bb6550de,2025-03-26T13:14:32.087000
CVE-2025-25193,0,1,961c67f86d66ace3d4b80d79cd8b2d770203dc068405393f7990a5600d26feb2,2025-06-11T15:36:22.693000
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000
CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000
@ -288682,7 +288683,7 @@ CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048
CVE-2025-2641,0,0,0c4e7f6e917c2684e1ef81919020337c8afbfd73d5a46107cea6f98fc25ffc5c,2025-04-02T14:32:40.757000
CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000
CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000
CVE-2025-26412,0,0,e439f02063f036d3657a0bf05afa8e0aae7f2989029f4b795f42ec34bbfc4505,2025-06-11T09:15:22.067000
CVE-2025-26412,0,1,d24092353fa68246014d74a20edcdc2b37b6e0cd740ffb34337ce84b79e0b577,2025-06-11T14:15:30.987000
CVE-2025-26413,0,0,2158c3399ea37dae246e6333a0208fa039262ef589c11e6030057cf377da68cd,2025-05-12T16:15:23.023000
CVE-2025-2642,0,0,9fd74d08c30eb46678d329dd538a5586185726ca4d8ec1276ca17b4f6bd06bab,2025-04-02T13:48:31.510000
CVE-2025-2643,0,0,f96a1e9165c8c6b99a098f4d86d5cf57a75b6fe768e009b644ffd8b873a80653,2025-04-02T13:42:29.387000
@ -288721,7 +288722,7 @@ CVE-2025-26512,0,0,27e124c5aa10b0f0b92c8ca055b8cbe842cdfbec5e8c61f840784c35c80d5
CVE-2025-26519,0,0,189b0c6946f901ee4eed556955000825a3005cbd4fd73b84bf5b1493f77b4b5d,2025-02-14T17:15:23.090000
CVE-2025-2652,0,0,ae6e16616be52d3538ce00377479a8c5ef0414a0c53d8e7631810155f48f2da5,2025-03-26T15:16:11.270000
CVE-2025-26520,0,0,292c9caba6f38831a4be980034f0f7cdde695fdbb1f85a1136d15679c0c9d4ba,2025-03-03T14:52:47.173000
CVE-2025-26521,0,0,cdc81ec5afb63914ad407c304994a2b4e474bebe302d8fe6d668dcbca4d44fc5,2025-06-10T23:15:23.840000
CVE-2025-26521,0,1,c064c96336798f8f9725a52058709587b311086ff1698335df3c838db2580ed4,2025-06-11T14:15:31.137000
CVE-2025-26522,0,0,15654b8dc281e5e95b6cb8d0b0449d89135cfca68e40163629b408b401b71985,2025-02-14T12:15:29.583000
CVE-2025-26523,0,0,9eb8004a3f0db5f271f82a4160bc199ec38e8d40fc177becbe2105cc644170be,2025-02-14T12:15:29.723000
CVE-2025-26524,0,0,e4675579756d8bf50fc8a11fc92dcb6c0f4393fb284e95c0369d48074177af48,2025-02-14T12:15:29.887000
@ -290016,7 +290017,7 @@ CVE-2025-2880,0,0,e389725818c992645d02e6070b5c39fb3800bf8237a4c9078a3291c23ae543
CVE-2025-2881,0,0,fdb559a0489fd102237eb30f41f019d2f5c2b3faa82f877e9abc8e7c02b82b2c,2025-04-15T18:39:43.697000
CVE-2025-2882,0,0,c97b3f3ea8d4bf1b525408e9c0aeb5839e6b1dab2a43ddecf7ef1915f34a41ad,2025-04-08T18:13:53.347000
CVE-2025-2883,0,0,de11120bf19ac8735b713769da981d898702017cd1ccc7eb0f5a880098b288b6,2025-04-08T18:13:53.347000
CVE-2025-2884,0,0,5e072d72f816ed35616d5f52cc6f7b9f5b38ba09182083cab62d4e2073153ed3,2025-06-10T19:15:28.847000
CVE-2025-2884,0,1,c3ae40f192f5d373357063a0eee213aee0cdedc73f50a138bcdb33c2a0b09678,2025-06-11T15:15:29.487000
CVE-2025-2885,0,0,d7e6b0bcc2bde4b9a153bfaf9504a6fe34cca823b62dab5c29aeb4ff68d351e8,2025-03-28T18:11:40.180000
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
CVE-2025-28856,0,0,49facbda8e3a831c26c726b61bef1fcd0c7982f3fa2f79e25ef260adf4085d93,2025-04-09T14:05:44.960000
@ -292818,6 +292819,7 @@ CVE-2025-32706,0,0,db50af2cfe521d05a7c486c059aaaae863796e45bb101d6939f7e49800872
CVE-2025-32707,0,0,0470f05f4fed72a6e68669a459995637394b48e5dcea8b21ff00bd0a5a2faa24,2025-05-19T18:25:06.003000
CVE-2025-32709,0,0,cca61055dac0e837033032ad28a6f880a090dfc86e492b563e0bcb7f31d81d17,2025-05-16T16:29:34.783000
CVE-2025-32710,0,0,8aa4d60921f6dde1a890bc70c8e33d99b94c5d41ddcdcf72b3be6ab66adba5da,2025-06-10T17:21:45.853000
CVE-2025-32711,1,1,7d3eeefcad19449b59513a507f4884917f1c6f6422cbafbb2beb41b279b3bea5,2025-06-11T14:15:31.530000
CVE-2025-32712,0,0,c5735fcc1bb8d2d8b8ff88cf2cf7bc8cd02910bed85fb27b9d8fa93cc565de62,2025-06-10T17:21:47.883000
CVE-2025-32713,0,0,1f55ff03a98c6f4a137fcd8cd370b450b5268acfb42631808df84938f4956e57,2025-06-10T17:21:49.897000
CVE-2025-32714,0,0,a92f17a0e588c2a134397f8038fc20f2e3a2d4fa89569159b3cacc267d8a2399,2025-06-10T17:21:51.843000
@ -293053,7 +293055,7 @@ CVE-2025-3300,0,0,71838a45e38cfd4f9033706465f5d20314584bcf58aabb1bb7ca5cab40d521
CVE-2025-33004,0,0,0dbcf8f4552332912f870f20d881c87d766919198baf5864e35f56c668cfa064,2025-06-09T18:08:21.600000
CVE-2025-33005,0,0,cc36f120cbed36c030ac1a468cb0a7afdae6956296ad02b259f7e3a82ab309a5,2025-06-09T18:07:39.407000
CVE-2025-3301,0,0,b2cbbbf942710dc17dd30bf45e19011afe7becbc724cdeebd3bb45dd2691a5aa,2025-05-02T13:53:49.480000
CVE-2025-3302,1,1,38fc44d8b6ab8b7fd1331287581e06949fb4e0b7f6684587b3a21ec43e33b278,2025-06-11T12:15:25.377000
CVE-2025-3302,0,0,38fc44d8b6ab8b7fd1331287581e06949fb4e0b7f6684587b3a21ec43e33b278,2025-06-11T12:15:25.377000
CVE-2025-33024,0,0,a929691d5533595a80202115459e86f84fc81996ba9c41d2a68880f3e6fcf59f,2025-05-13T19:35:18.080000
CVE-2025-33025,0,0,4b295e88dd02f429bce7f4aed7e0b1b7ea585aae960bbc6de9d4364036c40d6c,2025-05-13T19:35:18.080000
CVE-2025-33026,0,0,16823ea87e15ed5dd06862f606f290dd47fd68e96dd8b001f96144de8d0bef0f,2025-04-22T17:37:37.900000
@ -293067,7 +293069,7 @@ CVE-2025-33043,0,0,044f6c7834f7eed1d82fb6b8377e155f5c1ae51cb36f952b6bba03be184e2
CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000
CVE-2025-33050,0,0,05e6d757b225696d2814d59d4f1c971c8d0e7d5b6ad7a1f98f3325b5ab9caf61,2025-06-10T17:22:12.643000
CVE-2025-33052,0,0,b1993549d564c5c9981bc4b05cb64d0a2d456f60ff295f87620c17f2cd44433b,2025-06-10T17:22:16.713000
CVE-2025-33053,0,0,a38de63924e4c14d9d85c34c156b3cdea7a876863613a95aa4b4306ad100eec2,2025-06-11T01:00:01.443000
CVE-2025-33053,0,1,7c0fb55424eeeb8186ec8527c37004cb04dcd8c08591616fb06c74862faf1323,2025-06-11T14:11:11.517000
CVE-2025-33055,0,0,13d9e39692b08b1b320db5a5ecccbe43815806407f2b3cc535308d642cb2e613,2025-06-10T17:22:21.100000
CVE-2025-33056,0,0,c67dfbe06f555af10b25758d9a6160cb2f910935ced8e27cd9da40fc740b6166,2025-06-10T17:22:23.163000
CVE-2025-33057,0,0,205438b56590147889b44322c2f014a7f7d594c5c377234a2f1d03b95a58afc8,2025-06-10T17:22:25.360000
@ -293248,6 +293250,7 @@ CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc1390
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
CVE-2025-3471,0,0,7540bf9b66a7c3d2886148e18ad0354d6f76696c333def82e90f9e267caa6c25,2025-05-09T13:48:03.503000
CVE-2025-3472,0,0,8edf39375c9ab0caa46bc4f64a877600d35e92d464dc8269fd628758acc904e2,2025-04-30T14:01:15.660000
CVE-2025-3473,1,1,c764c4e2a3da0055a44b6998e909894226d269d0be1d00bdf90db31787cee713,2025-06-11T15:15:29.827000
CVE-2025-3474,0,0,f3d4b355c6b48145dca2a43881241ecb1e655d9dbdb96be4731ac7b40121a4fa,2025-05-01T14:38:00.023000
CVE-2025-3475,0,0,cacee959c6fec9a049e3301810eab743cc7a027bdc5a60847b12828010037e16,2025-06-02T17:23:36.020000
CVE-2025-3476,0,0,e9ff7dadd87cc1b5d38c6f4b90861333cdc35e0f0e9f56330696f9a142f8fe8c,2025-05-08T14:39:09.683000
@ -293361,7 +293364,8 @@ CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e6
CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000
CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000
CVE-2025-35939,0,0,6a840d2678de0b0635b0f573a4e0aa98890f3ce611bcae157f676530014eaaf6,2025-06-03T20:59:34.117000
CVE-2025-35940,0,0,99035063dad9daa4cf8431584bdae2d17fb96f782e0199a539be51e489d8b53f,2025-06-10T21:15:22.210000
CVE-2025-35940,0,1,3ee52df4bacbf4fdc5e57802853fb2f251a95cb49b544ab41a6d0298e2dea5bc,2025-06-11T14:15:33.690000
CVE-2025-35941,1,1,eaaa668a7246915ba01e31891a0eeb989a936dd53db85c8a3ce111baf2a98c87,2025-06-11T14:15:33.797000
CVE-2025-35965,0,0,4aa642d84377cde687111c4598cf1eaeacbb56cf1c939bfc9602ea66c09fbf1f,2025-04-29T13:52:47.470000
CVE-2025-3597,0,0,d7f16eae83f55d018cc2fc04d9f80eccf613371d509c7f99733ac01645d2c6f1,2025-06-05T14:27:53.477000
CVE-2025-35975,0,0,ff6f53919e1d0edd41e3d119f9454f71c4e7dd5f4908d853817e3fb24cd36fe2,2025-05-02T13:52:51.693000
@ -293890,7 +293894,7 @@ CVE-2025-3872,0,0,26604960001ce7e7efc01090e0c7f3ace8c54075c9f64bec667f2f9d611a1c
CVE-2025-3874,0,0,48404b5920dfb8e9d0e9a6f6c853dfae3dfd8be20985f098e8a46e30a37014f9,2025-05-06T15:39:29.083000
CVE-2025-3875,0,0,1b7ebae355c4f48c8dddf4fcdd6fc15c745cdda51dd1f8022d95692c7a83a312,2025-06-05T14:27:05.837000
CVE-2025-3876,0,0,98fa4965cd0fb5896f08763a0582c93ea252014e67d6fd79d41bdf5071b00a40,2025-05-21T13:35:09.450000
CVE-2025-3877,0,1,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000
CVE-2025-3877,0,0,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000
CVE-2025-3878,0,0,6edc0413060b870ca8db342e4d416bc7330af04d97c4384be96b3d4817bff1e1,2025-05-21T13:36:16.070000
CVE-2025-3879,0,0,d832e10f3f5a35fa6f778cb83701763ba1ca0a6464dece4429751c1aa0bef5fb,2025-05-05T20:54:19.760000
CVE-2025-3881,0,0,24b54933e846a45dd97d5a9a438a485d3ead998ef41689a70b444bb5ab176e29,2025-05-23T15:55:02.040000
@ -294401,6 +294405,7 @@ CVE-2025-40908,0,0,91c9c68cf03ca27da56ba2aec4b379519e7063cfa4c8bc0832dfb5079fdf6
CVE-2025-40909,0,0,0168f158a69247acbaffa8dbdbed8b439b77a336030b06418e5511e5db476ff8,2025-06-03T04:15:40.470000
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000
CVE-2025-40914,1,1,af01d276c0ae500ffb244e9fb8d7f00960a88649527b7ab4383e0ba94e831d0f,2025-06-11T15:15:29.990000
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000
CVE-2025-4094,0,0,9389e1771cac6e6188e563be99dd04161be542f25f3d0fbc50799f1a765f05af,2025-06-09T20:13:20.070000
@ -294772,8 +294777,8 @@ CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8f
CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000
CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000
CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000
CVE-2025-43697,0,0,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000
CVE-2025-43698,0,0,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000
CVE-2025-43697,0,1,8ed523a26e112c862f96538810a2a4c570c2053b73cdea8198463e4b54adcc35,2025-06-11T14:15:34.253000
CVE-2025-43698,0,1,cf4777478ec0ce5399bd6b1048836b4f4ebfdaf4a45b2e635662f00a4bb98bbb,2025-06-11T14:15:34.417000
CVE-2025-43699,0,0,a2d22ee4b8d68eb026c86782bf500857da584950b48fd4e2d9625d502c59ab55,2025-06-10T16:15:40.353000
CVE-2025-43700,0,0,f91ad89a18eacfda649ab209d4f29d9dde450c39d5a449eccc3a29c15f6e5dbd,2025-06-10T16:15:40.513000
CVE-2025-43701,0,0,75a984ac714c135ecbf90c66a4c841f2f5525dff3c0315e5d515084f3c5ab270,2025-06-10T16:15:40.667000
@ -295223,6 +295228,7 @@ CVE-2025-46011,0,0,c1776a78cb3800147b82714f56c78717ef81a5a9688b212486314b1695383
CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000
CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000
CVE-2025-46041,0,0,dc7ed8d00840600a9f5f28d0044f0bcf7424f5e106bcbf4fb8ec3d746dd238fd,2025-06-09T20:15:24.113000
CVE-2025-4605,1,1,1115f0d5652d8285f8fb5c7fefef07cf745e94cf97ee2c4d9fe05f25574b329e,2025-06-11T14:15:36.847000
CVE-2025-46052,0,0,ab7d3250787ede688cd6b355d8aec0cc3dda171eb18d9b03fdd032c02ce8c40d,2025-05-16T14:43:26.160000
CVE-2025-46053,0,0,a812a9fd2122f294cfbb7de5fd43b870987b1f7127ab686b037255809ebad4e4,2025-05-19T19:15:51.580000
CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000
@ -296258,7 +296264,7 @@ CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d34
CVE-2025-47710,0,0,efb080a2ca87d31fc53e84646807eb619dd8ffb84063c97064b1c37508c6b60a,2025-06-10T15:24:50.570000
CVE-2025-47711,0,0,84134213c5152e1def5667fee36ba3a5b2be995d24d7708c58e002afb898ec35,2025-06-09T12:15:47.880000
CVE-2025-47712,0,0,36ab066e163c4ffc449059531315de23291a62b1378074f34cd0681da81a794c,2025-06-09T12:15:47.880000
CVE-2025-47713,0,0,73cdc94bb93d27aed7526d48c29082a31e3da6594c1320cec78e4716519d2504,2025-06-10T23:15:58.320000
CVE-2025-47713,0,1,e7b1e676acaff8c3a5093a4ba694f663f5a44fc63c9472c508efc502d61c3fe6,2025-06-11T14:15:35.560000
CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000
CVE-2025-47724,0,0,c392ae279a9c6e1324e9d9c71628ad9f2bd31920b4d617428838fa9f83dc2fa5,2025-06-04T14:54:33.783000
CVE-2025-47725,0,0,889f3515c44952cf57a8d17f0356726e20588e99515827ba927156d41cc6af64,2025-06-04T14:54:33.783000
@ -296329,7 +296335,7 @@ CVE-2025-4782,0,0,7ad1545eb9e016317ccf1371b442ca29cb62e72aa504ad708f7f2767909134
CVE-2025-47827,0,0,e8e7d1db0126d69a3b1ce4ce3cd4a43b2b63ba3f83e4b78ec9433a4d6806ed2f,2025-06-10T15:15:25.270000
CVE-2025-47828,0,0,164436fe84b8d833a71f3fa8e7f3f39b64e2df889f4579512ca4cd1f99b4e769,2025-05-12T17:32:32.760000
CVE-2025-4783,0,0,bd5695c741cd6c06c07a958617e5fade1eea7d7c38bb9f2f382e0e33491cd176,2025-05-28T15:01:30.720000
CVE-2025-47849,0,0,d80fcc52b5328cf7208f1ac68e6e8877930ba70982938ef3174ab9db8146f45b,2025-06-10T23:15:58.453000
CVE-2025-47849,0,1,c2e2bbdcf05b9d5fb97ebf1ca233103fed6d72696ade8e5ed7911ea284c9c625,2025-06-11T14:15:35.727000
CVE-2025-4785,0,0,11af03bace6c1c04331c5dddb8e99f128f61109ba1a035e35492e3dbcae57560,2025-05-21T21:00:19.110000
CVE-2025-47850,0,0,6ffc73421957f99914a384dd377153330e8c59407b63d74450ed145d56da1d54,2025-05-21T20:24:58.133000
CVE-2025-47851,0,0,bae42746a3d0b7b8a748ca2f4220c01f83bf85343adefcd6c74910e655b0981c,2025-05-28T21:13:48.670000
@ -296410,6 +296416,7 @@ CVE-2025-4801,0,0,fc6ec83b7f99dbba6d1228da70489464cc23b7a30d8f01ad6791644a180c45
CVE-2025-48010,0,0,4819d2e93ad3442257f70fb7864093e1a4200a7b0a7fba4a346e3f36d3da9e5b,2025-06-10T14:13:51.267000
CVE-2025-48011,0,0,258b9fec7bb0d96eb7155a40013213737fe713d9c9fbe682bbd078d999f91910,2025-06-10T14:28:15.027000
CVE-2025-48012,0,0,71d63bd70525687602bc234fe1b79ef8d4a14328f61a484c736f611a8ad14409,2025-06-10T14:28:52.893000
CVE-2025-48013,1,1,56d76151678247bbd4f469dc2159584042c5f83cf64cccf07e84ead3e86e31c9,2025-06-11T15:15:41.830000
CVE-2025-48014,0,0,b9d2079ba78dd708b6501c98bcfc8c530a41a6a42eec8a9e644487633db1d02d,2025-05-21T20:24:58.133000
CVE-2025-48015,0,0,97195b1375e738b78c3c892de114d387c5901e8ee163a174bd7cc7d86bb801d6,2025-05-21T20:24:58.133000
CVE-2025-48016,0,0,7f338d05ff0bf5457b003e53823b639de05c7abe792c9baaaefb3f53dc116634,2025-05-21T20:24:58.133000
@ -296629,6 +296636,11 @@ CVE-2025-48427,0,0,7b7d0b24d905cbea3b50146b37b4cf62666de442b9ee6475e1cabe343e0aa
CVE-2025-4843,0,0,5890e4c47a5552e18a9be038fa9194d6f64cc12e48ceed25f7f3e1b0ba45bf6f,2025-06-04T20:11:36.947000
CVE-2025-48432,0,0,5f6d8752b6215d1c6c6ed176249453d7202995237846ebecf3edfe940755446e,2025-06-10T18:15:32.790000
CVE-2025-4844,0,0,c912eb5a20c5346c9f6d6c3e57f91f3a367b50a9f461c9f08439baff48bc8fef,2025-06-04T20:11:19.110000
CVE-2025-48444,1,1,ef2eb1da23c8d96d03a87fcd8d328e862d9485eaa988c50fbdcf0d7e572a2f9f,2025-06-11T15:15:42.143000
CVE-2025-48445,1,1,53213dbf4f875bf1e256a194dc0f1d5b36be13a3e9f8270c446dbb581459c668,2025-06-11T15:15:42.270000
CVE-2025-48446,1,1,59cb264358d5d9d97b6953edc8c8a093ad2ae3aff698cf08e72258ef6b7f9799,2025-06-11T15:15:42.427000
CVE-2025-48447,1,1,e6c4213a4256e6dc39a71496ec19a54a54152079678fbbc0b2a482be1f11f7c7,2025-06-11T15:15:42.607000
CVE-2025-48448,1,1,7429abe0813bb5e0c4a4b49796f402fde9ff88d156185bb09a100e46774a8c38,2025-06-11T15:15:42.733000
CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000
CVE-2025-4846,0,0,4dd97835f28bce0c2a0646c496f88035dc9f48717c734fc8fd3222164cab7575,2025-05-19T13:35:20.460000
CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000
@ -296872,6 +296884,8 @@ CVE-2025-49140,0,0,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c
CVE-2025-49141,0,0,c27a5db8847ba6463beeffc0f33ecced17eb646ef426e9c77fae0b5a96f645b7,2025-06-10T16:15:42.193000
CVE-2025-49142,0,0,b6552c867dcdae934f4510e82e6caaa381511e720ec6623ff0ffb45ff0c083a8,2025-06-10T16:15:42.293000
CVE-2025-49143,0,0,9d062967241f50913064a334ed49b074edc4a399d0d32df3945192529f45fc06,2025-06-10T16:15:42.450000
CVE-2025-49146,1,1,bf8fcfd2e71318c98e6d0d098b9753fdbed7a70096e9376cc478a1e6bc1dfb24,2025-06-11T15:15:42.850000
CVE-2025-49148,1,1,631b0aa9580b38e2d95b5ddbe35fc4e80e64a71b9fb1b7e7f39651aee675f4f5,2025-06-11T15:15:43.043000
CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000
CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000
CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa7c1,2025-06-04T14:54:33.783000
@ -296891,6 +296905,7 @@ CVE-2025-49208,0,0,a8e96108da8f9e7efa92e227e5541e40bf6024b1bdd55d38cbd0bffbcfb12
CVE-2025-49209,0,0,293d4b58934d7545b7379d142ec4ec0556406a7f545f40e2a06e2176fbaac700,2025-06-04T03:15:27.057000
CVE-2025-4921,0,0,6764dccda373512b657fe3c8300f9213acc595572fe2b42c347ebcd82da48e2d,2025-05-18T20:15:19.273000
CVE-2025-49210,0,0,0d98b9f5865953f1015e0875c4ef02572a5474d0f348f574d55b17a2fdab9325,2025-06-04T03:15:27.127000
CVE-2025-4922,1,1,240820cc7731a21e664c34b2ce9fbe4123442bc1d58c6804b9dce72455a31633,2025-06-11T14:15:37.140000
CVE-2025-49223,0,0,648cfa7c40c96de295e183f0ea98c44bf314195a3ae5c64b8746fcff08134939,2025-06-06T19:30:16.060000
CVE-2025-4923,0,0,9beba7071c51eba6c1d71d0a324059e1f5260406f92dc4aea21591df042815db,2025-05-28T12:50:28.590000
CVE-2025-49235,0,0,8c9fd6d5e7a7c75e9718e9d71425868ac554e5b2c4e799bbc755c0b8dcf21e57,2025-06-06T14:06:58.193000
@ -296934,7 +296949,7 @@ CVE-2025-49286,0,0,0c3f98e47f6b48b3e0e84b2c0a66a43c574c16be1a5a57ed596d579641877
CVE-2025-49287,0,0,d582e9741824478fed543ad16f5e4fde0ce4d63284bc6d280c033891572377ac,2025-06-06T14:06:58.193000
CVE-2025-49288,0,0,97ac98290dbbce6e9c1cc88246bf869a83494ce71b21b087c18bc155d2acfd94,2025-06-06T14:06:58.193000
CVE-2025-49289,0,0,fd792354de84cf9d0669b41ca31d9bfae3bbf12279fe8d7bb8414b6b637fbb13,2025-06-06T14:06:58.193000
CVE-2025-4929,0,0,9aa7f26cd205a99fea5ff2d7bff4801aceb991149094badf93f19647e42edf94,2025-05-21T17:42:52.510000
CVE-2025-4929,0,1,a8e593e93f40512d4e00d2cf8b1f6bcbb5d53e9a2cd29f3fc687456ae4295712,2025-06-11T14:54:00.567000
CVE-2025-49291,0,0,8134d1964dff1f1760992dbc201fbfd8d79201074def3a1c1fac78050d47f0c4,2025-06-06T14:06:58.193000
CVE-2025-49292,0,0,0ca180db220c352852a434aec97e01e62813479b97501ec49f80b986aca4a599,2025-06-06T14:06:58.193000
CVE-2025-49293,0,0,945e3d8bbfdfc4a328a4438a25692fd2557e65fe18072af826e236c0461cd9e5,2025-06-06T14:06:58.193000
@ -297011,20 +297026,20 @@ CVE-2025-49509,0,0,1518f93f1ee224f1f100bcee71d6ba948043b73035e7eb346a997192f9c2e
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
CVE-2025-49510,0,0,380506e2ae8c03ebf1a0d58576260eadb6379c51baddcca2c48765ccd61fe5a4,2025-06-10T13:15:23.583000
CVE-2025-49511,0,0,89f9e9e06a92ee36a7fcee42b322bef8df2556399087804f516e0b0f17a65447,2025-06-10T13:15:23.747000
CVE-2025-4954,0,0,4f8b18e50e35fbfc0cb799c772c703df1c5ec3452b90f5bc7c961ccbbcb5c026,2025-06-10T06:15:22.403000
CVE-2025-4954,0,1,9b67173de6a4b8213182ed4ceb49024d3aa79e4cb7e72692c8f9984c1acc24c3,2025-06-11T14:15:37.287000
CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000
CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000
CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000
CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000
CVE-2025-49651,0,1,3dc40157fb10bae7243a77ac51b211b66ba5acc56dee973c3a32b5a2ba7b366d,2025-06-11T13:15:24.483000
CVE-2025-49652,0,1,4e7502c990624f15263178caeb248d6dfded2ce2c251ff5e53411eb5a9308d20,2025-06-11T13:15:24.613000
CVE-2025-49653,0,1,1ecfe673ed5ad877726cedd55cefd4c60f1c99abefcd145ee08bdc016366d375,2025-06-11T13:15:24.720000
CVE-2025-49651,0,0,3dc40157fb10bae7243a77ac51b211b66ba5acc56dee973c3a32b5a2ba7b366d,2025-06-11T13:15:24.483000
CVE-2025-49652,0,0,4e7502c990624f15263178caeb248d6dfded2ce2c251ff5e53411eb5a9308d20,2025-06-11T13:15:24.613000
CVE-2025-49653,0,0,1ecfe673ed5ad877726cedd55cefd4c60f1c99abefcd145ee08bdc016366d375,2025-06-11T13:15:24.720000
CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000
CVE-2025-4967,0,0,108222a9fb8d269319085d1510581dfa0458c27c4448fa960791612bde83ca72,2025-05-30T16:31:03.107000
CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000
CVE-2025-49709,1,1,746dffc6d2c5432d7e4eba087556ee9d62a1593fe8d9f284a73de26c2354176d,2025-06-11T12:15:26.977000
CVE-2025-49709,0,1,b77d5424288dcc0bed80e77e1927d6b441744d6c0d21e8a94d2316ea54f0de01,2025-06-11T14:15:36.387000
CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000
CVE-2025-49710,1,1,e16065f68a1c3ecdcf2117f4df50c2fccdd2d13a0cce4d1033f135418707e259,2025-06-11T12:15:27.083000
CVE-2025-49710,0,1,3bfd7fdb4da0e1ab3a8c31ff1b5a2b77e7a67d42631f74776c5e53ec20cb3a19,2025-06-11T14:15:36.527000
CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000
CVE-2025-4977,0,0,bd1fd849d67fd76fbcb9bab811ae102c8a3ea5945e2e64bb03121997ef69d512,2025-05-21T20:25:16.407000
CVE-2025-4978,0,0,d098f546d229ff0b8b6c1c02e6df2a8e7e88cccb563b41e18115eb4da78ff2f6,2025-05-21T20:25:16.407000
@ -297139,10 +297154,10 @@ CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c4
CVE-2025-5136,0,0,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000
CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000
CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000
CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000
CVE-2025-5139,0,1,478cd92def8402421385452923781dbb1e2d7c36d24453f72439415b1b27838f,2025-06-11T14:15:37.437000
CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000
CVE-2025-5142,0,0,cfb77a196d5255a5a436db83dff520eaaa1d53cc832ec32bce9b0d13a0b8d87b,2025-06-04T18:29:34.470000
CVE-2025-5144,1,1,1a91210a39f37e90277264f7461097da3f9ae047ad04d93d74703664d1f3c808,2025-06-11T13:15:24.823000
CVE-2025-5144,0,0,1a91210a39f37e90277264f7461097da3f9ae047ad04d93d74703664d1f3c808,2025-06-11T13:15:24.823000
CVE-2025-5145,0,0,79eef495ab65fcf81286a635001443af56e362b501d3db2d9a57e69f802a1c67,2025-05-28T14:58:52.920000
CVE-2025-5146,0,0,30dc5c61e39c6bb48e155d9bcd0fd66e2395886111a482cc56b330fb6c74d9f8,2025-05-29T07:15:25.120000
CVE-2025-5147,0,0,0d68c3226bde9ea189f2d3e4a81d7d02206c36b54e63b2ea80685be3458a5459,2025-05-29T07:15:25.330000
@ -297238,16 +297253,16 @@ CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000
CVE-2025-5263,0,1,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000
CVE-2025-5264,0,1,5acf980c26362c26ab94ae3c7ae821049757c87d0eefb697447d18253fa00440,2025-06-11T12:15:27.373000
CVE-2025-5265,0,1,28606bb83a73b4f9d7dede4858210717150080ffa1d142904c522b1757edcd5e,2025-06-11T12:15:27.553000
CVE-2025-5266,0,1,86469d529066a0232f0c8eb07f8e9f67c94f247bc436f8d1062b8a0475806c9b,2025-06-11T12:15:27.730000
CVE-2025-5267,0,1,8716e9a87e0f688cdc06fb8b4836782dc60cade2df62eba24b97b33d9115e8be,2025-06-11T12:15:27.910000
CVE-2025-5268,0,1,d57c0308433fa204e62ae9e945a3726f05cee3787137e819d7cdad3d4005c86c,2025-06-11T12:15:28.087000
CVE-2025-5269,0,1,b922f617fbcbba106d44af23edcbb0031488ab18b41d436f84ab099755898527,2025-06-11T12:15:28.270000
CVE-2025-5270,0,1,96297246b7606c4dbbeaaf8f99515d023221026a42fbd39003eb5516a389c3ab,2025-06-11T12:15:28.457000
CVE-2025-5271,0,1,e8162e6d0dc193ebe9401a5dcd034fa2e97416454d77b1504f9845da76fee3ef,2025-06-11T12:15:28.647000
CVE-2025-5272,0,1,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000
CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000
CVE-2025-5264,0,0,5acf980c26362c26ab94ae3c7ae821049757c87d0eefb697447d18253fa00440,2025-06-11T12:15:27.373000
CVE-2025-5265,0,0,28606bb83a73b4f9d7dede4858210717150080ffa1d142904c522b1757edcd5e,2025-06-11T12:15:27.553000
CVE-2025-5266,0,0,86469d529066a0232f0c8eb07f8e9f67c94f247bc436f8d1062b8a0475806c9b,2025-06-11T12:15:27.730000
CVE-2025-5267,0,0,8716e9a87e0f688cdc06fb8b4836782dc60cade2df62eba24b97b33d9115e8be,2025-06-11T12:15:27.910000
CVE-2025-5268,0,1,e9f59b14522cad4c6fd38501962b508cda347cb1089d8cbaeee3eacb6c967577,2025-06-11T14:51:14.950000
CVE-2025-5269,0,0,b922f617fbcbba106d44af23edcbb0031488ab18b41d436f84ab099755898527,2025-06-11T12:15:28.270000
CVE-2025-5270,0,0,96297246b7606c4dbbeaaf8f99515d023221026a42fbd39003eb5516a389c3ab,2025-06-11T12:15:28.457000
CVE-2025-5271,0,0,e8162e6d0dc193ebe9401a5dcd034fa2e97416454d77b1504f9845da76fee3ef,2025-06-11T12:15:28.647000
CVE-2025-5272,0,0,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000
CVE-2025-5273,0,0,7a172885547dbfa68292354132d6eab77847bfdd0e0f37bfe0a33c637c28685a,2025-05-29T14:29:50.247000
CVE-2025-5276,0,0,39d67915dab7ad2300f3ccd3a288fcee1075e32b914c45ad140eb6b7725be52b,2025-05-29T14:29:50.247000
CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000
@ -297530,7 +297545,7 @@ CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7d
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000
CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000
CVE-2025-5687,1,1,c421add6eee3470a0c8dd4c0cfabac86c20482eace4697dc1de0a9f06f87c7e8,2025-06-11T12:15:29.023000
CVE-2025-5687,0,1,292ba6f1554d37b3cbf8506ac631bee8568c04e2764e21ee6a0ae1222781f5bf,2025-06-11T14:15:37.730000
CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000
CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000
CVE-2025-5693,0,0,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000
@ -297699,8 +297714,8 @@ CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2
CVE-2025-5943,0,0,571906ffe14a79e22d0036c86683c5a92f8c755e9133387c395960e0afa9c11b,2025-06-10T18:15:33.020000
CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000
CVE-2025-5952,0,0,89b97adc3e12e17ca18b9484f2cc0cbac7f8ea34e27cce81e859e2ad09b23e1a,2025-06-10T16:15:45.717000
CVE-2025-5958,0,0,881203d72e5ff9dec1d36edbffe80ff56b2ff61971d68af539fac81daa5fb5c6,2025-06-11T01:15:20.890000
CVE-2025-5959,0,0,bd8633464c7a0c0b351dfe476239cef2ce42ae529b390cb1de676ca144a4abb7,2025-06-11T01:15:21.030000
CVE-2025-5958,0,1,96c847f1fcedfcbc1a4a3cb442c43d2d7018595ed5552138040384b10ef2f717,2025-06-11T14:15:37.870000
CVE-2025-5959,0,1,82dedbdbfb3124c73cac0939bd9a9e757e9b2adfb2c48acae92ddfb7c18666c5,2025-06-11T14:15:38.037000
CVE-2025-5969,0,0,0cb5f1eef226658325ae1059818aba7cb4928688bc7acca6d60e3f96dc260577,2025-06-10T17:25:20.293000
CVE-2025-5970,0,0,d7c94f11149aa2d1fa422037b5710258375a5e88a21be20512abe255cca0c035,2025-06-10T17:25:24.033000
CVE-2025-5971,0,0,a585731e3dcf519d6d97e5105421f7765406419a5d86aa36be35cba576add91e,2025-06-10T19:15:35.400000
@ -297710,10 +297725,10 @@ CVE-2025-5974,0,0,339321be4c5ac9108cce5e98767fc5970ae083450218fa354fd8033f05a252
CVE-2025-5975,0,0,9008eeb9527e9693001a3be4b45aa5cf8a88c8a44caffd0e0b12ea03a78b8ee2,2025-06-10T20:15:25.117000
CVE-2025-5976,0,0,6867fdd2eea80fafea5defe2bbd68074fcd28406e4e3c12b1e1b2d17570ffa73,2025-06-10T20:15:25.297000
CVE-2025-5977,0,0,f304c9ff5770b6781d3f20efc156d80096139af8a0274e3045f16c5bb9d0173f,2025-06-10T20:15:25.480000
CVE-2025-5978,0,0,4e4d69a73c249e0a4a5dd907dae67dfe13fdf168bd6154e3a3a2e85793f26d9e,2025-06-10T21:15:22.793000
CVE-2025-5979,0,0,d27c61690a89a70834e1ac7ec79b55e9c00b548ee2fa9335cb0305161ad45244,2025-06-10T21:15:22.970000
CVE-2025-5980,0,0,e040dd481b18254b8331cc7db878c5d64b7a6be5a4fa7521d9ea11a576b92997,2025-06-10T21:15:23.150000
CVE-2025-5978,0,1,833468fafff899f09b44b3f8512c6da898f71d16442bcf518b12d7261792bab5,2025-06-11T14:15:38.197000
CVE-2025-5979,0,1,949ef8eb455e4068bca42c4c3d743edb0ab1ceb773f9800b8141d70bb61874a5,2025-06-11T14:15:38.320000
CVE-2025-5980,0,1,5e8c433ab9210c16ea0a5bd79d3eeebd09b12dfc93a863467a89df0063df20fc,2025-06-11T14:15:38.623000
CVE-2025-5984,0,0,23b7a2e2427c55d6b8b71bdfb3210e81fbbb4de6329b5126e67b10ed13442fce,2025-06-10T23:15:58.583000
CVE-2025-5985,0,0,6446d10df39548f8cc9543e4c4495bd4e0a246e2b8805b29cf25763ee00bb5ed,2025-06-10T23:15:58.770000
CVE-2025-5986,1,1,b188af1bd59926106ceca49db67102e84e5873a91ec7194d797228e2ae3e438a,2025-06-11T12:15:29.183000
CVE-2025-5986,0,1,1990e16fb8c462afd3f99f716f6335400ec441a8016940956e56aaac259aed8c,2025-06-11T14:15:38.880000
CVE-2025-5991,0,0,63a683acbdc0ee08246e1a037b74c64c0c9a5c11210d84e35e546c14a58c12d4,2025-06-11T08:15:22.933000

Can't render this file because it is too large.