diff --git a/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json b/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json index 4d593c06adf..2796c5c25d8 100644 --- a/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json +++ b/CVE-2020/CVE-2020-183xx/CVE-2020-18305.json @@ -2,8 +2,8 @@ "id": "CVE-2020-18305", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T06:36:01.630", - "lastModified": "2024-11-21T05:08:31.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T14:57:21.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:extremenetworks:extremexos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "37518AD5-2C1D-4987-A763-C7FC979DE85E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:extremenetworks:extremexos:30.1:*:*:*:*:*:*:*", + "matchCriteriaId": "346C9759-A35D-4310-B8F1-2CBB50F183C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-439xx/CVE-2021-43905.json b/CVE-2021/CVE-2021-439xx/CVE-2021-43905.json index 1e133d1afb2..5cf304b4e4c 100644 --- a/CVE-2021/CVE-2021-439xx/CVE-2021-43905.json +++ b/CVE-2021/CVE-2021-439xx/CVE-2021-43905.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43905", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:11.467", - "lastModified": "2024-11-21T06:30:00.253", - "vulnStatus": "Modified", + "lastModified": "2025-06-11T15:27:02.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -105,9 +105,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:microsoft:365_copilot:*:*:*:*:*:*:*:*", "versionEndExcluding": "18.2110.13110.0", - "matchCriteriaId": "401A8F0F-CE48-4D97-871E-93952CBC8A3D" + "matchCriteriaId": "AFC8F04D-114D-45C9-B41F-6A22E6EA9A85" } ] } diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json index 8803c8f5f00..1bfce284fea 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43591.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43591", "sourceIdentifier": "security@zoom.us", "published": "2023-11-15T00:15:09.237", - "lastModified": "2024-11-21T08:24:27.223", + "lastModified": "2025-06-11T15:15:26.057", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,16 +79,6 @@ "value": "NVD-CWE-noinfo" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-269" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json index 334a298dde8..284ac55671d 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46849", "sourceIdentifier": "security@openvpn.net", "published": "2023-11-11T01:15:07.270", - "lastModified": "2024-11-21T08:29:25.337", + "lastModified": "2025-06-11T15:15:26.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-473xx/CVE-2023-47335.json b/CVE-2023/CVE-2023-473xx/CVE-2023-47335.json index 486a2c20447..f6b80d96384 100644 --- a/CVE-2023/CVE-2023-473xx/CVE-2023-47335.json +++ b/CVE-2023/CVE-2023-473xx/CVE-2023-47335.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47335", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-16T06:15:31.923", - "lastModified": "2024-11-21T08:30:10.297", + "lastModified": "2025-06-11T15:15:27.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-474xx/CVE-2023-47488.json b/CVE-2023/CVE-2023-474xx/CVE-2023-47488.json index 8a6a2abeded..8c0e831fbc3 100644 --- a/CVE-2023/CVE-2023-474xx/CVE-2023-47488.json +++ b/CVE-2023/CVE-2023-474xx/CVE-2023-47488.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47488", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-09T06:15:24.290", - "lastModified": "2024-11-21T08:30:20.677", + "lastModified": "2025-06-11T15:15:27.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47674.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47674.json index 4086d68a745..565d116a774 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47674.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47674.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47674", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-11-16T08:15:33.147", - "lastModified": "2024-11-21T08:30:39.267", + "lastModified": "2025-06-11T15:15:27.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48197.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48197.json index ebe2f1381b1..b80fe687063 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48197.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48197.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48197", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-15T23:15:08.903", - "lastModified": "2024-11-21T08:31:11.990", + "lastModified": "2025-06-11T15:15:27.713", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1243.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1243.json index 1e87ef2694b..8b7403492ee 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1243.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1243.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1243", "sourceIdentifier": "41c37e40-543d-43a2-b660-2fee83ea851a", "published": "2025-06-11T02:15:20.270", - "lastModified": "2025-06-11T02:15:20.270", + "lastModified": "2025-06-11T15:15:28.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the Wazuh agent for Windows prior to version 4.8.0 allows an attacker with control over the Wazuh server or agent key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine account NetNTLMv2 hash, which can be relayed for remote code execution or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el agente de Wazuh para Windows anterior a la versi\u00f3n 4.8.0 permite que un atacante con control sobre el servidor o la clave del agente de Wazuh configure el agente para conectarse a una ruta UNC maliciosa. Esto provoca la filtraci\u00f3n del hash NetNTLMv2 de la cuenta de la m\u00e1quina, que puede retransmitirse para la ejecuci\u00f3n remota de c\u00f3digo o utilizarse para escalar privilegios al SYSTEM mediante la falsificaci\u00f3n de certificados de AD CS y otros ataques similares." } ], "metrics": { @@ -85,6 +89,10 @@ { "url": "https://pentraze.com/vulnerability-reports/CVE-2024-1243/", "source": "41c37e40-543d-43a2-b660-2fee83ea851a" + }, + { + "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-3crh-39qv-fxj7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13865.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13865.json index b1cfade998f..b241807b17b 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13865.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13865", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:40.247", - "lastModified": "2025-05-20T20:15:36.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T14:55:38.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:s3bubble:s3player:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.2.1", + "matchCriteriaId": "638239B7-7E77-4A5F-A6F9-BC720D52B828" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/9cc7c5cb-983f-4593-abc5-7e224b275a23/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/9cc7c5cb-983f-4593-abc5-7e224b275a23/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1663.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1663.json index c91d1650f25..bd98c9120c9 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1663.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1663", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:41.293", - "lastModified": "2025-05-20T15:16:03.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T14:48:53.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:texttheater:ultimate_noindex_nofollow_tool_ii:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.6", + "matchCriteriaId": "AFAC5D11-C185-4A63-9F31-586C76139542" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/6d101f2b-e903-4e64-92cc-e550abb52d6f/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/6d101f2b-e903-4e64-92cc-e550abb52d6f/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2643.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2643.json index 8c4df34201d..3e6e5bb1507 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2643.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2643", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:49.837", - "lastModified": "2025-05-20T15:16:04.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T14:45:57.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.8", + "matchCriteriaId": "283CEB14-D05B-484F-8121-EF109834DFA0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/194ebf81-8fe4-4c74-8174-35d0ac00ac93/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/194ebf81-8fe4-4c74-8174-35d0ac00ac93/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json index ac9fe9e243c..78acfbb8651 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27628", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T19:15:05.180", - "lastModified": "2024-11-21T09:04:49.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:22:56.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:offis:dcmtk:3.6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A80B78-3210-466A-B051-3516CBDD6B84" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://support.dcmtk.org/redmine/issues/1108", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://support.dcmtk.org/redmine/issues/1108", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json index 5f34dde035a..342fb75aad5 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33788.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33788", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T13:15:49.667", - "lastModified": "2024-11-21T09:17:29.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:39:33.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*", + "matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34500.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34500.json index 5225d51b53b..8de9f6d1d2e 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34500.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34500.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34500", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T19:15:07.123", - "lastModified": "2024-12-04T21:15:23.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T14:44:14.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,99 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.39.6", + "matchCriteriaId": "6A7D7611-D088-4AF6-8CE0-EACBE4FF4492" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.40.0", + "versionEndExcluding": "1.40.2", + "matchCriteriaId": "3EF19DE5-1D79-4001-ABA1-D648AD6610D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.41.0", + "versionEndExcluding": "1.41.1", + "matchCriteriaId": "314B0F2D-27BD-486B-B528-FD8A7AAE53E6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://phabricator.wikimedia.org/T357203", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://phabricator.wikimedia.org/T357203", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34509.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34509.json index 5b2b800af10..f1bb47051be 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34509.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34509.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34509", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T20:15:07.367", - "lastModified": "2024-11-21T09:18:50.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:35:22.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,97 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.6.9", + "matchCriteriaId": "469288BA-64CF-4825-A5A9-843595A8E58E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.dcmtk.org/redmine/issues/1114", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.dcmtk.org/redmine/issues/1114", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37394.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37394.json index 0ca4a133d54..f0cceb22026 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37394.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37394.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37394", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-10T18:15:29.527", - "lastModified": "2025-06-10T18:15:29.527", + "lastModified": "2025-06-11T15:15:28.363", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Project Dashboards of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Dashboard title' and 'Dashboard content' text boxes. This can lead to the execution of malicious scripts when the dashboard is viewed. Users are recommended to update to version 14.2.1 or later to mitigate this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en los paneles de control del proyecto REDCap 13.1.9 permite a los usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los cuadros de texto \"T\u00edtulo del panel\" y \"Contenido del panel\". Esto puede provocar la ejecuci\u00f3n de scripts maliciosos al acceder al panel. Se recomienda a los usuarios actualizar a la versi\u00f3n 14.2.1 o posterior para mitigar esta vulnerabilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", @@ -24,6 +63,10 @@ { "url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt", "source": "cve@mitre.org" + }, + { + "url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37395.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37395.json index 72d677b3c42..c0cb7f13aa2 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37395.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37395.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37395", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-10T18:15:29.660", - "lastModified": "2025-06-10T18:15:29.660", + "lastModified": "2025-06-11T15:15:28.567", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Public Survey function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Survey Title' and 'Survey Instructions' fields. This vulnerability could be exploited by attackers to execute malicious scripts when the survey is accessed through its public link. It is advised to update to version 14.2.1 or later to fix this issue." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en la funci\u00f3n de Encuesta P\u00fablica de REDCap 13.1.9 permite a usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los campos \"T\u00edtulo de la encuesta\" e \"Instrucciones de la encuesta\". Esta vulnerabilidad podr\u00eda ser explotada por atacantes para ejecutar scripts maliciosos al acceder a la encuesta a trav\u00e9s de su enlace p\u00fablico. Se recomienda actualizar a la versi\u00f3n 14.2.1 o posterior para solucionar este problema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", @@ -24,6 +63,10 @@ { "url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt", "source": "cve@mitre.org" + }, + { + "url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37396.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37396.json index 98a145b11c1..5dca92012f5 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37396.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37396.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37396", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-10T18:15:29.773", - "lastModified": "2025-06-10T18:15:29.773", + "lastModified": "2025-06-11T15:15:28.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Calendar function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Notes' field of a calendar event. This could lead to the execution of malicious scripts when the event is viewed. Updating to version 14.2.1 or later is recommended to remediate this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en la funci\u00f3n Calendario de REDCap 13.1.9 permite a usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el campo \"Notas\" de un evento del calendario. Esto podr\u00eda provocar la ejecuci\u00f3n de scripts maliciosos al visualizar el evento. Se recomienda actualizar a la versi\u00f3n 14.2.1 o posterior para corregir esta vulnerabilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/", @@ -24,6 +63,10 @@ { "url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt", "source": "cve@mitre.org" + }, + { + "url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3932.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3932.json index 6af1d290e44..4fbf26b5678 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3932.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3932.json @@ -2,13 +2,13 @@ "id": "CVE-2024-3932", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-18T00:15:08.033", - "lastModified": "2024-11-21T09:30:43.703", + "lastModified": "2025-06-11T14:15:29.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as problematic has been found in Totara LMS 18.0.1 Build 20231128.01. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261369 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability classified as problematic has been found in Totara LMS up to 18.7. This affects an unknown part of the component User Selector. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 13.46, 14.38, 15.33, 16.27, 17.21 and 18.8 is able to address this issue. It is recommended to upgrade the affected component." }, { "lang": "es", @@ -16,17 +16,61 @@ } ], "metrics": { - "cvssMetricV31": [ + "cvssMetricV40": [ { "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", - "baseScore": 4.3, - "baseSeverity": "MEDIUM", + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", @@ -34,7 +78,7 @@ "integrityImpact": "LOW", "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 1.6, "impactScore": 1.4 } ], @@ -44,17 +88,17 @@ "type": "Secondary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", - "baseScore": 5.0, + "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", - "accessComplexity": "LOW", + "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, - "baseSeverity": "MEDIUM", - "exploitabilityScore": 10.0, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, @@ -67,16 +111,24 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" } ] } ], "references": [ + { + "url": "https://totara.community/mod/forum/discuss.php?d=27644", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.261369", "source": "cna@vuldb.com" diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41502.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41502.json index c27cdfbef52..ac18c31d812 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41502.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41502.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41502", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-10T20:15:21.470", - "lastModified": "2025-06-10T20:15:21.470", + "lastModified": "2025-06-11T14:15:29.773", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) via the form field \"Observaces\" (observances) in the \"Pessoas\" (persons) section when creating or editing either a legal or a natural person." + }, + { + "lang": "es", + "value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo de formulario \"Observaces\" (observancias) en la secci\u00f3n \"Pessoas\" (personas) al crear o editar una persona jur\u00eddica o f\u00edsica." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://jetimob.com", @@ -20,6 +59,10 @@ { "url": "https://github.com/rafaelbaldasso/CVE-2024-41502", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rafaelbaldasso/CVE-2024-41502", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41503.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41503.json index 925372817f1..217ca465f65 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41503.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41503.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41503", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-10T20:15:21.610", - "lastModified": "2025-06-10T20:15:21.610", + "lastModified": "2025-06-11T14:15:29.950", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the field \"Ttulo\" (title) inside the filter Save option in the \"Busca\" (search) function." + }, + { + "lang": "es", + "value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) en el campo \"Ttulo\" (t\u00edtulo) dentro de la opci\u00f3n Guardar filtro de la funci\u00f3n \"Busca\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://jetimob.com", @@ -20,6 +59,10 @@ { "url": "https://github.com/rafaelbaldasso/CVE-2024-41503", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rafaelbaldasso/CVE-2024-41503", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41504.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41504.json index 84c214a7b3d..fd3641e8782 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41504.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41504.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41504", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-10T20:15:21.733", - "lastModified": "2025-06-10T20:15:21.733", + "lastModified": "2025-06-11T14:15:30.113", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS). In the \"Oportunidades\" (opportunities) section of the application when creating or editing an \"Atividade\" (activity), the form field \"Descrico\" allows injection of JavaScript." + }, + { + "lang": "es", + "value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a ataques de cross site scripting (XSS). En la secci\u00f3n \"Oportunidades\" de la aplicaci\u00f3n, al crear o editar una \"Actividad\", el campo de formulario \"Descripci\u00f3n\" permite la inyecci\u00f3n de JavaScript." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://jetimob.com", @@ -20,6 +59,10 @@ { "url": "https://github.com/rafaelbaldasso/CVE-2024-41504", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rafaelbaldasso/CVE-2024-41504", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41505.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41505.json index 21a19230778..c4eaaae106d 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41505.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41505.json @@ -2,16 +2,55 @@ "id": "CVE-2024-41505", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-10T20:15:21.850", - "lastModified": "2025-06-10T20:15:21.850", + "lastModified": "2025-06-11T14:15:30.277", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the \"Pessoas\" (persons) section via the field \"Profisso\" (professor)." + }, + { + "lang": "es", + "value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) en la secci\u00f3n \"Pessoas\" (personas) a trav\u00e9s del campo \"Profisso\" (profesor)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://jetimob.com", @@ -20,6 +59,10 @@ { "url": "https://github.com/rafaelbaldasso/CVE-2024-41505", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rafaelbaldasso/CVE-2024-41505", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json index 39f85d7a248..bc41c31c7c7 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42009", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-05T19:15:38.220", - "lastModified": "2025-06-10T01:00:02.087", - "vulnStatus": "Modified", + "lastModified": "2025-06-11T15:46:19.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -143,7 +143,8 @@ "url": "https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/", "source": "cve@mitre.org", "tags": [ - "Technical Description" + "Technical Description", + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json index c39538d9ef4..b74fa25389f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45194", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T17:15:15.440", - "lastModified": "2024-11-21T18:15:07.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-11T15:40:45.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,268 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.9", + "matchCriteriaId": "CC78301D-6403-496F-A349-1C7BAC37797D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "32AFCE22-5ADA-4FF7-A165-5EC12B325DEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "D3577FE6-F1F4-4555-8D27-84D6DE731EA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "931BD98E-1A5F-4634-945B-BDD7D2FAA8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "2E7C0A57-A887-4D29-B601-4275313F46B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "B7248B91-D136-4DD5-A631-737E4C220A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "494F6FD4-36ED-4E40-8336-7F077FA80FA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "9DF8C0CE-A71D-4BB1-83FB-1EA5ED77E0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "E0648498-2EE5-4B68-8360-ED5914285356" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "24282FF8-548B-415B-95CA-1EFD404D21D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "ACFDF2D9-ED72-4969-AA3B-E8D48CB1922D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "2B7D0A8B-7A72-4C1A-85F2-BE336CA47E0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "019AFC34-289E-4A01-B08B-A5807F7F909A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7E7B3976-DA6F-4285-93E6-2328006F7F4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "062E586F-0E02-45A6-93AD-895048FC2D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "3EE37BEE-4BDB-4E62-8DE3-98CF74DFBE01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "ADF51BCA-37DD-4642-B201-74A6D1A545FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "39611F3D-A898-4C35-8915-3334CDFB78E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "40AB56B7-7222-4C44-A271-45DFE3673F72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p24.1:*:*:*:*:*:*", + "matchCriteriaId": "2AE8F501-4528-4F15-AE50-D4F11FB462DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "AB9E054B-7790-4E74-A771-40BF6EC71610" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "DD924E57-C77B-430B-A615-537BB39CEA9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "F43F4AC0-7C82-4CF4-B0C7-3A4C567BC985" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "7991F602-41D7-4377-B888-D66A467EAD67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "2193FCA2-1AE3-497D-B0ED-5B89727410E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "FA310AFA-492D-4A6C-A7F6-740E82CB6E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "FF95618B-0BFB-403C-83BE-C97879FC866D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "A82346A9-9CC2-4B91-BA2F-A815AAA92A7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p32:*:*:*:*:*:*", + "matchCriteriaId": "2E800348-E139-418D-910B-7B3A9E1E721C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "C7DE1A7E-573B-42F3-B0A4-D2E676954FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "E60BC1D0-8552-4E6B-B2C5-96038448C238" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "3924251E-13B0-420E-8080-D3312C3D54AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p36:*:*:*:*:*:*", + "matchCriteriaId": "AEBE75F9-A494-4C78-927A-EA564BDCCE0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p37:*:*:*:*:*:*", + "matchCriteriaId": "900BECBA-7FDB-4E35-9603-29706FB87BD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p38:*:*:*:*:*:*", + "matchCriteriaId": "5024FD58-A3ED-43B1-83EF-F4570C2573BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p39:*:*:*:*:*:*", + "matchCriteriaId": "3CC9D046-4EB4-4608-8AB7-B60AC330A770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "2AF337B5-B296-449B-8848-7636EC7C46C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p40:*:*:*:*:*:*", + "matchCriteriaId": "A4535EC5-74D5-41E8-95F1-5C033ADB043E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "52232ACA-C158-48C8-A0DB-7689040CB8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "3B4D0040-86D0-46C3-8A9A-3DD12138B9ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "D2BB9BC7-078D-4E08-88E4-9432D74CA9BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "F04D4B77-D386-4BC8-8169-9846693F6F11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "992370FA-F171-4FB3-9C1C-58AC37038CE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C936B30B-C717-442B-8656-CF9EE3FC7C10" + } + ] + } + ] + } + ], "references": [ { "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json index e2dae85c0ef..23518713a4c 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50564", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.490", - "lastModified": "2025-02-03T22:11:08.317", + "lastModified": "2025-06-11T14:55:09.987", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,8 +92,13 @@ "vulnerable": true, "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "versionStartIncluding": "6.4.0", - "versionEndExcluding": "7.4.1", - "matchCriteriaId": "6089DAFE-EBC1-4082-BBFE-72D88B53A430" + "versionEndExcluding": "7.2.9", + "matchCriteriaId": "82E4143C-57CE-40F5-BBBE-F82B89153749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*", + "matchCriteriaId": "6B512696-8596-4458-ADC9-24DD3C6C377B" } ] } diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json index 87b68f6d94e..df6c1bb2178 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51406", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T14:15:07.073", - "lastModified": "2024-11-04T19:35:17.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-11T14:15:56.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,18 +39,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectfloodlight:open_sdn_controller:1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "77E9C7A7-16A2-4634-95C8-F54852F36396" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/floodlight/floodlight", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/floodlight/floodlight/issues/870", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://ieeexplore.ieee.org/document/10246976", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6335.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6335.json index 5bc0aa3dc51..740630789c3 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6335.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6335", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:54.923", - "lastModified": "2025-05-20T20:15:37.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:46:57.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:data443:tracking_code_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "1B600CE7-27B7-4154-BCFA-38F156C90DE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/3bfb6b3f-8642-4807-b6b3-f214b26e96c2/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/3bfb6b3f-8642-4807-b6b3-f214b26e96c2/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6462.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6462.json index cdc40b3ecb2..5031974b200 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6462.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6462", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:55.007", - "lastModified": "2025-05-20T20:15:37.467", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:43:50.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dyadyalesha:dl_yandex_metrika:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2", + "matchCriteriaId": "950A2803-25BD-489B-AF1B-6783850F3258" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/0880fa33-3efa-4f50-83c8-4c90cb805eb9/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/0880fa33-3efa-4f50-83c8-4c90cb805eb9/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6478.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6478.json index a1e6898e362..93d794f3be5 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6478.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6478", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:55.120", - "lastModified": "2025-05-20T20:15:37.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:41:54.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "9736EDF6-3A35-4684-9B60-6F6907E657CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/39a78741-eeae-4a27-8136-7d0bb0bf2263/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/39a78741-eeae-4a27-8136-7d0bb0bf2263/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6486.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6486.json index e440a19d5bf..f80a6e5b45e 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6486.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6486", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:55.220", - "lastModified": "2025-05-20T20:15:37.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:40:01.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:orangelab:imagemagick_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7.11", + "matchCriteriaId": "22542741-483D-44AE-9A47-87ADD3CDB1F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/a57c0c59-8b5c-4221-a9db-19f141650d9b/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/a57c0c59-8b5c-4221-a9db-19f141650d9b/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6690.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6690.json index 39365059c4b..e7f5e7db96b 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6690.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6690.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6690", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:55.700", - "lastModified": "2025-05-20T20:15:38.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T14:59:33.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-buy:wp_content_copy_protection_\\&_no_right_click:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "89176D33-3BF5-4C73-8405-21A41A09A590" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/09c6848d-30dc-4382-ae74-b470f586e142/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/09c6848d-30dc-4382-ae74-b470f586e142/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0163.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0163.json new file mode 100644 index 00000000000..9549b014316 --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0163.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0163", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-11T15:15:29.177", + "lastModified": "2025-06-11T15:15:29.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7236314", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json index 38fedb56dfe..87b3d634a91 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22996", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:45.053", - "lastModified": "2025-01-15T17:15:21.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:38:44.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*", + "matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit" + ] }, { "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-2.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json index 5e2b92b4b7c..037d841eff3 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22997", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:45.167", - "lastModified": "2025-01-15T17:15:22.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-11T15:35:40.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*", + "matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit" + ] }, { "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-1.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json index e77f49a2e0a..697fb771592 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25193.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25193", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-10T22:15:38.450", - "lastModified": "2025-03-26T13:14:32.087", + "lastModified": "2025-06-11T15:36:22.693", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -73,6 +73,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -85,6 +86,17 @@ "matchCriteriaId": "A71F5AEF-CB1E-41D1-A0D8-804DCF674542" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] } ] } diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26412.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26412.json index 18f5b0b61c0..8e3aa599b0f 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26412.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26412.json @@ -2,16 +2,43 @@ "id": "CVE-2025-26412", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-06-11T09:15:22.067", - "lastModified": "2025-06-11T09:15:22.067", + "lastModified": "2025-06-11T14:15:30.987", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands." + }, + { + "lang": "es", + "value": "El m\u00f3dem SIMCom SIM7600G admite un comando AT no documentado que permite a un atacante ejecutar comandos del sistema con permisos de root en el m\u00f3dem. Un atacante necesita acceso f\u00edsico o acceso remoto a un dispositivo que interact\u00fae directamente con el m\u00f3dem mediante comandos AT." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26521.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26521.json index f6b2d46cd44..b38f287346f 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26521.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26521.json @@ -2,20 +2,47 @@ "id": "CVE-2025-26521", "sourceIdentifier": "security@apache.org", "published": "2025-06-10T23:15:23.840", - "lastModified": "2025-06-10T23:15:23.840", + "lastModified": "2025-06-11T14:15:31.137", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A member of the project who can access the CKS-based Kubernetes cluster, can also access the API key and secret key of the 'kubeadmin' user of the CKS cluster's creator's account. An attacker who's a member of the project can exploit this to impersonate and perform privileged actions that can result in complete compromise of the confidentiality, integrity, and availability of resources owned by the creator's account.\n\nCKS users are recommended to upgrade to version 4.19.3.0 or 4.20.1.0, which fixes this issue.Updating Existing Kubernetes Clusters in ProjectsA service account should be created for each project to provide limited access specifically for Kubernetes cluster providers and autoscaling. Follow the steps below to create a new service account, update the secret inside the cluster, and regenerate existing API and service keys:1. Create a New Service AccountCreate a new account using the role \"Project Kubernetes Service Role\" with the following details:\n\nAccount Name\nkubeadmin-\nFirst Name\nKubernetes\nLast Name\nService User\nAccount Type\n0 (Normal User)\nRole ID\n\n\n\n\n2. Add the Service Account to the ProjectAdd this account to the project where the Kubernetes cluster(s) are hosted.\n3. Generate API and Secret KeysGenerate API Key and Secret Key for the default user of this account.\n4. Update the CloudStack Secret in the Kubernetes ClusterCreate a temporary file `/tmp/cloud-config` with the following data:\n\u00a0\u00a0\u00a0api-url = \u00a0 \u00a0 # For example: /client/api\n\u00a0 api-key = \n\u00a0 secret-key = \n\u00a0 project-id = \n\n\n\n\nDelete the existing secret using kubectl and Kubernetes cluster config:\n\u00a0\u00a0\u00a0./kubectl --kubeconfig kube.conf -n kube-system delete secret cloudstack-secret\n\n\n\n\nCreate a new secret using kubectl and Kubernetes cluster config:\n\u00a0 \u00a0 ./kubectl --kubeconfig kube.conf -n kube-system create secret generic cloudstack-secret --from-file=/tmp/cloud-config\n\n\n\n\nRemove the temporary file:\n\u00a0 \u00a0 rm /tmp/cloud-config5. Regenerate API and Secret KeysRegenerate the API and secret keys for the original user account that was used to create the Kubernetes cluster." + }, + { + "lang": "es", + "value": "Cuando una cuenta de usuario de Apache CloudStack crea un cl\u00faster de Kubernetes basado en CKS en un proyecto, la clave API y la clave secreta del usuario \"kubeadmin\" de la cuenta del autor de la llamada se utilizan para crear la configuraci\u00f3n secreta en el cl\u00faster de Kubernetes basado en CKS. Un miembro del proyecto con acceso al cl\u00faster de Kubernetes basado en CKS tambi\u00e9n puede acceder a la clave API y la clave secreta del usuario \"kubeadmin\" de la cuenta del creador del cl\u00faster. Un atacante miembro del proyecto puede aprovechar esto para suplantar la identidad y realizar acciones privilegiadas que pueden comprometer por completo la confidencialidad, integridad y disponibilidad de los recursos de la cuenta del creador. Se recomienda a los usuarios de CKS actualizar a la versi\u00f3n 4.19.3.0 o 4.20.1.0, que soluciona este problema. Actualizaci\u00f3n de cl\u00fasteres de Kubernetes existentes en proyectos. Se debe crear una cuenta de servicio para cada proyecto a fin de proporcionar acceso limitado, espec\u00edficamente para los proveedores de cl\u00fasteres de Kubernetes y el escalado autom\u00e1tico. Siga los pasos a continuaci\u00f3n para crear una nueva cuenta de servicio, actualizar el secreto dentro del cl\u00faster y regenerar las claves de API y de servicio existentes: 1. Cree una nueva cuenta de servicio. Cree una nueva cuenta con el rol \"Rol de servicio de Kubernetes del proyecto\" con la siguiente informaci\u00f3n: Nombre de la cuenta: kubeadmin- Nombre: Kubernetes Apellido: Usuario de servicio Tipo de cuenta: 0 (Usuario normal) ID de rol: 2. Agregue la cuenta de servicio al proyecto. Agregue esta cuenta al proyecto donde se alojan los cl\u00fasteres de Kubernetes. 3. Genere las claves de API y secretas. Genere la clave de API y la clave secreta para el usuario predeterminado de esta cuenta. 4. Actualice el secreto de CloudStack en el cl\u00faster de Kubernetes. Cree un archivo temporal `/tmp/cloud-config` con los siguientes datos: api-url = # Por ejemplo: /client/api api-key = secret-key = project-id = Elimine el secreto existente usando kubectl y la configuraci\u00f3n del cl\u00faster de Kubernetes: ./kubectl --kubeconfig kube.conf -n kube-system delete secret cloudstack-secret Cree un nuevo secreto usando kubectl y la configuraci\u00f3n del cl\u00faster de Kubernetes: ./kubectl --kubeconfig kube.conf -n kube-system create secret generic cloudstack-secret --from-file=/tmp/cloud-config Elimine el archivo temporal: rm /tmp/cloud-config5. Regenerar API y claves secretasRegenere la API y las claves secretas para la cuenta de usuario original que se utiliz\u00f3 para crear el cl\u00faster de Kubernetes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2884.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2884.json index 66b2dc5ec11..07f044e071e 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2884.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2884.json @@ -2,16 +2,55 @@ "id": "CVE-2025-2884", "sourceIdentifier": "cret@cert.org", "published": "2025-06-10T18:15:30.617", - "lastModified": "2025-06-10T19:15:28.847", + "lastModified": "2025-06-11T15:15:29.487", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0" + "value": "TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 and advisory VRT0009 of TCG standard TPM2.0" + }, + { + "lang": "es", + "value": "La funci\u00f3n auxiliar CryptHmacSign de la implementaci\u00f3n de referencia TCG TPM2.0 es vulnerable a lecturas fuera de los l\u00edmites debido a la falta de validaci\u00f3n del esquema de firma con el algoritmo de la clave de firma. Consulte la errata 1.83 del est\u00e1ndar TCG TPM2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://trustedcomputinggroup.org/about/security/", @@ -21,6 +60,10 @@ "url": "https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf", "source": "cret@cert.org" }, + { + "url": "https://trustedcomputinggroup.org/wp-content/uploads/VRT0009-Advisory-FINAL.pdf", + "source": "cret@cert.org" + }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32711.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32711.json new file mode 100644 index 00000000000..7bd047ea693 --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32711.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2025-32711", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-06-11T14:15:31.530", + "lastModified": "2025-06-11T14:15:31.530", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "secure@microsoft.com", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json index 6494eea3750..b24d6827050 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json @@ -2,13 +2,17 @@ "id": "CVE-2025-33053", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:22:18.853", - "lastModified": "2025-06-11T01:00:01.443", - "vulnStatus": "Received", + "lastModified": "2025-06-11T14:11:11.517", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El control externo del nombre o ruta del archivo en WebDAV permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3473.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3473.json new file mode 100644 index 00000000000..88cbbb3b905 --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3473.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-3473", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-11T15:15:29.827", + "lastModified": "2025-06-11T15:15:29.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7236356", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-359xx/CVE-2025-35940.json b/CVE-2025/CVE-2025-359xx/CVE-2025-35940.json index 175c9058459..35956c339fc 100644 --- a/CVE-2025/CVE-2025-359xx/CVE-2025-35940.json +++ b/CVE-2025/CVE-2025-359xx/CVE-2025-35940.json @@ -2,13 +2,17 @@ "id": "CVE-2025-35940", "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-06-10T21:15:22.210", - "lastModified": "2025-06-10T21:15:22.210", + "lastModified": "2025-06-11T14:15:33.690", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ArchiverSpaApi\u00a0ASP.NET application uses a hard-coded JWT signing key. An unauthenticated remote attacker can generate and use a verifiable JWT token to access protected ArchiverSpaApi URL endpoints." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n ASP.NET ArchiverSpaApi utiliza una clave de firma JWT codificada de forma r\u00edgida. Un atacante remoto no autenticado puede generar y usar un token JWT verificable para acceder a los endpoints URL protegidos de ArchiverSpaApi." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://www.tenable.com/security/research/tra-2025-17", "source": "vulnreport@tenable.com" + }, + { + "url": "https://www.tenable.com/security/research/tra-2025-17", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-359xx/CVE-2025-35941.json b/CVE-2025/CVE-2025-359xx/CVE-2025-35941.json new file mode 100644 index 00000000000..f9755cb4af7 --- /dev/null +++ b/CVE-2025/CVE-2025-359xx/CVE-2025-35941.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-35941", + "sourceIdentifier": "vulnreport@tenable.com", + "published": "2025-06-11T14:15:33.797", + "lastModified": "2025-06-11T14:15:33.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A password is exposed locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.tenable.com/security/research/tra-2025-18", + "source": "vulnreport@tenable.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-409xx/CVE-2025-40914.json b/CVE-2025/CVE-2025-409xx/CVE-2025-40914.json new file mode 100644 index 00000000000..79418a64fdd --- /dev/null +++ b/CVE-2025/CVE-2025-409xx/CVE-2025-40914.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-40914", + "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "published": "2025-06-11T14:15:34.007", + "lastModified": "2025-06-11T15:15:29.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow.\n\nCryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://github.com/advisories/GHSA-j3xv-6967-cv88", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://github.com/libtom/libtommath/pull/546", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://metacpan.org/release/MIK/CryptX-0.086/source/src/ltm/bn_mp_grow.c", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2023-36328", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-436xx/CVE-2025-43697.json b/CVE-2025/CVE-2025-436xx/CVE-2025-43697.json index 899f9b31add..bbac2f6b5f0 100644 --- a/CVE-2025/CVE-2025-436xx/CVE-2025-43697.json +++ b/CVE-2025/CVE-2025-436xx/CVE-2025-43697.json @@ -2,16 +2,43 @@ "id": "CVE-2025-43697", "sourceIdentifier": "security@salesforce.com", "published": "2025-06-10T12:15:24.097", - "lastModified": "2025-06-10T12:15:24.097", + "lastModified": "2025-06-11T14:15:34.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (DataMapper) allows exposure of encrypted data.\nThis impacts OmniStudio: before Spring 2025" + }, + { + "lang": "es", + "value": "La vulnerabilidad de conservaci\u00f3n inadecuada de permisos en Salesforce OmniStudio (DataMapper) permite la exposici\u00f3n de datos cifrados. Esto afecta a OmniStudio: antes de la primavera de 2025." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@salesforce.com", diff --git a/CVE-2025/CVE-2025-436xx/CVE-2025-43698.json b/CVE-2025/CVE-2025-436xx/CVE-2025-43698.json index a5d01fe38bb..3d8f4df1b2b 100644 --- a/CVE-2025/CVE-2025-436xx/CVE-2025-43698.json +++ b/CVE-2025/CVE-2025-436xx/CVE-2025-43698.json @@ -2,16 +2,43 @@ "id": "CVE-2025-43698", "sourceIdentifier": "security@salesforce.com", "published": "2025-06-10T12:15:24.227", - "lastModified": "2025-06-10T12:15:24.227", + "lastModified": "2025-06-11T14:15:34.417", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for Salesforce objects. \nThis impacts OmniStudio: before Spring 2025" + }, + { + "lang": "es", + "value": "La vulnerabilidad de conservaci\u00f3n incorrecta de permisos en Salesforce OmniStudio (FlexCards) permite eludir los controles de seguridad de campo para objetos de Salesforce. Esto afecta a OmniStudio: antes de la primavera de 2025." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@salesforce.com", diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4605.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4605.json new file mode 100644 index 00000000000..4d0cb038b7d --- /dev/null +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4605.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-4605", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-06-11T14:15:36.847", + "lastModified": "2025-06-11T14:15:36.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a denial-of-service (DoS), or cause data corruption." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-789" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0011", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47713.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47713.json index cbacef3acf3..8f8efd4454e 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47713.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47713.json @@ -2,20 +2,47 @@ "id": "CVE-2025-47713", "sourceIdentifier": "security@apache.org", "published": "2025-06-10T23:15:58.320", - "lastModified": "2025-06-10T23:15:58.320", + "lastModified": "2025-06-11T14:15:35.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts.\u00a0A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that\u00a0could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:\n * Strict validation on Role Type hierarchy: the caller's user-account role must be equal to or higher than the target user-account's role.\n * API privilege comparison: the caller must possess all privileges of the user they are operating on. \n * Two new domain-level settings (restricted to the default Admin): \n\u2003- role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: \"Admin, DomainAdmin, ResourceAdmin\". \n\u00a0 \u00a0- allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en Apache CloudStack, versiones 4.10.0.0 a 4.20.0.0, donde un usuario administrador de dominio malintencionado en el dominio ROOT puede restablecer la contrase\u00f1a de las cuentas de usuario con el rol de administrador. Esta operaci\u00f3n no est\u00e1 restringida adecuadamente y permite al atacante asumir el control de cuentas de usuario con privilegios m\u00e1s altos. Un atacante malintencionado de dominio puede suplantar una cuenta de usuario administrador y obtener acceso a API y recursos confidenciales, lo que podr\u00eda comprometer la integridad y confidencialidad de los recursos, la p\u00e9rdida de datos, la denegaci\u00f3n de servicio y la disponibilidad de la infraestructura administrada por CloudStack. Se recomienda a los usuarios actualizar a Apache CloudStack 4.19.3.0 o 4.20.1.0, que soluciona el problema con lo siguiente: * Validaci\u00f3n estricta en la jerarqu\u00eda de tipos de rol: el rol de la cuenta de usuario del llamante debe ser igual o superior al rol de la cuenta de usuario de destino. * Comparaci\u00f3n de privilegios de API: el usuario que realiza la llamada debe tener todos los privilegios del usuario con el que opera. * Dos nuevas configuraciones a nivel de dominio (restringidas al administrador predeterminado): - role.types.allowed.for.operations.on.accounts.of.same.role.type: Define qu\u00e9 tipos de rol pueden actuar sobre usuarios del mismo tipo. Predeterminado: \"Admin, DomainAdmin, ResourceAdmin\". - allow.operations.on.users.in.same.account: Permite o impide las operaciones de usuario dentro de la misma cuenta. Predeterminado: true." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47849.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47849.json index 99b89d82c17..580ba542290 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47849.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47849.json @@ -2,20 +2,47 @@ "id": "CVE-2025-47849", "sourceIdentifier": "security@apache.org", "published": "2025-06-10T23:15:58.453", - "lastModified": "2025-06-10T23:15:58.453", + "lastModified": "2025-06-11T14:15:35.727", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.\n\nUsers are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:\n\n\n * Strict validation on Role Type hierarchy: the caller's role must be equal to or higher than the target user's role.\u00a0\n * API privilege comparison: the caller must possess all privileges of the user they are operating on.\u00a0\n * Two new domain-level settings (restricted to the default admin):\u00a0\n\u2003- role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: \"Admin, DomainAdmin, ResourceAdmin\".\u00a0\n\u2003- allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en Apache CloudStack, versiones 4.10.0.0 a 4.20.0.0, donde un usuario administrador de dominio malintencionado en el dominio ROOT puede obtener la clave API y la clave secreta de las cuentas de usuario con el rol de administrador en el mismo dominio. Esta operaci\u00f3n no est\u00e1 restringida adecuadamente y permite al atacante asumir el control sobre cuentas de usuario con mayores privilegios. Un atacante malintencionado de dominio puede suplantar una cuenta de usuario administrador y obtener acceso a API y recursos confidenciales que podr\u00edan comprometer la integridad y confidencialidad de los recursos, la p\u00e9rdida de datos, la denegaci\u00f3n de servicio y la disponibilidad de la infraestructura administrada por CloudStack. Se recomienda a los usuarios actualizar a Apache CloudStack 4.19.3.0 o 4.20.1.0, que soluciona el problema con lo siguiente: * Validaci\u00f3n estricta en la jerarqu\u00eda de tipos de rol: el rol del llamante debe ser igual o superior al rol del usuario objetivo. * Comparaci\u00f3n de privilegios de API: el usuario que realiza la llamada debe tener todos los privilegios del usuario con el que opera. * Dos nuevas configuraciones a nivel de dominio (restringidas al administrador predeterminado): - role.types.allowed.for.operations.on.accounts.of.same.role.type: Define qu\u00e9 tipos de rol pueden actuar sobre usuarios del mismo tipo. Predeterminado: \"Admin, DomainAdmin, ResourceAdmin\". - allow.operations.on.users.in.same.account: Permite o impide las operaciones de usuario dentro de la misma cuenta. Predeterminado: true." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48013.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48013.json new file mode 100644 index 00000000000..3202d18c675 --- /dev/null +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48013.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48013", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-11T15:15:41.830", + "lastModified": "2025-06-11T15:15:41.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from 0.0.0 before 2.0.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-065", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48444.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48444.json new file mode 100644 index 00000000000..99659a5a550 --- /dev/null +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48444.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48444", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-11T15:15:42.143", + "lastModified": "2025-06-11T15:15:42.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from 0.0.0 before 2.0.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-064", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48445.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48445.json new file mode 100644 index 00000000000..0edaa7f0b6d --- /dev/null +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48445.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48445", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-11T15:15:42.270", + "lastModified": "2025-06-11T15:15:42.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Commerce Eurobank (Redirect) allows Functionality Misuse.This issue affects Commerce Eurobank (Redirect): from 0.0.0 before 2.1.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-066", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48446.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48446.json new file mode 100644 index 00000000000..a6079653aaf --- /dev/null +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48446.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48446", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-11T15:15:42.427", + "lastModified": "2025-06-11T15:15:42.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Commerce Alphabank Redirect allows Functionality Misuse.This issue affects Commerce Alphabank Redirect: from 0.0.0 before 1.0.3." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-067", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48447.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48447.json new file mode 100644 index 00000000000..ae79b0a8b97 --- /dev/null +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48447.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48447", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-11T15:15:42.607", + "lastModified": "2025-06-11T15:15:42.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Lightgallery allows Cross-Site Scripting (XSS).This issue affects Lightgallery: from 0.0.0 before 1.6.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-069", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48448.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48448.json new file mode 100644 index 00000000000..e055c803948 --- /dev/null +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48448.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-48448", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-06-11T15:15:42.733", + "lastModified": "2025-06-11T15:15:42.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Allocation of Resources Without Limits or Throttling vulnerability in Drupal Admin Audit Trail allows Excessive Allocation.This issue affects Admin Audit Trail: from 0.0.0 before 1.0.5." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2025-068", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49146.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49146.json new file mode 100644 index 00000000000..6c2ecad52a5 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49146.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-49146", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-11T15:15:42.850", + "lastModified": "2025-06-11T15:15:42.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. This vulnerability is fixed in 42.7.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pgjdbc/pgjdbc/commit/9217ed16cb2918ab1b6b9258ae97e6ede244d8a0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-hq9p-pm7w-8p54", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49148.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49148.json new file mode 100644 index 00000000000..722352a8d65 --- /dev/null +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49148.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49148", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-11T15:15:43.043", + "lastModified": "2025-06-11T15:15:43.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ClipShare is a lightweight and cross-platform tool for clipboard sharing. Prior to 3.8.5, ClipShare Server for Windows uses the default Windows DLL search order and loads system libraries like CRYPTBASE.dll and WindowsCodecs.dll from its own directory before the system path. A local, non-privileged user who can write to the folder containing clip_share.exe can place malicious DLLs there, leading to arbitrary code execution in the context of the server, and, if launched by an Administrator (or another elevated user), it results in a reliable local privilege escalation. This vulnerability is fixed in 3.8.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/thevindu-w/clip_share_server/security/advisories/GHSA-rc47-h83g-2r8j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49709.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49709.json index 1cf69b2a78f..72cadb91458 100644 --- a/CVE-2025/CVE-2025-497xx/CVE-2025-49709.json +++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49709.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49709", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-11T12:15:26.977", - "lastModified": "2025-06-11T12:15:26.977", + "lastModified": "2025-06-11T14:15:36.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Ciertas operaciones de canvas podr\u00edan haber provocado corrupci\u00f3n de memoria. Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 139.0.4." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1966083", diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49710.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49710.json index d733f647e09..acea061621a 100644 --- a/CVE-2025/CVE-2025-497xx/CVE-2025-49710.json +++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49710.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49710", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-11T12:15:27.083", - "lastModified": "2025-06-11T12:15:27.083", + "lastModified": "2025-06-11T14:15:36.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se produjo un desbordamiento de entero en `OrderedHashTable` utilizado por el motor JavaScript. Esta vulnerabilidad afecta a Firefox < 139.0.4." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1970095", diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4922.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4922.json new file mode 100644 index 00000000000..8cc1b72d1e1 --- /dev/null +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4922.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-4922", + "sourceIdentifier": "security@hashicorp.com", + "published": "2025-06-11T14:15:37.140", + "lastModified": "2025-06-11T14:15:37.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nomad Community and Nomad Enterprise (\u201cNomad\u201d) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.hashicorp.com/t/hcsec-2025-12-nomad-vulnerable-to-incorrect-acl-policy-lookup-attached-to-a-job/75396", + "source": "security@hashicorp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4929.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4929.json index 25df3a89f4c..8d94526396f 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4929.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4929.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4929", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-19T11:15:19.493", - "lastModified": "2025-05-21T17:42:52.510", + "lastModified": "2025-06-11T14:54:00.567", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -163,9 +163,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.48.3", - "matchCriteriaId": "8C6BB08B-59CD-4524-AC16-55130113AE69" + "criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D" } ] } diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4954.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4954.json index 57388bb469f..3b9fe434fb3 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4954.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4954.json @@ -2,16 +2,43 @@ "id": "CVE-2025-4954", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-10T06:15:22.403", - "lastModified": "2025-06-10T06:15:22.403", + "lastModified": "2025-06-11T14:15:37.287", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Axle Demo Importer WordPress plugin through 1.0.3 does not validate files to be uploaded, which could allow authenticated users (author and above) to upload arbitrary files such as PHP on the server" + }, + { + "lang": "es", + "value": "El complemento Axle Demo Importer de WordPress hasta la versi\u00f3n 1.0.3 no valida los archivos que se cargar\u00e1n, lo que podr\u00eda permitir que usuarios autenticados (autor y superiores) carguen archivos arbitrarios como PHP en el servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/673f35ff-e1d5-4099-86e7-8b6e3e410ef8/", diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json index c54c6f3080b..768a9014f44 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json @@ -2,13 +2,13 @@ "id": "CVE-2025-5139", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T01:15:23.710", - "lastModified": "2025-05-28T14:58:52.920", + "lastModified": "2025-06-11T14:15:37.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in Qualitor 8.20. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in Qualitor 8.20/8.24. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php of the component Office 365-type Connection Handler. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 8.20.56 and 8.24.31 is able to address this issue. It is recommended to upgrade the affected component." }, { "lang": "es", @@ -22,11 +22,11 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 6.9, + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", @@ -36,7 +36,7 @@ "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "subAvailabilityImpact": "NONE", - "exploitMaturity": "NOT_DEFINED", + "exploitMaturity": "PROOF_OF_CONCEPT", "confidentialityRequirement": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "availabilityRequirement": "NOT_DEFINED", @@ -66,11 +66,11 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 7.3, - "baseSeverity": "HIGH", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", @@ -78,7 +78,7 @@ "integrityImpact": "LOW", "availabilityImpact": "LOW" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.2, "impactScore": 3.4 } ], @@ -88,17 +88,17 @@ "type": "Secondary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", - "baseScore": 7.5, + "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", - "accessComplexity": "LOW", + "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, - "baseSeverity": "HIGH", - "exploitabilityScore": 10.0, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, @@ -111,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5268.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5268.json index 33b02d6d223..a56d2a7bdd9 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5268.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5268.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5268", "sourceIdentifier": "security@mozilla.org", "published": "2025-05-27T13:15:22.610", - "lastModified": "2025-06-11T12:15:28.087", - "vulnStatus": "Modified", + "lastModified": "2025-06-11T14:51:14.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -67,14 +67,21 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", - "versionEndExcluding": "130.0", - "matchCriteriaId": "474427D8-84E9-4C4B-8B0B-D5961AF6B28E" + "versionEndExcluding": "139.0", + "matchCriteriaId": "E2C0FE7C-6F8E-4F1D-A768-914194586E0C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.11.0", + "matchCriteriaId": "1495D4C0-92D7-4384-8730-B59560AD0BEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", "versionEndExcluding": "139.0", - "matchCriteriaId": "2BC51636-40B4-4FB9-975F-CBF61A91A8AC" + "matchCriteriaId": "D3A0DDA7-A6CB-43C3-BF53-F21FFB089AD6" } ] } @@ -105,11 +112,17 @@ }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-45/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5687.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5687.json index 097c533190b..7eca2bf474b 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5687.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5687.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5687", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-11T12:15:29.023", - "lastModified": "2025-06-11T12:15:29.023", + "lastModified": "2025-06-11T14:15:37.730", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad en Mozilla VPN para macOS permite la escalada de privilegios de un usuario normal a root. *Este error solo afecta a Mozilla VPN en macOS. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Mozilla VPN 2.28.0 < (macOS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1953736", diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5958.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5958.json index b8f086312a3..73374ab5774 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5958.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5958.json @@ -2,16 +2,43 @@ "id": "CVE-2025-5958", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-11T01:15:20.890", - "lastModified": "2025-06-11T01:15:20.890", + "lastModified": "2025-06-11T14:15:37.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use After Free en Multimedia en Google Chrome anterior a la versi\u00f3n 137.0.7151.103 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5959.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5959.json index 1bc7951afde..09e23d05027 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5959.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5959.json @@ -2,16 +2,43 @@ "id": "CVE-2025-5959", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-11T01:15:21.030", - "lastModified": "2025-06-11T01:15:21.030", + "lastModified": "2025-06-11T14:15:38.037", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la versi\u00f3n 137.0.7151.103 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario dentro de un entorno de pruebas mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +49,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5978.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5978.json index 90dac497d61..d739c65cc8e 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5978.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5978.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5978", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T21:15:22.793", - "lastModified": "2025-06-10T21:15:22.793", + "lastModified": "2025-06-11T14:15:38.197", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda FH1202 1.2.0.14. Se ha clasificado como cr\u00edtica. La funci\u00f3n fromVirtualSer del archivo /goform/VirtualSer est\u00e1 afectada. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un desbordamiento del b\u00fafer basado en la pila. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.tenda.com.cn/", "source": "cna@vuldb.com" + }, + { + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-fromVirtualSer-20b53a41781f80b7a6c7e727f93d7d9f", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5979.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5979.json index 2d37f5db006..cec21015a0b 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5979.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5979.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5979", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T21:15:22.970", - "lastModified": "2025-06-10T21:15:22.970", + "lastModified": "2025-06-11T14:15:38.320", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects School Fees Payment System 1.0. This affects an unknown part of the file /branch.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects School Fees Payment System 1.0. Esta afecta a una parte desconocida del archivo /branch.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.592463", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/jiangffffd/cve/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5980.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5980.json index 3ba4614c64f..623ce4d27bc 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5980.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5980.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5980", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T21:15:23.150", - "lastModified": "2025-06-10T21:15:23.150", + "lastModified": "2025-06-11T14:15:38.623", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Restaurant Order System 1.0. This vulnerability affects unknown code of the file /order.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Restaurant Order System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /order.php. La manipulaci\u00f3n del argumento tabidNoti provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.592467", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/jiangffffd/cve/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5986.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5986.json index 84db0456ece..e5b12538fe7 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5986.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5986.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5986", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-11T12:15:29.183", - "lastModified": "2025-06-11T12:15:29.183", + "lastModified": "2025-06-11T14:15:38.880", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un correo electr\u00f3nico HTML manipulado que utiliza enlaces mailbox:/// puede desencadenar descargas autom\u00e1ticas no solicitadas de archivos .pdf al escritorio o directorio personal del usuario sin previo aviso, incluso con el guardado autom\u00e1tico desactivado. Este comportamiento puede utilizarse para llenar el disco con datos innecesarios (p. ej., usando /dev/urandom en Linux) o para filtrar credenciales de Windows mediante enlaces SMB al visualizar el correo electr\u00f3nico en modo HTML. Si bien se requiere la interacci\u00f3n del usuario para descargar el archivo .pdf, la ofuscaci\u00f3n visual puede ocultar el desencadenador de la descarga. Ver el correo electr\u00f3nico en modo HTML es suficiente para cargar contenido externo. Esta vulnerabilidad afecta a Thunderbird (versi\u00f3n anterior a la 128.11.1) y Thunderbird (versi\u00f3n anterior a la 139.0.2)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1958580%2C1968012", diff --git a/README.md b/README.md index 9552e498edf..af74368c331 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-11T14:00:19.698145+00:00 +2025-06-11T16:00:23.482082+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-11T13:58:02.947000+00:00 +2025-06-11T15:46:57.620000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297718 +297733 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `15` -- [CVE-2025-3302](CVE-2025/CVE-2025-33xx/CVE-2025-3302.json) (`2025-06-11T12:15:25.377`) -- [CVE-2025-49709](CVE-2025/CVE-2025-497xx/CVE-2025-49709.json) (`2025-06-11T12:15:26.977`) -- [CVE-2025-49710](CVE-2025/CVE-2025-497xx/CVE-2025-49710.json) (`2025-06-11T12:15:27.083`) -- [CVE-2025-5144](CVE-2025/CVE-2025-51xx/CVE-2025-5144.json) (`2025-06-11T13:15:24.823`) -- [CVE-2025-5687](CVE-2025/CVE-2025-56xx/CVE-2025-5687.json) (`2025-06-11T12:15:29.023`) -- [CVE-2025-5986](CVE-2025/CVE-2025-59xx/CVE-2025-5986.json) (`2025-06-11T12:15:29.183`) +- [CVE-2025-0163](CVE-2025/CVE-2025-01xx/CVE-2025-0163.json) (`2025-06-11T15:15:29.177`) +- [CVE-2025-32711](CVE-2025/CVE-2025-327xx/CVE-2025-32711.json) (`2025-06-11T14:15:31.530`) +- [CVE-2025-3473](CVE-2025/CVE-2025-34xx/CVE-2025-3473.json) (`2025-06-11T15:15:29.827`) +- [CVE-2025-35941](CVE-2025/CVE-2025-359xx/CVE-2025-35941.json) (`2025-06-11T14:15:33.797`) +- [CVE-2025-40914](CVE-2025/CVE-2025-409xx/CVE-2025-40914.json) (`2025-06-11T14:15:34.007`) +- [CVE-2025-4605](CVE-2025/CVE-2025-46xx/CVE-2025-4605.json) (`2025-06-11T14:15:36.847`) +- [CVE-2025-48013](CVE-2025/CVE-2025-480xx/CVE-2025-48013.json) (`2025-06-11T15:15:41.830`) +- [CVE-2025-48444](CVE-2025/CVE-2025-484xx/CVE-2025-48444.json) (`2025-06-11T15:15:42.143`) +- [CVE-2025-48445](CVE-2025/CVE-2025-484xx/CVE-2025-48445.json) (`2025-06-11T15:15:42.270`) +- [CVE-2025-48446](CVE-2025/CVE-2025-484xx/CVE-2025-48446.json) (`2025-06-11T15:15:42.427`) +- [CVE-2025-48447](CVE-2025/CVE-2025-484xx/CVE-2025-48447.json) (`2025-06-11T15:15:42.607`) +- [CVE-2025-48448](CVE-2025/CVE-2025-484xx/CVE-2025-48448.json) (`2025-06-11T15:15:42.733`) +- [CVE-2025-49146](CVE-2025/CVE-2025-491xx/CVE-2025-49146.json) (`2025-06-11T15:15:42.850`) +- [CVE-2025-49148](CVE-2025/CVE-2025-491xx/CVE-2025-49148.json) (`2025-06-11T15:15:43.043`) +- [CVE-2025-4922](CVE-2025/CVE-2025-49xx/CVE-2025-4922.json) (`2025-06-11T14:15:37.140`) ### CVEs modified in the last Commit -Recently modified CVEs: `21` +Recently modified CVEs: `58` -- [CVE-2024-27447](CVE-2024/CVE-2024-274xx/CVE-2024-27447.json) (`2025-06-11T12:53:35.083`) -- [CVE-2024-33117](CVE-2024/CVE-2024-331xx/CVE-2024-33117.json) (`2025-06-11T12:04:14.130`) -- [CVE-2024-33752](CVE-2024/CVE-2024-337xx/CVE-2024-33752.json) (`2025-06-11T12:06:35.033`) -- [CVE-2024-41588](CVE-2024/CVE-2024-415xx/CVE-2024-41588.json) (`2025-06-11T13:54:06.133`) -- [CVE-2024-41590](CVE-2024/CVE-2024-415xx/CVE-2024-41590.json) (`2025-06-11T13:49:57.290`) -- [CVE-2024-41596](CVE-2024/CVE-2024-415xx/CVE-2024-41596.json) (`2025-06-11T13:40:06.773`) -- [CVE-2024-9529](CVE-2024/CVE-2024-95xx/CVE-2024-9529.json) (`2025-06-11T13:58:02.947`) -- [CVE-2025-3877](CVE-2025/CVE-2025-38xx/CVE-2025-3877.json) (`2025-06-11T13:15:24.007`) -- [CVE-2025-49651](CVE-2025/CVE-2025-496xx/CVE-2025-49651.json) (`2025-06-11T13:15:24.483`) -- [CVE-2025-49652](CVE-2025/CVE-2025-496xx/CVE-2025-49652.json) (`2025-06-11T13:15:24.613`) -- [CVE-2025-49653](CVE-2025/CVE-2025-496xx/CVE-2025-49653.json) (`2025-06-11T13:15:24.720`) -- [CVE-2025-5263](CVE-2025/CVE-2025-52xx/CVE-2025-5263.json) (`2025-06-11T12:15:27.183`) -- [CVE-2025-5264](CVE-2025/CVE-2025-52xx/CVE-2025-5264.json) (`2025-06-11T12:15:27.373`) -- [CVE-2025-5265](CVE-2025/CVE-2025-52xx/CVE-2025-5265.json) (`2025-06-11T12:15:27.553`) -- [CVE-2025-5266](CVE-2025/CVE-2025-52xx/CVE-2025-5266.json) (`2025-06-11T12:15:27.730`) -- [CVE-2025-5267](CVE-2025/CVE-2025-52xx/CVE-2025-5267.json) (`2025-06-11T12:15:27.910`) -- [CVE-2025-5268](CVE-2025/CVE-2025-52xx/CVE-2025-5268.json) (`2025-06-11T12:15:28.087`) -- [CVE-2025-5269](CVE-2025/CVE-2025-52xx/CVE-2025-5269.json) (`2025-06-11T12:15:28.270`) -- [CVE-2025-5270](CVE-2025/CVE-2025-52xx/CVE-2025-5270.json) (`2025-06-11T12:15:28.457`) -- [CVE-2025-5271](CVE-2025/CVE-2025-52xx/CVE-2025-5271.json) (`2025-06-11T12:15:28.647`) -- [CVE-2025-5272](CVE-2025/CVE-2025-52xx/CVE-2025-5272.json) (`2025-06-11T12:15:28.840`) +- [CVE-2025-22996](CVE-2025/CVE-2025-229xx/CVE-2025-22996.json) (`2025-06-11T15:38:44.620`) +- [CVE-2025-22997](CVE-2025/CVE-2025-229xx/CVE-2025-22997.json) (`2025-06-11T15:35:40.463`) +- [CVE-2025-25193](CVE-2025/CVE-2025-251xx/CVE-2025-25193.json) (`2025-06-11T15:36:22.693`) +- [CVE-2025-26412](CVE-2025/CVE-2025-264xx/CVE-2025-26412.json) (`2025-06-11T14:15:30.987`) +- [CVE-2025-26521](CVE-2025/CVE-2025-265xx/CVE-2025-26521.json) (`2025-06-11T14:15:31.137`) +- [CVE-2025-2884](CVE-2025/CVE-2025-28xx/CVE-2025-2884.json) (`2025-06-11T15:15:29.487`) +- [CVE-2025-33053](CVE-2025/CVE-2025-330xx/CVE-2025-33053.json) (`2025-06-11T14:11:11.517`) +- [CVE-2025-35940](CVE-2025/CVE-2025-359xx/CVE-2025-35940.json) (`2025-06-11T14:15:33.690`) +- [CVE-2025-43697](CVE-2025/CVE-2025-436xx/CVE-2025-43697.json) (`2025-06-11T14:15:34.253`) +- [CVE-2025-43698](CVE-2025/CVE-2025-436xx/CVE-2025-43698.json) (`2025-06-11T14:15:34.417`) +- [CVE-2025-47713](CVE-2025/CVE-2025-477xx/CVE-2025-47713.json) (`2025-06-11T14:15:35.560`) +- [CVE-2025-47849](CVE-2025/CVE-2025-478xx/CVE-2025-47849.json) (`2025-06-11T14:15:35.727`) +- [CVE-2025-4929](CVE-2025/CVE-2025-49xx/CVE-2025-4929.json) (`2025-06-11T14:54:00.567`) +- [CVE-2025-4954](CVE-2025/CVE-2025-49xx/CVE-2025-4954.json) (`2025-06-11T14:15:37.287`) +- [CVE-2025-49709](CVE-2025/CVE-2025-497xx/CVE-2025-49709.json) (`2025-06-11T14:15:36.387`) +- [CVE-2025-49710](CVE-2025/CVE-2025-497xx/CVE-2025-49710.json) (`2025-06-11T14:15:36.527`) +- [CVE-2025-5139](CVE-2025/CVE-2025-51xx/CVE-2025-5139.json) (`2025-06-11T14:15:37.437`) +- [CVE-2025-5268](CVE-2025/CVE-2025-52xx/CVE-2025-5268.json) (`2025-06-11T14:51:14.950`) +- [CVE-2025-5687](CVE-2025/CVE-2025-56xx/CVE-2025-5687.json) (`2025-06-11T14:15:37.730`) +- [CVE-2025-5958](CVE-2025/CVE-2025-59xx/CVE-2025-5958.json) (`2025-06-11T14:15:37.870`) +- [CVE-2025-5959](CVE-2025/CVE-2025-59xx/CVE-2025-5959.json) (`2025-06-11T14:15:38.037`) +- [CVE-2025-5978](CVE-2025/CVE-2025-59xx/CVE-2025-5978.json) (`2025-06-11T14:15:38.197`) +- [CVE-2025-5979](CVE-2025/CVE-2025-59xx/CVE-2025-5979.json) (`2025-06-11T14:15:38.320`) +- [CVE-2025-5980](CVE-2025/CVE-2025-59xx/CVE-2025-5980.json) (`2025-06-11T14:15:38.623`) +- [CVE-2025-5986](CVE-2025/CVE-2025-59xx/CVE-2025-5986.json) (`2025-06-11T14:15:38.880`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 205ca394833..6e959eec02e 100644 --- a/_state.csv +++ b/_state.csv @@ -152159,7 +152159,7 @@ CVE-2020-18280,0,0,a9cfb6ea53a948cf0e342ecc74a2dca2fdaa7c7b9c577376593dea94ce260 CVE-2020-18282,0,0,fe4eba486f70f3a3cc1bb03e6652192f2f18e2129c2628985cfedb2aca0116fe,2025-01-29T17:15:10.627000 CVE-2020-1829,0,0,4400c1c20020eb794399c17dd64935689a5a7a7d2746f03b085f845dd3cb71c6,2024-11-21T05:11:26.960000 CVE-2020-1830,0,0,0ddce4b6a7b14fd50fb01fd83ac721a18ad075608807f694e075ac74b09960bc,2024-11-21T05:11:27.083000 -CVE-2020-18305,0,0,f3b0647b6159a86952b6442e3b6532af547f436496dadc4128ecdf1fe6d9110a,2024-11-21T05:08:31.600000 +CVE-2020-18305,0,1,78e88e61eeac2d0f895e6f06b9ee5211070c6670f420b83d3548d910f3b39c5a,2025-06-11T14:57:21.840000 CVE-2020-1831,0,0,bf047f809ce06f3652b0ad05858afab7c0a10d9bdd8deb5396a064f23b190d96,2024-11-21T05:11:27.207000 CVE-2020-1832,0,0,a5379d3de9d87ca1f4c2f3c869d9df03d88d520fc4adc307c04a099c784520d5,2024-11-21T05:11:27.330000 CVE-2020-18324,0,0,f27a404289abbb4dd3bff4d8964c2865181bea9a08ee9c8e021397de4d101543,2024-11-21T05:08:31.823000 @@ -185229,7 +185229,7 @@ CVE-2021-43893,0,0,83c2b062c1bf318433a78f16824511f05a8e975f4509d93564b2672be6494 CVE-2021-43896,0,0,5a5de57168b4daf05754a217ea61d4778ae325d6caa5a5f558b7b41691048a65,2024-11-21T06:30:00.013000 CVE-2021-43899,0,0,f98df78e0f6a9d56123d89aee7e2089e0298067fdca83f4ec45a79af53338ec4,2024-11-21T06:30:00.137000 CVE-2021-4390,0,0,f480971a47a33e54aadb44c3bfffba7d444515713962bf1728f577c64be9d2cd,2024-11-21T06:37:34.873000 -CVE-2021-43905,0,0,cb114456ba8acd11de724d84eef3dc3431add41fac4b657ee212db1d6b30528b,2024-11-21T06:30:00.253000 +CVE-2021-43905,0,1,3caa28adc749d6ee8faee4b16c19e43afb080bcde35d0f4090aa5ea92829fb13,2025-06-11T15:27:02.517000 CVE-2021-43907,0,0,84c7124b996d2741fd86d8fae9c03ba9e8ecb5e7f360f5baf94ec75222ca0e29,2024-11-21T06:30:00.367000 CVE-2021-43908,0,0,938da751d1a63ef167c78541cda960e411157cb3ab02ffb97d3ccd76c8075a51,2024-11-21T06:30:00.473000 CVE-2021-4391,0,0,820923a9ae9bad29e982f47ca4386e54fe0a49316963a7abf8a208f4d6872a69,2024-11-21T06:37:35.053000 @@ -235164,7 +235164,7 @@ CVE-2023-43586,0,0,0b179b1973420f89695bd4033aa5b4a7070a9f607b4d363509cf96797c77e CVE-2023-43588,0,0,779f8c46f256b6dc6c509095540e7cca1b778b261a9122490bb338004c250d70,2024-11-21T08:24:26.977000 CVE-2023-4359,0,0,c526edc2eda072a9f787def5c5634b44a07e8f184f5668a09865baa12054ef85,2024-11-21T08:34:55.737000 CVE-2023-43590,0,0,a24b0a4d4fbd849cf9c8576934def2996908e56c45e589c0a4718de3c52b705a,2024-11-21T08:24:27.107000 -CVE-2023-43591,0,0,7089bdd917ed1a6d5c9808def1f484fb67c2e6a88e9a9ee81ab645fde8d2e80f,2024-11-21T08:24:27.223000 +CVE-2023-43591,0,1,861183d95cbe5163fd4eaffaf48e44beda937f7ad3929622dbe4bec2b13503ba,2025-06-11T15:15:26.057000 CVE-2023-4360,0,0,bf776b564f3d9f4caa1d912b4d5307249bcc398bd846123f845e5bb5ceeeb373,2024-11-21T08:34:55.873000 CVE-2023-43608,0,0,6c27dbdafa55f2b7aa33c3b628ee6a7a91ecbd84b5bb3689ac1f00133224f13b,2024-11-21T08:24:27.367000 CVE-2023-43609,0,0,75f30095c4f4e4e457e17ae12eff03d46c5fbd1c1d424a29e6514e4d8050cc7c,2025-06-10T19:15:26.357000 @@ -237500,7 +237500,7 @@ CVE-2023-46845,0,0,8cca69f35c18b37d1e400c1780d51f45ac93f2d00dcfe2123c24403e52459 CVE-2023-46846,0,0,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000 CVE-2023-46847,0,0,25226d6c3ea5f3ae387efea28db924389911d043f96c3ee615accfee7a912619,2024-11-21T08:29:25 CVE-2023-46848,0,0,fc1a3cbe733e7d75d5767c3bf972500d8208d1d249d69703d688044c0e53a543,2024-11-21T08:29:25.190000 -CVE-2023-46849,0,0,d939db9ad23b15e2c76e72ad352b3bf6d630c9fe03bd4a9ee0d93213deca79b3,2024-11-21T08:29:25.337000 +CVE-2023-46849,0,1,feab4a74864884fe4c1f0bc90f1c801b388b79ae3c68ce83cc030b25eae0192b,2025-06-11T15:15:26.793000 CVE-2023-4685,0,0,01f57904079cf1486cf9c3b39be3f5ef970724886f67adcadb32146d37100d87,2024-11-21T08:35:40.977000 CVE-2023-46850,0,0,d3e49645b8e5224f7ccc9a68e9bc661c5d6870d2a7540848cc979d9532ef9df1,2024-11-21T08:29:25.480000 CVE-2023-46851,0,0,95521f9ee5bfe22433c7bdb3d910a9994749139964e2e9dc9b9f71db17626997,2024-11-21T08:29:25.597000 @@ -237848,7 +237848,7 @@ CVE-2023-47325,0,0,64c4a3c263fdb1b7b2856ddcac672fcec2e6bdc32fd55784f6f9223aa35de CVE-2023-47326,0,0,f8ae019487cdb5a73bdaf9901b0c7c8370bd0eae62e999d224b4ead1cd422864,2024-11-21T08:30:10.017000 CVE-2023-47327,0,0,7e1735cd8110b984c51f8790c647d737852287cb7ddabda3f7101ec50e44b751,2024-11-21T08:30:10.157000 CVE-2023-4733,0,0,f64bc1cd14515c3e2f0ffd57a2c6ddf0ebb49770cbcd875940ceea7d5922513c,2024-11-21T08:35:51.280000 -CVE-2023-47335,0,0,d507cff56867e141e9b35e917d642811138f4f3418bbdb0b2bda100510e4ec09,2024-11-21T08:30:10.297000 +CVE-2023-47335,0,1,7f0f1b3ede790346f8fdc95c28bd4aafa8ce52c0d8ba1eb98786b97523ac59b0,2025-06-11T15:15:27.043000 CVE-2023-4734,0,0,fa674d9bfa6149b4cd75315307dcee77ad9f41f1eb4299d08b9ed964b7651e72,2024-11-21T08:35:51.477000 CVE-2023-47345,0,0,c1afca5fed4bd2fea915f1410e3af656e88ec1a4f8a86fac2c05cfee6023b97a,2024-11-21T08:30:10.440000 CVE-2023-47346,0,0,f0345c801d164d12b269122c80a5ca2bc3338a6ea8f01bfc839bdd5327c36e73,2024-11-21T08:30:10.577000 @@ -237922,7 +237922,7 @@ CVE-2023-47471,0,0,32f43880fab73f05f590bf4ae7a80f5aae9c2e32aa967e7aee7491151341c CVE-2023-47473,0,0,d622eae7627e9a5cab25305aab5189a781012f765170cec24ebf78583cecf7f9,2024-11-21T08:30:20.240000 CVE-2023-4748,0,0,8663095fccf5eff2d0970e24775dfab925ddc57ca3819cd539c72d83d5072af8,2024-11-21T08:35:53.580000 CVE-2023-47480,0,0,5f1bc70735285e7f17e688622b8302ddd92cfe9fa40c1ad6149d2b2ea01d7f12,2024-11-21T08:30:20.460000 -CVE-2023-47488,0,0,1530eb6da15eb63c7f014815704b70974b4f5a7e99aa62f9d0484837b8894197,2024-11-21T08:30:20.677000 +CVE-2023-47488,0,1,1e55d1d8648bcc44ad730e4706833754dd03b7c6f8a0dbc969fd67bb265443b6,2025-06-11T15:15:27.260000 CVE-2023-47489,0,0,e90a28b4fe0f175eb4ea0e3160524e16396ee8b9ead64f7259cb2e16cf8380ac,2024-11-21T08:30:20.820000 CVE-2023-4749,0,0,ca6e00963a427aee3acbbc8d24dc61f96bd67c4c853715d4eab60b5c01e7a8e9,2024-11-21T08:35:53.720000 CVE-2023-4750,0,0,9d45405700fae72668fa764ee604d5c3a396ef6133cf85d1aafea757c35ead25,2024-11-21T08:35:53.867000 @@ -238085,7 +238085,7 @@ CVE-2023-47670,0,0,7645b4d9cd07d33c825e377864a7ee069ca2942aba7ebaf883928a7f6bf6b CVE-2023-47671,0,0,150f2889cf9716f4330007aabcea7dc3947d225a0fdf861656db93facb2c4aad,2024-11-21T08:30:38.880000 CVE-2023-47672,0,0,7a32ee70b53201a29d0fb10a0628e7c1f353340f632da50099e170710e302eff,2024-11-21T08:30:39.013000 CVE-2023-47673,0,0,521b4a22397c0b0b603c5b9c441b52d38a22242d3767568bb9889bfd3c0299c3,2024-11-21T08:30:39.140000 -CVE-2023-47674,0,0,13e92f1c68ee32fccae49e819128ad8764f72000557cd58de7f6c9bd5ef885b3,2024-11-21T08:30:39.267000 +CVE-2023-47674,0,1,8588486fc47222e8a69584a304b545b0c53386704bf80ce94bb3abfdc7b41fc8,2025-06-11T15:15:27.487000 CVE-2023-47675,0,0,c86344aaed815eec4ee17290ba6358516495f8d51a918dee1a4e4b6eee2fa5fc,2024-11-21T08:30:39.423000 CVE-2023-47677,0,0,3caebbd65cda08c6ddb656fd37c737c3e9211c156e00b441627180836d2293b8,2024-11-21T08:30:39.543000 CVE-2023-47678,0,0,bd43ee5401534c70b4dd1db98e6c2d8e8ef452acc10c37d537580fa6a5a6a699,2024-11-21T08:30:39.673000 @@ -238386,7 +238386,7 @@ CVE-2023-4819,0,0,071e675aad05bfa8cb649b9b25d4c0c3f5a75f8cb8287b9cc5279791856262 CVE-2023-48192,0,0,4240cd8250bfc3eb14f439d678088098f9702795e0b43f8d895e1ca458b6137c,2024-11-21T08:31:11.440000 CVE-2023-48193,0,0,527bc3f183def1e9c17e3340d1cf773745c4085555f2641c3faa604e93f7ac4e,2024-11-21T08:31:11.587000 CVE-2023-48194,0,0,89ed483ac6c22c85dd7489b795e294c3a4fb1883ed272f16d543b939692756f7,2024-11-21T08:31:11.740000 -CVE-2023-48197,0,0,541e2e2dbadf4c1fc33a37b79d38875bdb81d89915a88dc61cd7177cc00c0dd6,2024-11-21T08:31:11.990000 +CVE-2023-48197,0,1,2a8d5fa0eeb5fb5d829e67c9d58f8f5cfd2ad44c21835b251cbbd84f8b166774,2025-06-11T15:15:27.713000 CVE-2023-48198,0,0,e914d510dc94ba3802fedfbde5ce0c09e7bbfb1ed10c2616609647a73a58c5bc,2024-11-21T08:31:12.140000 CVE-2023-48199,0,0,02d93cf4dc9ab71c968304332cfbd654d91ace976c5191aacfefe4728b8d3636,2024-11-21T08:31:12.297000 CVE-2023-4820,0,0,a231d8e236cec098509c357874409b1b9aff7f97a915cf7a95f688fac9290237,2025-03-05T17:15:12.883000 @@ -247569,7 +247569,7 @@ CVE-2024-12426,0,0,e28649f93ee0f137724688a87f52bd9672834bc574f6f02af35105ba38dad CVE-2024-12427,0,0,86507f7f094bd68cc6d848d7d1a03f7517cc83f79982983f55ec3c43fb57f866,2025-03-04T17:24:20.370000 CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000 CVE-2024-12429,0,0,df12f7abbef94c2382f1dae8fbc46ef25fa72524515700b274279ec69b985d4c,2025-01-07T17:15:20.527000 -CVE-2024-1243,0,0,6ca5350df3abbfb06b377ab24d0559ebadb310b91ffad1201598980b13c2dcc7,2025-06-11T02:15:20.270000 +CVE-2024-1243,0,1,390c6bcaa6fe14d46e623a93ee7f54c5976f87585670b1e2585fac75e06a0df6,2025-06-11T15:15:28.230000 CVE-2024-12430,0,0,3623fd73564e8c219fafc425eac3c2c16708d4d7c0f61297e30059f08601a297,2025-01-07T17:15:20.703000 CVE-2024-12431,0,0,5644edd69c348df2239cdc93e705cfed1755dba38cc5e3639c6fa22724a9f624,2025-01-08T21:15:11.760000 CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000 @@ -249052,7 +249052,7 @@ CVE-2024-13861,0,0,360211110586d48dd70dc723db2b58a14ced33576691ad94d58c50e823722 CVE-2024-13862,0,0,a57c4fd8f73c8f2ef94b8d9a3f5417da4d83ca39674a155ef66d664233e36faf,2025-05-21T19:33:15.200000 CVE-2024-13863,0,0,c7caee7e5c93d81b9af8b0138e75c688fb9febb3d7538b5b3534c3b224573bb9,2025-04-29T17:35:22.800000 CVE-2024-13864,0,0,c8005b10478f0295163ea4c5800d8b7b3333680590f2b8cc9e73f5cd9636efe3,2025-05-06T15:05:46.537000 -CVE-2024-13865,0,0,43bd178e19baead4cb7ac71c7cec0c8d0b10d0e9d09c994c9739aa715cdd0945,2025-05-20T20:15:36.660000 +CVE-2024-13865,0,1,50363ee1a4dd2aad050e587c8479124b097c749bbfa0e978e0deb9bccb0eac8f,2025-06-11T14:55:38.617000 CVE-2024-13866,0,0,a701a4a58094c13382e4ccc07ff53f8edcaa8a7b85d65b60e80e37b7129c441c,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 CVE-2024-13868,0,0,5f90da423a6fd804019ae30399be671545219c7108740f7ff15c5b00d0b55e4b,2025-05-21T15:28:50.360000 @@ -249401,7 +249401,7 @@ CVE-2024-1659,0,0,89ae27a5a9ba7c42d9a91c4b580358dd8ae6b774fde1ed1f21377fc2426997 CVE-2024-1660,0,0,bcc7a96f40649c3702a4d488bfefc13113e0fc4577fc23a0f7fcc4b75f320a14,2025-05-08T16:48:49.267000 CVE-2024-1661,0,0,57419dfac19fc8b1117ab03280b3c2a88810749b66775f5fc9b43a910e481cd7,2024-11-21T08:51:01.803000 CVE-2024-1662,0,0,147b493f649bc748f75384551192827ffc56f17812a25b829b7ebf0a1ed43a45,2024-11-21T08:51:01.957000 -CVE-2024-1663,0,0,18b59c28a9054f4610ca76e76fd8125e8b963a367dbb4128ba7f29df0d0e6592,2025-05-20T15:16:03.367000 +CVE-2024-1663,0,1,399541b36c7116de33186c7cee0ffafbb6e6d644b9c5d194c0e56fd4b5a72071,2025-06-11T14:48:53.673000 CVE-2024-1664,0,0,1445c655402916291b15040a6ae8d2de79ad43087a8039e72ecfdff51d852516,2025-05-13T00:44:51.903000 CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a098,2024-06-07T17:15:49.850000 CVE-2024-1666,0,0,089335f87a6dcbe16f454cd776a838285b6d754521e9a0f8137d17bef352cfba,2025-01-10T14:34:01.473000 @@ -254763,7 +254763,7 @@ CVE-2024-2639,0,0,45a532020fe06674d823d0b4e264d15e0ee33a5111617c7171979d4c53ef78 CVE-2024-2640,0,0,2d97cdb3e462b6f0c784d4db1a7d7c20cbceea5fa11206e832577d8c929d2bf6,2024-11-21T09:10:11.623000 CVE-2024-2641,0,0,70a70be0b042731ccdc73536925161bf9a9aa50cb2b7e715353e185314654c4e,2024-11-21T09:10:11.820000 CVE-2024-2642,0,0,52ad972556cc065c34954675f727e5508f8caab5590185ce6cde82cc71dc74fb,2024-11-21T09:10:11.963000 -CVE-2024-2643,0,0,ce30534635125a64f23d3444d51d6d5c210731228d7b19e111eda7d15cdd9ea7,2025-05-20T15:16:04.070000 +CVE-2024-2643,0,1,05a64080cba78cf699d29a6069ac5af707170ffbce5faa54487afbdb0e9edb1e,2025-06-11T14:45:57.147000 CVE-2024-2644,0,0,4048e8752f27add71acd228a0d07e2962cd563fe85cb710df0b865d642724f8c,2025-02-07T15:07:30.080000 CVE-2024-26445,0,0,1e1692a3ab92c100abf93e1b088c041121edd2a6fdb5057ec8a7e9ed1a7b0946,2025-03-25T16:59:36.567000 CVE-2024-2645,0,0,6fb823d4a9b88e90db41973fcb8e2b731f2971c605b6e0b00e416d679a1621d0,2025-01-30T15:39:23.947000 @@ -255746,7 +255746,7 @@ CVE-2024-27441,0,0,8627ee176bbd8db9047f0ac2824f85227251736cca8356f59d7164883e716 CVE-2024-27442,0,0,b113225cd79b3d0b44b8bc15a83e3bd1b29f742e07843ffbf5a451ca58f7ad33,2024-08-13T17:30:36.833000 CVE-2024-27443,0,0,3c0a90cacc761474c320235ca1b019a4cad7bf02e5db3b5bcee9676fec4b0c87,2025-05-21T18:43:52.287000 CVE-2024-27444,0,0,f2782679746ac825122096e332d365a1377f937908fa850657f47ae7562722ec,2024-11-21T09:04:37.470000 -CVE-2024-27447,0,1,f6d6d9fad48a31686fdab5f9950d31651bead604f5590caf8910094e154c5642,2025-06-11T12:53:35.083000 +CVE-2024-27447,0,0,f6d6d9fad48a31686fdab5f9950d31651bead604f5590caf8910094e154c5642,2025-06-11T12:53:35.083000 CVE-2024-27448,0,0,8d84df435d462af3b84b4a4f1503868d7e64fb34bcf7329beab88ef9e1029260,2025-03-13T15:15:42.293000 CVE-2024-2745,0,0,28743d3482c4dc2cc7e95a6a28bdb765faa2729a76e91dd4c556600c182f0f12,2025-02-25T18:36:41.020000 CVE-2024-27453,0,0,d7a686cd701b8be9d28be91ce51b1a48b487049402a86408c25fdcdc51bc0bfb,2025-06-10T17:58:18.297000 @@ -255827,7 +255827,7 @@ CVE-2024-27623,0,0,0b8613e0438e050befc8caafef4caeb2c7fedf67a19158500b4830afaf3b8 CVE-2024-27625,0,0,6b594fcfc101fa835d824b87493f4b5d8cf00a7664f013cc884858d547c79926,2025-03-28T16:07:53.420000 CVE-2024-27626,0,0,9a1abf5d0b8cb2d3b863768b43ec83911190b875da99fdca947dfb8d0f43eff6,2024-11-21T09:04:49.480000 CVE-2024-27627,0,0,64e619d9251dac6d6016764b95186a6975a71f8714a3967a40144f57f22acc23,2024-11-21T09:04:49.697000 -CVE-2024-27628,0,0,1f8afca8560984d1e89d56d5ba3d725ffacfb46d6fb433f79a414003de710b28,2024-11-21T09:04:49.920000 +CVE-2024-27628,0,1,46387e1fb6677fef5f092ea931a292681d4b56138363088d2c6117deec1853a1,2025-06-11T15:22:56.587000 CVE-2024-27629,0,0,925d6c515470e75988e5c00e502d5ff2d6b8836f5e5c3c8e1facf7db93bb0b30,2024-11-21T09:04:50.130000 CVE-2024-2763,0,0,3f18bfa4fd358968aa90c50d9ee28b19b5412989c011c855e39ada9c410ddc2c,2024-12-12T17:31:50.877000 CVE-2024-27630,0,0,87a64c68353f0154cf4feee5b64e5623b367aa0302eeabb3b4300ca1b5a106e5,2025-03-13T17:15:30.070000 @@ -260018,7 +260018,7 @@ CVE-2024-33110,0,0,6ffbc94f167a52dfbd0ed621b524235b74f27a94f81d2620691ca07e335ee CVE-2024-33111,0,0,17f4a588b6771453aae4fc0d8fe54488d2c27b36ab3b37893b9ded6fd2912f18,2025-05-21T13:02:32.660000 CVE-2024-33112,0,0,f8ad2bcf8d7e340ab8b56d4ec4e1bfe3463c718134abce8b16f9a87aaa63e418,2025-05-21T13:02:30.203000 CVE-2024-33113,0,0,7cf7987cc0dd6caecd85afedffd5aa13c551f5a0cf5e90dfd19e9f43dd0dd370,2025-05-21T13:02:27.457000 -CVE-2024-33117,0,1,528352eca85edaf59d5ef88e311d6c940ccae0f464a8c238d0cc95b7c6f9cd01,2025-06-11T12:04:14.130000 +CVE-2024-33117,0,0,528352eca85edaf59d5ef88e311d6c940ccae0f464a8c238d0cc95b7c6f9cd01,2025-06-11T12:04:14.130000 CVE-2024-33118,0,0,72c8999c88c2b5558e4a8f33a58e566f4eb8caa38d2e54a61703d28769d04715,2025-06-10T19:43:40.383000 CVE-2024-3312,0,0,5f7abfea07e26708b46deb725eba9cf7ab27075e45367056ede9366567e02312,2024-11-21T09:29:22.277000 CVE-2024-33120,0,0,6059ae7834dce7456d75514ab19c32a74ce0bc8de7f67b7ab7f5e8e4997c2e7a,2025-05-01T14:55:22.393000 @@ -260413,7 +260413,7 @@ CVE-2024-3374,0,0,420f73150af02275166b9c440c567922c144b0ea7f73169b89eb730ef81c3a CVE-2024-33748,0,0,acc248d0cfbd8692cea48635d656011bb983fa9bd242614a24fa39140acf6529,2024-11-21T09:17:26.140000 CVE-2024-33749,0,0,2749a1eef01de8a6200de4cabc78dc3e00a5a4d8cb932c669d1e90435b0ca346,2025-04-01T18:05:32.370000 CVE-2024-3375,0,0,9705036410c25948012494141e27b48a4ee424b1500d49272b52c98930b4fb01,2024-11-21T09:29:29.443000 -CVE-2024-33752,0,1,cb9a92a990be6bf2f2831adfde5bc6f3b734cb86e9dd2d39a6e6c3426345c897,2025-06-11T12:06:35.033000 +CVE-2024-33752,0,0,cb9a92a990be6bf2f2831adfde5bc6f3b734cb86e9dd2d39a6e6c3426345c897,2025-06-11T12:06:35.033000 CVE-2024-33753,0,0,d6dd9a560aacef7fbfdb8e582f966b14086954aa85705d5f248034003e649ad3,2024-11-21T09:17:26.740000 CVE-2024-3376,0,0,d0b726129a0cb4aa357ddbea81c1414fafc204c7b2176615db21f058e6802519,2025-01-17T17:41:21.647000 CVE-2024-33763,0,0,efdd783f0638df5aefc0de37545ea93326aee139131b46e1d8e52abd6f3fb384,2025-04-15T17:14:08.027000 @@ -260434,7 +260434,7 @@ CVE-2024-33782,0,0,7fd2e15e493f98e5511ac2818217f87418960726424b1be6b5b59f20ba784 CVE-2024-33783,0,0,3efb6717dc071bcd4966a7972f6670fd4553a3d85347d37b83769ae70d5d4aa4,2024-11-21T09:17:29.247000 CVE-2024-33786,0,0,e1fb385dd8747da32e59253a9ffdea319cd8cdf03f2ca73f386cdc040ae670ac,2024-11-21T09:17:29.420000 CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f0a5,2024-11-21T09:17:29.593000 -CVE-2024-33788,0,0,43883aa11c8f8d9e2b0e9c2a3228de314f0cbb5388933699b91e2c176c156f8e,2024-11-21T09:17:29.797000 +CVE-2024-33788,0,1,d9e631d68ae2203702b7e708decaf819d9af63c25e4d0516bd7f43a761e5472b,2025-06-11T15:39:33.297000 CVE-2024-33789,0,0,5986e92c6ccb4c451262b2b9902891f0ea70e1b2b0fa3b4355e2c35998fcde42,2025-06-10T18:01:58.607000 CVE-2024-3379,0,0,ff4b29a94fdd9578584432ff10eeb3895455cc484ac7d59b569ca6f419a0ff31,2024-11-18T21:30:49.947000 CVE-2024-33791,0,0,cd712f1b08608ec404f57f0c2d9228e781ce3c7f5333a295e303b9e9ebade340,2024-11-21T09:17:30.170000 @@ -261005,12 +261005,12 @@ CVE-2024-34488,0,0,1c8363a756b1db7c16aa9d13bb9481a58a515d14b8b4ad97e6464e737eefc CVE-2024-34489,0,0,e38724172e0a0c52a247f1048d162135594d6d51d73ed3946e5efab6231bf9c3,2025-04-15T17:39:08.930000 CVE-2024-3449,0,0,e1530ccb36d47a9f2f107bc6ba4716b9b546171ff116ec5264773a56f263e670,2025-02-11T02:15:34.650000 CVE-2024-34490,0,0,99bee308a871b5c1e5cc8ac5d90e0aff0732098a9a5af8f52bdfc4827b12fbed,2024-11-21T09:18:49.207000 -CVE-2024-34500,0,0,ad0d4277fb282ffeba130e48b29d422feab82a804fbd90a55147b70fa341bf7e,2024-12-04T21:15:23.877000 +CVE-2024-34500,0,1,890c3fc863628ee6244d3590d0d4f94a07e3f72d4f15b7f39f4ce19c729fc4da,2025-06-11T14:44:14.040000 CVE-2024-34502,0,0,76aeea82543e0b722fdedcdb5720bd94dbdd5a58653d6c0fe9797dd2b1c558cc,2024-11-21T09:18:49.567000 CVE-2024-34506,0,0,765d28adb88f0afe403385b61b81ec66e649746dec0e99fdef13c9e005ff0645,2024-11-21T09:18:49.790000 CVE-2024-34507,0,0,d148d49269b067aac1ed2e5c7c327d93c5f56910a5e7ae430eca8a9fbf2ef9eb,2024-11-21T09:18:49.997000 CVE-2024-34508,0,0,c837d85f215debfd4876cf202e711a6ae35fdcbae2f4f24a57d2ef7ef10c5af2,2025-06-10T17:44:33.870000 -CVE-2024-34509,0,0,18b67055124fa20b0e91c183169f58ecae6378de7abdd8b999f1e0307f71e986,2024-11-21T09:18:50.360000 +CVE-2024-34509,0,1,244a1e513fdb31a71b9a2847887cf351dcaa2d407387468ade35178704c29e41,2025-06-11T15:35:22.570000 CVE-2024-34510,0,0,0cd296a8ed9ad583e4681fc3af8f3a5c25699e2d2db65e494d34dafe2b8c0615,2024-11-21T09:18:50.597000 CVE-2024-34511,0,0,c1d20a47728b6c5526364d02e8958d8fb0539448423cf5c76333bac10d97f143,2024-05-14T15:39:15.780000 CVE-2024-34515,0,0,b2a5f6a619eb7e9f032aeb367dbb16cc9eea3104e0bc1ce005d69ffe8c66635e,2024-11-21T09:18:50.773000 @@ -263350,9 +263350,9 @@ CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d7 CVE-2024-37391,0,0,83604059a0a3493e2890c3d7d2ec3ff1f78123fc0b5c774b0cb9659167e26236,2025-03-13T15:15:45.533000 CVE-2024-37392,0,0,2ddcfdda121ccf673d3c3575ba342373b49a9baac2c6a11d1f9b50a7a51a719f,2025-03-20T14:15:19.487000 CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000 -CVE-2024-37394,0,0,8659e7677c2e6a6b5663456a11183774f367d0f5f5c99a0e7ee7c8cc4159dda3,2025-06-10T18:15:29.527000 -CVE-2024-37395,0,0,fbc3f124796da6de01089ac670eed86fa687af889d780a1b50b5136c8c1fa4d8,2025-06-10T18:15:29.660000 -CVE-2024-37396,0,0,ecc5302a6eb03fa788bfa1b2bb89251461d308c62303a273d379d93f827194ba,2025-06-10T18:15:29.773000 +CVE-2024-37394,0,1,c396580351084a76f64893ffc3fbae6cbf4d916fac300f0625e760c38ae7779e,2025-06-11T15:15:28.363000 +CVE-2024-37395,0,1,9b1b4238374b8a3a078af760cc5f8279324e38e6bdbc11e60f9342e52b652c2b,2025-06-11T15:15:28.567000 +CVE-2024-37396,0,1,f604338138787f47fc5eafce537dc52b61f551d3945633e08dc1ff1b419d3eb0,2025-06-11T15:15:28.753000 CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000 CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000 CVE-2024-37399,0,0,91513a99b1995bb678a44db233b24968cd7625f00c77086c4c8d80914d8fefca,2024-08-15T17:31:49.067000 @@ -264896,7 +264896,7 @@ CVE-2024-39316,0,0,45ccc4606c1ced74f32c315d82c11378f05d7721ddef5999e7262273275ce CVE-2024-39317,0,0,a0fc4d71b5cabdaeb3b999c76cc981eac10eecf8294b24aaf6ecf119a554904f,2024-11-21T09:27:26.850000 CVE-2024-39318,0,0,6764e76c817e87d695ea3993b86a3354d209bb056859b5c07dcb19565385d010,2024-08-01T12:42:36.933000 CVE-2024-39319,0,0,6b3c8929f0aadf0dfeafabdb305420267b5eaf52a130cb6d182c3fd60933f087,2025-03-05T15:16:44.403000 -CVE-2024-3932,0,0,e1e6e934d506d463f318dcd7b6195b8fede3f030a5382e5fa87592a6b9829b2f,2024-11-21T09:30:43.703000 +CVE-2024-3932,0,1,bf553d895b692d20f52023342a9d74746f30bd6954940b547fda40e0807d0ed4,2025-06-11T14:15:29.120000 CVE-2024-39320,0,0,e4877e1d00ea378952f1c53c996ffb9e5141d5f98d9781e6944ef5bef1cdbd3c,2024-11-21T09:27:27.230000 CVE-2024-39321,0,0,801cf361a46239e192f4acfd721bba0cfca689a711cbfe4c715ecc082a7cb3ff,2024-11-21T09:27:27.390000 CVE-2024-39322,0,0,68c3b3a36d7457c8578c4e6cf1f0ffa507f2e1e008544080cce5882e03d76176,2024-11-21T09:27:27.537000 @@ -266451,10 +266451,10 @@ CVE-2024-41482,0,0,0a596a5cf7b27067c86547cf8e385cb1be782f18b5f9b3af58ba9ccf7350b CVE-2024-4149,0,0,ce35c5dabaf9e62f62b27cc2db90363703ad2249bc96cfb9d4c9aa830d3e1498,2025-03-26T15:15:52.433000 CVE-2024-41492,0,0,0f8b4f7028b46594d815901b3c46f498a5d62420cc14f100e4b212c233005a09,2025-04-07T17:27:14.087000 CVE-2024-4150,0,0,2e8c0a57bcb392581939b062355027d1d8486c47fcac2388b6838611dbf235a6,2024-11-21T09:42:17.333000 -CVE-2024-41502,0,0,5029d7ae53258a3cbf50ec4c92c2614074d439128dd03a3ee865a2a5eaf5fd4d,2025-06-10T20:15:21.470000 -CVE-2024-41503,0,0,3f2bf3e731d782e3e7ef0d8c1c0b40b826a768bdc0773a433e02bd2f6c25b5fb,2025-06-10T20:15:21.610000 -CVE-2024-41504,0,0,37067d42d1b425849206a99c4fa3d1a775facce230487c29a50bf5bc10a01177,2025-06-10T20:15:21.733000 -CVE-2024-41505,0,0,123247ab5738cc46457400910d8683f2f005356335856263f36c4cc9a0d308a4,2025-06-10T20:15:21.850000 +CVE-2024-41502,0,1,035d055d0e91c1527d137373b8062b2150c5cd7aa2dc7be14e3cacd66fa5a35e,2025-06-11T14:15:29.773000 +CVE-2024-41503,0,1,8da4af5d3a50d54b27269f49fa1056a51abe7cb78e69c01744b410880ee07958,2025-06-11T14:15:29.950000 +CVE-2024-41504,0,1,cce64627de2833ddfd9a8fa00aa06bb5e2cfad2aa56ce998456ee0b655d2b2e4,2025-06-11T14:15:30.113000 +CVE-2024-41505,0,1,38b74bf275a77be87813a8a3b3a4c994cb401dc3608de63a6be612a5f2abcf29,2025-06-11T14:15:30.277000 CVE-2024-4151,0,0,337c26dffc6a0b1164159cb60fac00060ef9443ae253113be62690b03c8c28be,2025-01-31T11:15:10.620000 CVE-2024-41511,0,0,6347d6e8bdca9e61881aa8b3e3ce915cd91cf5be437f01825e5d12236e6d66dd,2025-06-02T17:41:35.250000 CVE-2024-41512,0,0,6c48f03f5a62a673b28167efa2657e1883db56964e6cb4fe91d57cc6cf6d0d2b,2025-06-02T17:40:46.877000 @@ -266485,16 +266485,16 @@ CVE-2024-41584,0,0,8ee9ae082d5209bf32a9612fbd142972ee3d4ff51fed2ea5dd87a62b3ae6a CVE-2024-41585,0,0,f603abcc7adc50c0f0418039db97e6157e5d644c828ff6d6a43a1148e2cbdcd7,2025-04-10T13:41:39.553000 CVE-2024-41586,0,0,2ca5c96a0d26f43109380a195dfb7e58cb016f80ea656e1dca0934dfc33fbe62,2025-04-10T13:41:46.850000 CVE-2024-41587,0,0,49423dacd1b4227d5ab73e5f650b6e45277b0abc6417b9dfb6a350665edb1b90,2025-03-18T16:15:22.733000 -CVE-2024-41588,0,1,43c1fa557b9ca13f5d6e637d1577733d0e70b7fd248ce3a14c85fc6e91bf133e,2025-06-11T13:54:06.133000 +CVE-2024-41588,0,0,43c1fa557b9ca13f5d6e637d1577733d0e70b7fd248ce3a14c85fc6e91bf133e,2025-06-11T13:54:06.133000 CVE-2024-41589,0,0,e9c30a32e1d5bd5f4b6364fc650d57d72e5e61f9fa07da023f0932b49a18787a,2025-04-10T13:43:37.377000 CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000 -CVE-2024-41590,0,1,4bd11c0a5a16ea227fdd8eebb5961a9e31a379af597a578b269e3cd5b756015e,2025-06-11T13:49:57.290000 +CVE-2024-41590,0,0,4bd11c0a5a16ea227fdd8eebb5961a9e31a379af597a578b269e3cd5b756015e,2025-06-11T13:49:57.290000 CVE-2024-41591,0,0,fbe56be2c7d21e58694890c979fd5b2525d6606e74bcf44af4f4eb9ebfc7cb62,2025-03-14T16:15:34.730000 CVE-2024-41592,0,0,da34ad5373a3e4f26de17396b443b16c2b3db924958258ea30640b9d1bddd551,2025-06-03T13:52:04.560000 CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c063,2025-03-13T19:15:47.260000 CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000 CVE-2024-41595,0,0,55147bb2c7f980be0e8dfce69050f7ac0e8d3bd44beedc81b56dc3a9145dbb12,2025-04-10T14:37:24.073000 -CVE-2024-41596,0,1,4c9a2c20ad07ecda2ee244a2fc0a6001029f77098a96d1bb2f0e364c0927f005,2025-06-11T13:40:06.773000 +CVE-2024-41596,0,0,4c9a2c20ad07ecda2ee244a2fc0a6001029f77098a96d1bb2f0e364c0927f005,2025-06-11T13:40:06.773000 CVE-2024-41597,0,0,8bc3478a40fad9fe08a5b14f99fcfb65827e68ea30f05fc2a19957f05a35e7ba,2024-11-21T09:32:49.140000 CVE-2024-41599,0,0,19010d159a05e51c251b0e87e5efe7d7695f4c30ed161561b8ad7fb41917cdd4,2025-03-19T18:15:21.827000 CVE-2024-4160,0,0,77018d19c3c59babab69bb4c4bd714918ace7f45db9fbec548c4760db9a196a9,2025-03-21T19:16:41.813000 @@ -266864,7 +266864,7 @@ CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447 CVE-2024-42006,0,0,757a5058e2b20a07332e18e1715746958f2fc29b54fe8104fb4e99ba507aa82a,2025-03-18T20:15:23.103000 CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000 CVE-2024-42008,0,0,de59590c5b8ea2dcb20a78d933da654dd773353d185cc7aa221b80b9d6c81d30,2025-03-13T16:15:21.240000 -CVE-2024-42009,0,0,02c0fe508080971857c7db434c0f0da2e38c91601d9214f3de7a413be892a884,2025-06-10T01:00:02.087000 +CVE-2024-42009,0,1,10993e2bf6b23d2ff0e1d3487dcfdf278ed8ac849a52251c7979ea0a9e3512c8,2025-06-11T15:46:19.810000 CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000 CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000 CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000 @@ -269377,7 +269377,7 @@ CVE-2024-45190,0,0,0f9f782c7151454e0d4128d12af9212beba44978a9aed3b521bd26751a906 CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344cd0d,2024-09-10T19:35:09.727000 CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000 CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000 -CVE-2024-45194,0,0,77254ca1b6587eb5e8e927e61ac00c230760a8a07d84f59977c03150f9f0d924,2024-11-21T18:15:07.483000 +CVE-2024-45194,0,1,9783d58640443ee6c7d2887d64899b280a28c39c9bf615b886231c0519c40c7c,2025-06-11T15:40:45.710000 CVE-2024-45195,0,0,66d7d17610be0ce972b0de44bf228f2798ff0c35e717addb513b69a67e048bdf,2025-03-06T20:29:26.130000 CVE-2024-45198,0,0,134993cac349ebf82d298e5073984534c7242ddbcd9101d3655d2204b035998d,2025-04-07T14:18:34.453000 CVE-2024-45199,0,0,c6602917531b3a4a24fe09da269c6b74fc73422a338a1c1c0a7fd7dffcb01ea2,2025-04-07T14:18:34.453000 @@ -273516,7 +273516,7 @@ CVE-2024-50560,0,0,e5560d8e099bbdb75ebe3a313d5a07fb60056609d630bea2b282b04cbeaa1 CVE-2024-50561,0,0,51d6a6886183d861209a55cd82d08c7368f7ca6eecb96cadd88bb86e0f75077f,2025-02-11T11:15:14.037000 CVE-2024-50562,0,0,042b4aeddf47a9bcff9798cf964b7b33e5086afb18b03d175d7830e3a694130b,2025-06-10T17:19:25.360000 CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000 -CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000 +CVE-2024-50564,0,1,0e1e7fec697ee256225ff7e16bee08bf2f06557383d2dd0ee126195057be5996,2025-06-11T14:55:09.987000 CVE-2024-50565,0,0,0052767052bb2f202b3f6a2bb66a26d0a376b1c95ba46901bccf288399e729ed,2025-04-08T18:13:53.347000 CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000 CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000 @@ -273931,7 +273931,7 @@ CVE-2024-51382,0,0,b29a41a05c02a579a31b439784c85636e755f22c82dcce149f258b89de6db CVE-2024-51392,0,0,c28913cf9578463f4763dccada8773c2d0b70c039999d2c8d3d568551fd804da,2025-05-30T16:31:03.107000 CVE-2024-51398,0,0,cea8f8f4881380dbaa2cfe732dffbd060c56c48b06b04f4d982be54dbdad46e4,2024-11-05T18:35:17.420000 CVE-2024-51399,0,0,7797cfea236d02f4c030090ec48621397eecdb65349aff9b28f04a876b406896,2024-11-05T18:35:18.260000 -CVE-2024-51406,0,0,f0c5227154ac5602f5879eec080ba39cd868714523a47e46ddfa70a2bcc161e3,2024-11-04T19:35:17.410000 +CVE-2024-51406,0,1,ff7f5bed93e0663e64325b72687508a30c88e876c1fbe113aa4481856c831ede,2025-06-11T14:15:56.927000 CVE-2024-51407,0,0,c0aa8974878c98334b1faedb8239e3516705bb72c5942bd1756bad8c0fbb4d24,2025-05-27T20:26:46.583000 CVE-2024-51408,0,0,7abace5757c3676b38c24efc3b646081438e7b877d38f1cc5dedc735e58c63f0,2024-11-06T22:06:43.100000 CVE-2024-51409,0,0,cd9d1809dedee806ed461a1ec4b55cc7a32280d7a8caa4ca197781f860925802,2025-04-11T15:04:42.957000 @@ -278975,7 +278975,7 @@ CVE-2024-6331,0,0,772eddbeab74e601c91d9e66a54877a39bfee2ccfd2127fd1320d8b1de466d CVE-2024-6332,0,0,71321842be6854901825e6d202d86e613e3a01b657ba056279e33400be9b7fba,2024-09-12T12:45:37.917000 CVE-2024-6333,0,0,7736e33d674f924b13c6c3992b2833d5607d1a4f69fe6597724045c2bfc36fb9,2024-11-21T09:49:27.033000 CVE-2024-6334,0,0,e7609a76396a51aa6736d9d83a9522b392f46b7ee8c3a77686e795c0dc0753bf,2025-05-21T19:11:47.023000 -CVE-2024-6335,0,0,71e0ae9edb81dd50cf0694793267e523cec364805fcca0ea49bab4f2c0f60013,2025-05-20T20:15:37.317000 +CVE-2024-6335,0,1,d7ccbd0672458e87e9e90c63226f6f73ed1cd4bce0d6c75e2ec3a5ee89c477ba,2025-06-11T15:46:57.620000 CVE-2024-6336,0,0,26517f2e20d4fb8ecd3c1f8bc7496625a0971605d0451d59c8cc6ca534ab9907,2024-11-21T09:49:27.270000 CVE-2024-6337,0,0,272172a7579d97389777f5f196faaa6e46e696b9238bb3d61e675c02f4ed1da5,2024-09-27T17:48:00.977000 CVE-2024-6338,0,0,66a83af084575500ee819176a1b51e0408d0568ef8a208443ffad480bc0c423b,2024-11-21T09:49:27.480000 @@ -279096,7 +279096,7 @@ CVE-2024-6458,0,0,b11ced7b48e4999cb2402c171f587f9305fd15589abc8a139c63445b66e9d6 CVE-2024-6459,0,0,02da8f469a7fce55d4b5322dd98716cc4dad8ed243a9ca848d0651f501b6d543,2025-05-27T17:48:22.140000 CVE-2024-6460,0,0,4a5b5776701d673ed02efe26edfd5560edf8cba65f5cfdd74c96f161b28fb3a6,2025-05-27T18:04:55.703000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 -CVE-2024-6462,0,0,7eb67d80f606d7cc126245724a0550a023d01fea849142b7dc667cdb8eb5da9a,2025-05-20T20:15:37.467000 +CVE-2024-6462,0,1,bca90aee5abe34e7cf1e13c1c4ec816335a558f87a928abc5700f53135bdfe7a,2025-06-11T15:43:50.453000 CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000 CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000 CVE-2024-6465,0,0,68d8747a1edb551a38d59b6ec4dd4815476646c814dc40035dcb46acd92026f8,2024-11-21T09:49:42.103000 @@ -279110,7 +279110,7 @@ CVE-2024-6472,0,0,e26f0ed33b9352737fba2c7a5901be2204823366dc7f964b880fceddc7f136 CVE-2024-6473,0,0,1dafd6b50b11af3a55a60927aceae7fdee5db46502c399f03ce389e747a46480,2024-09-05T14:19:45.153000 CVE-2024-6476,0,0,a0cbdf8db7abbf40af298419f002b432eaa0907f370a1f5866689f4a683a61f6,2024-11-26T07:15:05.697000 CVE-2024-6477,0,0,f8f6847d32a610415a7c2ca805a1a46e2c4ada6ffccb0f2d3fc8c2c8f1cf2f4b,2025-06-06T16:12:25.440000 -CVE-2024-6478,0,0,d355f87d3d08b7198675f904b84d8494a8a121b6cd2dde7851c549ddd2d28d25,2025-05-20T20:15:37.603000 +CVE-2024-6478,0,1,d5c89c514729f7d3a87caf1cfa92ac2829fe96ec3b0309bbbe410913dac39ffd,2025-06-11T15:41:54.610000 CVE-2024-6479,0,0,e61c30f16f0abfc9f93099b9bc147874bff7bedf1b6bcc46dd42e617eef67181,2024-11-01T12:57:03.417000 CVE-2024-6480,0,0,4266a2448f7419be28cb4214e61c8f9e0c911904bbcd8a264d7b98190c25fc16,2024-11-01T12:57:03.417000 CVE-2024-6481,0,0,f62914d193bbade2d691f703d4d0b1ff9521548f9a943b29212b08069c7f73c7,2025-05-28T19:35:54.520000 @@ -279118,7 +279118,7 @@ CVE-2024-6482,0,0,4d53ead5e6325e4c3d18efe067c9e334be2a3f79da1bea9751adecc767a7d1 CVE-2024-6483,0,0,1c0fe2a973a2c4a1c74a0f15ec1936460845aedf2e4fbff62d44c77b139ab2a5,2025-03-20T10:15:32.863000 CVE-2024-6484,0,0,2321b3e4cac43e4cb38252b77fbd5ab74d6875fab07b3d2a29d1bb66c757d2cc,2025-02-07T20:22:49.117000 CVE-2024-6485,0,0,5de38639f840b10385a78b6c25abdb8a0ace1dba6d9d706af40210e5d356fe95,2024-11-21T09:49:43.863000 -CVE-2024-6486,0,0,77b36134bae3fedd62d4eaf5dbb50da10a2950728aa18338706c3b9cc71a3906,2025-05-20T20:15:37.750000 +CVE-2024-6486,0,1,e3e8287edf58aebbb325462088534af79c8c5b34fb9e80e3b3c36ce91d99ed46,2025-06-11T15:40:01.067000 CVE-2024-6487,0,0,a2c8cd4457ed5bbd74124022b13e31b4932a2b8cb2e05c9f365ffeaf9708b2d7,2025-05-30T16:55:49.913000 CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000 CVE-2024-6489,0,0,231e9813e515f1abdef06bf7e87ae67da0b47c391d532eef0539e6f69c239697,2025-02-04T18:04:39.737000 @@ -279308,7 +279308,7 @@ CVE-2024-6685,0,0,acc7767f83fdbfe4c0fb5ba835f368c963250f5aaf7c65cf81f0787fc28c42 CVE-2024-6687,0,0,87c94841e1b3441b473f4dee1081640b0718b68a0f4720cc6a84faf16a103b21,2024-11-23T00:50:45.110000 CVE-2024-6688,0,0,138f7669c50b5717eb30bf085e4de138dfdabfc0c6e798fc83a2112dc36bbf73,2024-08-27T13:01:37.913000 CVE-2024-6689,0,0,d3f1c978802e38e7ab22e4ab168036a480da837e523ef6438c9b42604f0fc4b9,2024-11-21T09:50:08.143000 -CVE-2024-6690,0,0,99a94a6785ee88e3de908cb60f4e053ceeceb40866229f09850c0bd71f17c263,2025-05-20T20:15:38.047000 +CVE-2024-6690,0,1,f415c11b87cd6811eab628cbbad4b655985ce33419cef0be8be9cfc0d567c653,2025-06-11T14:59:33.023000 CVE-2024-6691,0,0,f4b0c8ba9d849a887a840b11a7ced71b334b6811834c4c0436e7f424db226869,2025-02-07T17:06:37.413000 CVE-2024-6692,0,0,b93ab5a4c1a77950586e4d26ff9d5ac1dc50208142450c48467964da3007a929,2025-02-07T17:07:33.633000 CVE-2024-6693,0,0,28eab152ce9e10a577535de17ed173510cba4df1dc884c3da07cb2ac8e6a6517,2025-05-20T20:15:38.207000 @@ -281984,7 +281984,7 @@ CVE-2024-9522,0,0,81a7015961146d67081255db9702f745971d5b01a572ccb06cd379a82785f7 CVE-2024-9524,0,0,c0e0025075860eb301ff4ff643bd32cf5eb6831d27ec91d35b567d38c9af7c09,2025-05-12T17:32:32.760000 CVE-2024-9526,0,0,acc606f8e9195e546a271d256c6ec9cc804f4a841580ecb828b473fe7b0b33c3,2024-11-18T17:11:17.393000 CVE-2024-9528,0,0,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000 -CVE-2024-9529,0,1,e0835773ff2868f746ad772bca71cef0b4d7976759453aa0ec2fad83ec18fe03,2025-06-11T13:58:02.947000 +CVE-2024-9529,0,0,e0835773ff2868f746ad772bca71cef0b4d7976759453aa0ec2fad83ec18fe03,2025-06-11T13:58:02.947000 CVE-2024-9530,0,0,d9770d6d9d81aca35282dd37cad0ec897a8e52cf92a99657df0b6283cc63f82d,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,bd5dea9af3b5acebc7a9498df783f0aa08a3c09d57316df4d5faf9fd73c9b899,2025-06-05T16:56:56.240000 CVE-2024-9532,0,0,ee74e81fcd3228028851cbf05d2cfbe5eea8f3421ccb07415d383b1bab6b2af5,2024-10-09T11:18:49.027000 @@ -282518,6 +282518,7 @@ CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2 CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000 CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000 CVE-2025-0162,0,0,bfc97d5f6ed4ab16ebe8a6375b0a746ab06e7cd3ea0b56d09c090c3478f06f58,2025-03-13T02:22:58.683000 +CVE-2025-0163,1,1,85d2f9d0c7d45f5de5d0462db5f35ca226d1d9eb0bf5279e96141b3f41725fc9,2025-06-11T15:15:29.177000 CVE-2025-0167,0,0,ed36d641b1afaa7c32911291bfc917507cd4d73e70e05d582a250550abe355b0,2025-03-07T01:15:12.110000 CVE-2025-0168,0,0,a3bb306c5c1038cf3ae7cdc9fefc0119ef962391dad7848c675894c708a175c1,2025-02-25T21:26:07.113000 CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000 @@ -286220,8 +286221,8 @@ CVE-2025-22984,0,0,18fe379899d6b594231ed65cfa5066d6988b73d940081f95379b94407f66b CVE-2025-2299,0,0,e5251f8f8b5480e3d6b1edda7846f7e604c0e4f1539fa12e57972bd741386bf2,2025-05-15T19:54:41.610000 CVE-2025-22992,0,0,9c2224e338558ccc5fdf942d723bafbe861c5e19d73a3269c58858cc57989795,2025-02-06T21:15:23.317000 CVE-2025-22994,0,0,d9527179d5c850c6866754d31e77f1c2fd06d9e1a13bd3d3f0bd861c8c0f83ff,2025-03-19T15:15:53.990000 -CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 -CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 +CVE-2025-22996,0,1,4e06fe7c28c86750661bce485b34b36a54b344f7aacd75b38774e4741d9661fa,2025-06-11T15:38:44.620000 +CVE-2025-22997,0,1,4e109c31d40a3d1d29cc0bcfb1e52b19c2b7198f22da9a6cbc1072f86f1f6a98,2025-06-11T15:35:40.463000 CVE-2025-2300,0,0,c13f99b53ddc4e83bf9bce2feb564c630777b7016e2470e35d22e31f3440ca55,2025-04-23T14:08:13.383000 CVE-2025-23001,0,0,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000 CVE-2025-23006,0,0,7a5bf6bad719976a640fb90f39e240f5ae9344d4363a556047b151d1633075a7,2025-04-02T20:32:48.097000 @@ -288138,7 +288139,7 @@ CVE-2025-2519,0,0,53e1da806e7009c99eda2ae100302d54ee976e1f2e910b31b9e64f58222ac8 CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000 CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000 CVE-2025-25192,0,0,7a6038d36a5b17930d67880843054b23e0b2ef4833586c77fe6880c7c0ea5e18,2025-04-23T18:46:00.540000 -CVE-2025-25193,0,0,88436b550c54718a716525af3a09ec30c4fcff693af51cc8d334b1b5bb6550de,2025-03-26T13:14:32.087000 +CVE-2025-25193,0,1,961c67f86d66ace3d4b80d79cd8b2d770203dc068405393f7990a5600d26feb2,2025-06-11T15:36:22.693000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000 CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000 @@ -288682,7 +288683,7 @@ CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048 CVE-2025-2641,0,0,0c4e7f6e917c2684e1ef81919020337c8afbfd73d5a46107cea6f98fc25ffc5c,2025-04-02T14:32:40.757000 CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000 CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000 -CVE-2025-26412,0,0,e439f02063f036d3657a0bf05afa8e0aae7f2989029f4b795f42ec34bbfc4505,2025-06-11T09:15:22.067000 +CVE-2025-26412,0,1,d24092353fa68246014d74a20edcdc2b37b6e0cd740ffb34337ce84b79e0b577,2025-06-11T14:15:30.987000 CVE-2025-26413,0,0,2158c3399ea37dae246e6333a0208fa039262ef589c11e6030057cf377da68cd,2025-05-12T16:15:23.023000 CVE-2025-2642,0,0,9fd74d08c30eb46678d329dd538a5586185726ca4d8ec1276ca17b4f6bd06bab,2025-04-02T13:48:31.510000 CVE-2025-2643,0,0,f96a1e9165c8c6b99a098f4d86d5cf57a75b6fe768e009b644ffd8b873a80653,2025-04-02T13:42:29.387000 @@ -288721,7 +288722,7 @@ CVE-2025-26512,0,0,27e124c5aa10b0f0b92c8ca055b8cbe842cdfbec5e8c61f840784c35c80d5 CVE-2025-26519,0,0,189b0c6946f901ee4eed556955000825a3005cbd4fd73b84bf5b1493f77b4b5d,2025-02-14T17:15:23.090000 CVE-2025-2652,0,0,ae6e16616be52d3538ce00377479a8c5ef0414a0c53d8e7631810155f48f2da5,2025-03-26T15:16:11.270000 CVE-2025-26520,0,0,292c9caba6f38831a4be980034f0f7cdde695fdbb1f85a1136d15679c0c9d4ba,2025-03-03T14:52:47.173000 -CVE-2025-26521,0,0,cdc81ec5afb63914ad407c304994a2b4e474bebe302d8fe6d668dcbca4d44fc5,2025-06-10T23:15:23.840000 +CVE-2025-26521,0,1,c064c96336798f8f9725a52058709587b311086ff1698335df3c838db2580ed4,2025-06-11T14:15:31.137000 CVE-2025-26522,0,0,15654b8dc281e5e95b6cb8d0b0449d89135cfca68e40163629b408b401b71985,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,9eb8004a3f0db5f271f82a4160bc199ec38e8d40fc177becbe2105cc644170be,2025-02-14T12:15:29.723000 CVE-2025-26524,0,0,e4675579756d8bf50fc8a11fc92dcb6c0f4393fb284e95c0369d48074177af48,2025-02-14T12:15:29.887000 @@ -290016,7 +290017,7 @@ CVE-2025-2880,0,0,e389725818c992645d02e6070b5c39fb3800bf8237a4c9078a3291c23ae543 CVE-2025-2881,0,0,fdb559a0489fd102237eb30f41f019d2f5c2b3faa82f877e9abc8e7c02b82b2c,2025-04-15T18:39:43.697000 CVE-2025-2882,0,0,c97b3f3ea8d4bf1b525408e9c0aeb5839e6b1dab2a43ddecf7ef1915f34a41ad,2025-04-08T18:13:53.347000 CVE-2025-2883,0,0,de11120bf19ac8735b713769da981d898702017cd1ccc7eb0f5a880098b288b6,2025-04-08T18:13:53.347000 -CVE-2025-2884,0,0,5e072d72f816ed35616d5f52cc6f7b9f5b38ba09182083cab62d4e2073153ed3,2025-06-10T19:15:28.847000 +CVE-2025-2884,0,1,c3ae40f192f5d373357063a0eee213aee0cdedc73f50a138bcdb33c2a0b09678,2025-06-11T15:15:29.487000 CVE-2025-2885,0,0,d7e6b0bcc2bde4b9a153bfaf9504a6fe34cca823b62dab5c29aeb4ff68d351e8,2025-03-28T18:11:40.180000 CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000 CVE-2025-28856,0,0,49facbda8e3a831c26c726b61bef1fcd0c7982f3fa2f79e25ef260adf4085d93,2025-04-09T14:05:44.960000 @@ -292818,6 +292819,7 @@ CVE-2025-32706,0,0,db50af2cfe521d05a7c486c059aaaae863796e45bb101d6939f7e49800872 CVE-2025-32707,0,0,0470f05f4fed72a6e68669a459995637394b48e5dcea8b21ff00bd0a5a2faa24,2025-05-19T18:25:06.003000 CVE-2025-32709,0,0,cca61055dac0e837033032ad28a6f880a090dfc86e492b563e0bcb7f31d81d17,2025-05-16T16:29:34.783000 CVE-2025-32710,0,0,8aa4d60921f6dde1a890bc70c8e33d99b94c5d41ddcdcf72b3be6ab66adba5da,2025-06-10T17:21:45.853000 +CVE-2025-32711,1,1,7d3eeefcad19449b59513a507f4884917f1c6f6422cbafbb2beb41b279b3bea5,2025-06-11T14:15:31.530000 CVE-2025-32712,0,0,c5735fcc1bb8d2d8b8ff88cf2cf7bc8cd02910bed85fb27b9d8fa93cc565de62,2025-06-10T17:21:47.883000 CVE-2025-32713,0,0,1f55ff03a98c6f4a137fcd8cd370b450b5268acfb42631808df84938f4956e57,2025-06-10T17:21:49.897000 CVE-2025-32714,0,0,a92f17a0e588c2a134397f8038fc20f2e3a2d4fa89569159b3cacc267d8a2399,2025-06-10T17:21:51.843000 @@ -293053,7 +293055,7 @@ CVE-2025-3300,0,0,71838a45e38cfd4f9033706465f5d20314584bcf58aabb1bb7ca5cab40d521 CVE-2025-33004,0,0,0dbcf8f4552332912f870f20d881c87d766919198baf5864e35f56c668cfa064,2025-06-09T18:08:21.600000 CVE-2025-33005,0,0,cc36f120cbed36c030ac1a468cb0a7afdae6956296ad02b259f7e3a82ab309a5,2025-06-09T18:07:39.407000 CVE-2025-3301,0,0,b2cbbbf942710dc17dd30bf45e19011afe7becbc724cdeebd3bb45dd2691a5aa,2025-05-02T13:53:49.480000 -CVE-2025-3302,1,1,38fc44d8b6ab8b7fd1331287581e06949fb4e0b7f6684587b3a21ec43e33b278,2025-06-11T12:15:25.377000 +CVE-2025-3302,0,0,38fc44d8b6ab8b7fd1331287581e06949fb4e0b7f6684587b3a21ec43e33b278,2025-06-11T12:15:25.377000 CVE-2025-33024,0,0,a929691d5533595a80202115459e86f84fc81996ba9c41d2a68880f3e6fcf59f,2025-05-13T19:35:18.080000 CVE-2025-33025,0,0,4b295e88dd02f429bce7f4aed7e0b1b7ea585aae960bbc6de9d4364036c40d6c,2025-05-13T19:35:18.080000 CVE-2025-33026,0,0,16823ea87e15ed5dd06862f606f290dd47fd68e96dd8b001f96144de8d0bef0f,2025-04-22T17:37:37.900000 @@ -293067,7 +293069,7 @@ CVE-2025-33043,0,0,044f6c7834f7eed1d82fb6b8377e155f5c1ae51cb36f952b6bba03be184e2 CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000 CVE-2025-33050,0,0,05e6d757b225696d2814d59d4f1c971c8d0e7d5b6ad7a1f98f3325b5ab9caf61,2025-06-10T17:22:12.643000 CVE-2025-33052,0,0,b1993549d564c5c9981bc4b05cb64d0a2d456f60ff295f87620c17f2cd44433b,2025-06-10T17:22:16.713000 -CVE-2025-33053,0,0,a38de63924e4c14d9d85c34c156b3cdea7a876863613a95aa4b4306ad100eec2,2025-06-11T01:00:01.443000 +CVE-2025-33053,0,1,7c0fb55424eeeb8186ec8527c37004cb04dcd8c08591616fb06c74862faf1323,2025-06-11T14:11:11.517000 CVE-2025-33055,0,0,13d9e39692b08b1b320db5a5ecccbe43815806407f2b3cc535308d642cb2e613,2025-06-10T17:22:21.100000 CVE-2025-33056,0,0,c67dfbe06f555af10b25758d9a6160cb2f910935ced8e27cd9da40fc740b6166,2025-06-10T17:22:23.163000 CVE-2025-33057,0,0,205438b56590147889b44322c2f014a7f7d594c5c377234a2f1d03b95a58afc8,2025-06-10T17:22:25.360000 @@ -293248,6 +293250,7 @@ CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc1390 CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000 CVE-2025-3471,0,0,7540bf9b66a7c3d2886148e18ad0354d6f76696c333def82e90f9e267caa6c25,2025-05-09T13:48:03.503000 CVE-2025-3472,0,0,8edf39375c9ab0caa46bc4f64a877600d35e92d464dc8269fd628758acc904e2,2025-04-30T14:01:15.660000 +CVE-2025-3473,1,1,c764c4e2a3da0055a44b6998e909894226d269d0be1d00bdf90db31787cee713,2025-06-11T15:15:29.827000 CVE-2025-3474,0,0,f3d4b355c6b48145dca2a43881241ecb1e655d9dbdb96be4731ac7b40121a4fa,2025-05-01T14:38:00.023000 CVE-2025-3475,0,0,cacee959c6fec9a049e3301810eab743cc7a027bdc5a60847b12828010037e16,2025-06-02T17:23:36.020000 CVE-2025-3476,0,0,e9ff7dadd87cc1b5d38c6f4b90861333cdc35e0f0e9f56330696f9a142f8fe8c,2025-05-08T14:39:09.683000 @@ -293361,7 +293364,8 @@ CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e6 CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000 CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000 CVE-2025-35939,0,0,6a840d2678de0b0635b0f573a4e0aa98890f3ce611bcae157f676530014eaaf6,2025-06-03T20:59:34.117000 -CVE-2025-35940,0,0,99035063dad9daa4cf8431584bdae2d17fb96f782e0199a539be51e489d8b53f,2025-06-10T21:15:22.210000 +CVE-2025-35940,0,1,3ee52df4bacbf4fdc5e57802853fb2f251a95cb49b544ab41a6d0298e2dea5bc,2025-06-11T14:15:33.690000 +CVE-2025-35941,1,1,eaaa668a7246915ba01e31891a0eeb989a936dd53db85c8a3ce111baf2a98c87,2025-06-11T14:15:33.797000 CVE-2025-35965,0,0,4aa642d84377cde687111c4598cf1eaeacbb56cf1c939bfc9602ea66c09fbf1f,2025-04-29T13:52:47.470000 CVE-2025-3597,0,0,d7f16eae83f55d018cc2fc04d9f80eccf613371d509c7f99733ac01645d2c6f1,2025-06-05T14:27:53.477000 CVE-2025-35975,0,0,ff6f53919e1d0edd41e3d119f9454f71c4e7dd5f4908d853817e3fb24cd36fe2,2025-05-02T13:52:51.693000 @@ -293890,7 +293894,7 @@ CVE-2025-3872,0,0,26604960001ce7e7efc01090e0c7f3ace8c54075c9f64bec667f2f9d611a1c CVE-2025-3874,0,0,48404b5920dfb8e9d0e9a6f6c853dfae3dfd8be20985f098e8a46e30a37014f9,2025-05-06T15:39:29.083000 CVE-2025-3875,0,0,1b7ebae355c4f48c8dddf4fcdd6fc15c745cdda51dd1f8022d95692c7a83a312,2025-06-05T14:27:05.837000 CVE-2025-3876,0,0,98fa4965cd0fb5896f08763a0582c93ea252014e67d6fd79d41bdf5071b00a40,2025-05-21T13:35:09.450000 -CVE-2025-3877,0,1,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000 +CVE-2025-3877,0,0,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000 CVE-2025-3878,0,0,6edc0413060b870ca8db342e4d416bc7330af04d97c4384be96b3d4817bff1e1,2025-05-21T13:36:16.070000 CVE-2025-3879,0,0,d832e10f3f5a35fa6f778cb83701763ba1ca0a6464dece4429751c1aa0bef5fb,2025-05-05T20:54:19.760000 CVE-2025-3881,0,0,24b54933e846a45dd97d5a9a438a485d3ead998ef41689a70b444bb5ab176e29,2025-05-23T15:55:02.040000 @@ -294401,6 +294405,7 @@ CVE-2025-40908,0,0,91c9c68cf03ca27da56ba2aec4b379519e7063cfa4c8bc0832dfb5079fdf6 CVE-2025-40909,0,0,0168f158a69247acbaffa8dbdbed8b439b77a336030b06418e5511e5db476ff8,2025-06-03T04:15:40.470000 CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000 CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000 +CVE-2025-40914,1,1,af01d276c0ae500ffb244e9fb8d7f00960a88649527b7ab4383e0ba94e831d0f,2025-06-11T15:15:29.990000 CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000 CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000 CVE-2025-4094,0,0,9389e1771cac6e6188e563be99dd04161be542f25f3d0fbc50799f1a765f05af,2025-06-09T20:13:20.070000 @@ -294772,8 +294777,8 @@ CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8f CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000 CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000 CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000 -CVE-2025-43697,0,0,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000 -CVE-2025-43698,0,0,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000 +CVE-2025-43697,0,1,8ed523a26e112c862f96538810a2a4c570c2053b73cdea8198463e4b54adcc35,2025-06-11T14:15:34.253000 +CVE-2025-43698,0,1,cf4777478ec0ce5399bd6b1048836b4f4ebfdaf4a45b2e635662f00a4bb98bbb,2025-06-11T14:15:34.417000 CVE-2025-43699,0,0,a2d22ee4b8d68eb026c86782bf500857da584950b48fd4e2d9625d502c59ab55,2025-06-10T16:15:40.353000 CVE-2025-43700,0,0,f91ad89a18eacfda649ab209d4f29d9dde450c39d5a449eccc3a29c15f6e5dbd,2025-06-10T16:15:40.513000 CVE-2025-43701,0,0,75a984ac714c135ecbf90c66a4c841f2f5525dff3c0315e5d515084f3c5ab270,2025-06-10T16:15:40.667000 @@ -295223,6 +295228,7 @@ CVE-2025-46011,0,0,c1776a78cb3800147b82714f56c78717ef81a5a9688b212486314b1695383 CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000 CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000 CVE-2025-46041,0,0,dc7ed8d00840600a9f5f28d0044f0bcf7424f5e106bcbf4fb8ec3d746dd238fd,2025-06-09T20:15:24.113000 +CVE-2025-4605,1,1,1115f0d5652d8285f8fb5c7fefef07cf745e94cf97ee2c4d9fe05f25574b329e,2025-06-11T14:15:36.847000 CVE-2025-46052,0,0,ab7d3250787ede688cd6b355d8aec0cc3dda171eb18d9b03fdd032c02ce8c40d,2025-05-16T14:43:26.160000 CVE-2025-46053,0,0,a812a9fd2122f294cfbb7de5fd43b870987b1f7127ab686b037255809ebad4e4,2025-05-19T19:15:51.580000 CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000 @@ -296258,7 +296264,7 @@ CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d34 CVE-2025-47710,0,0,efb080a2ca87d31fc53e84646807eb619dd8ffb84063c97064b1c37508c6b60a,2025-06-10T15:24:50.570000 CVE-2025-47711,0,0,84134213c5152e1def5667fee36ba3a5b2be995d24d7708c58e002afb898ec35,2025-06-09T12:15:47.880000 CVE-2025-47712,0,0,36ab066e163c4ffc449059531315de23291a62b1378074f34cd0681da81a794c,2025-06-09T12:15:47.880000 -CVE-2025-47713,0,0,73cdc94bb93d27aed7526d48c29082a31e3da6594c1320cec78e4716519d2504,2025-06-10T23:15:58.320000 +CVE-2025-47713,0,1,e7b1e676acaff8c3a5093a4ba694f663f5a44fc63c9472c508efc502d61c3fe6,2025-06-11T14:15:35.560000 CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000 CVE-2025-47724,0,0,c392ae279a9c6e1324e9d9c71628ad9f2bd31920b4d617428838fa9f83dc2fa5,2025-06-04T14:54:33.783000 CVE-2025-47725,0,0,889f3515c44952cf57a8d17f0356726e20588e99515827ba927156d41cc6af64,2025-06-04T14:54:33.783000 @@ -296329,7 +296335,7 @@ CVE-2025-4782,0,0,7ad1545eb9e016317ccf1371b442ca29cb62e72aa504ad708f7f2767909134 CVE-2025-47827,0,0,e8e7d1db0126d69a3b1ce4ce3cd4a43b2b63ba3f83e4b78ec9433a4d6806ed2f,2025-06-10T15:15:25.270000 CVE-2025-47828,0,0,164436fe84b8d833a71f3fa8e7f3f39b64e2df889f4579512ca4cd1f99b4e769,2025-05-12T17:32:32.760000 CVE-2025-4783,0,0,bd5695c741cd6c06c07a958617e5fade1eea7d7c38bb9f2f382e0e33491cd176,2025-05-28T15:01:30.720000 -CVE-2025-47849,0,0,d80fcc52b5328cf7208f1ac68e6e8877930ba70982938ef3174ab9db8146f45b,2025-06-10T23:15:58.453000 +CVE-2025-47849,0,1,c2e2bbdcf05b9d5fb97ebf1ca233103fed6d72696ade8e5ed7911ea284c9c625,2025-06-11T14:15:35.727000 CVE-2025-4785,0,0,11af03bace6c1c04331c5dddb8e99f128f61109ba1a035e35492e3dbcae57560,2025-05-21T21:00:19.110000 CVE-2025-47850,0,0,6ffc73421957f99914a384dd377153330e8c59407b63d74450ed145d56da1d54,2025-05-21T20:24:58.133000 CVE-2025-47851,0,0,bae42746a3d0b7b8a748ca2f4220c01f83bf85343adefcd6c74910e655b0981c,2025-05-28T21:13:48.670000 @@ -296410,6 +296416,7 @@ CVE-2025-4801,0,0,fc6ec83b7f99dbba6d1228da70489464cc23b7a30d8f01ad6791644a180c45 CVE-2025-48010,0,0,4819d2e93ad3442257f70fb7864093e1a4200a7b0a7fba4a346e3f36d3da9e5b,2025-06-10T14:13:51.267000 CVE-2025-48011,0,0,258b9fec7bb0d96eb7155a40013213737fe713d9c9fbe682bbd078d999f91910,2025-06-10T14:28:15.027000 CVE-2025-48012,0,0,71d63bd70525687602bc234fe1b79ef8d4a14328f61a484c736f611a8ad14409,2025-06-10T14:28:52.893000 +CVE-2025-48013,1,1,56d76151678247bbd4f469dc2159584042c5f83cf64cccf07e84ead3e86e31c9,2025-06-11T15:15:41.830000 CVE-2025-48014,0,0,b9d2079ba78dd708b6501c98bcfc8c530a41a6a42eec8a9e644487633db1d02d,2025-05-21T20:24:58.133000 CVE-2025-48015,0,0,97195b1375e738b78c3c892de114d387c5901e8ee163a174bd7cc7d86bb801d6,2025-05-21T20:24:58.133000 CVE-2025-48016,0,0,7f338d05ff0bf5457b003e53823b639de05c7abe792c9baaaefb3f53dc116634,2025-05-21T20:24:58.133000 @@ -296629,6 +296636,11 @@ CVE-2025-48427,0,0,7b7d0b24d905cbea3b50146b37b4cf62666de442b9ee6475e1cabe343e0aa CVE-2025-4843,0,0,5890e4c47a5552e18a9be038fa9194d6f64cc12e48ceed25f7f3e1b0ba45bf6f,2025-06-04T20:11:36.947000 CVE-2025-48432,0,0,5f6d8752b6215d1c6c6ed176249453d7202995237846ebecf3edfe940755446e,2025-06-10T18:15:32.790000 CVE-2025-4844,0,0,c912eb5a20c5346c9f6d6c3e57f91f3a367b50a9f461c9f08439baff48bc8fef,2025-06-04T20:11:19.110000 +CVE-2025-48444,1,1,ef2eb1da23c8d96d03a87fcd8d328e862d9485eaa988c50fbdcf0d7e572a2f9f,2025-06-11T15:15:42.143000 +CVE-2025-48445,1,1,53213dbf4f875bf1e256a194dc0f1d5b36be13a3e9f8270c446dbb581459c668,2025-06-11T15:15:42.270000 +CVE-2025-48446,1,1,59cb264358d5d9d97b6953edc8c8a093ad2ae3aff698cf08e72258ef6b7f9799,2025-06-11T15:15:42.427000 +CVE-2025-48447,1,1,e6c4213a4256e6dc39a71496ec19a54a54152079678fbbc0b2a482be1f11f7c7,2025-06-11T15:15:42.607000 +CVE-2025-48448,1,1,7429abe0813bb5e0c4a4b49796f402fde9ff88d156185bb09a100e46774a8c38,2025-06-11T15:15:42.733000 CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000 CVE-2025-4846,0,0,4dd97835f28bce0c2a0646c496f88035dc9f48717c734fc8fd3222164cab7575,2025-05-19T13:35:20.460000 CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000 @@ -296872,6 +296884,8 @@ CVE-2025-49140,0,0,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c CVE-2025-49141,0,0,c27a5db8847ba6463beeffc0f33ecced17eb646ef426e9c77fae0b5a96f645b7,2025-06-10T16:15:42.193000 CVE-2025-49142,0,0,b6552c867dcdae934f4510e82e6caaa381511e720ec6623ff0ffb45ff0c083a8,2025-06-10T16:15:42.293000 CVE-2025-49143,0,0,9d062967241f50913064a334ed49b074edc4a399d0d32df3945192529f45fc06,2025-06-10T16:15:42.450000 +CVE-2025-49146,1,1,bf8fcfd2e71318c98e6d0d098b9753fdbed7a70096e9376cc478a1e6bc1dfb24,2025-06-11T15:15:42.850000 +CVE-2025-49148,1,1,631b0aa9580b38e2d95b5ddbe35fc4e80e64a71b9fb1b7e7f39651aee675f4f5,2025-06-11T15:15:43.043000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa7c1,2025-06-04T14:54:33.783000 @@ -296891,6 +296905,7 @@ CVE-2025-49208,0,0,a8e96108da8f9e7efa92e227e5541e40bf6024b1bdd55d38cbd0bffbcfb12 CVE-2025-49209,0,0,293d4b58934d7545b7379d142ec4ec0556406a7f545f40e2a06e2176fbaac700,2025-06-04T03:15:27.057000 CVE-2025-4921,0,0,6764dccda373512b657fe3c8300f9213acc595572fe2b42c347ebcd82da48e2d,2025-05-18T20:15:19.273000 CVE-2025-49210,0,0,0d98b9f5865953f1015e0875c4ef02572a5474d0f348f574d55b17a2fdab9325,2025-06-04T03:15:27.127000 +CVE-2025-4922,1,1,240820cc7731a21e664c34b2ce9fbe4123442bc1d58c6804b9dce72455a31633,2025-06-11T14:15:37.140000 CVE-2025-49223,0,0,648cfa7c40c96de295e183f0ea98c44bf314195a3ae5c64b8746fcff08134939,2025-06-06T19:30:16.060000 CVE-2025-4923,0,0,9beba7071c51eba6c1d71d0a324059e1f5260406f92dc4aea21591df042815db,2025-05-28T12:50:28.590000 CVE-2025-49235,0,0,8c9fd6d5e7a7c75e9718e9d71425868ac554e5b2c4e799bbc755c0b8dcf21e57,2025-06-06T14:06:58.193000 @@ -296934,7 +296949,7 @@ CVE-2025-49286,0,0,0c3f98e47f6b48b3e0e84b2c0a66a43c574c16be1a5a57ed596d579641877 CVE-2025-49287,0,0,d582e9741824478fed543ad16f5e4fde0ce4d63284bc6d280c033891572377ac,2025-06-06T14:06:58.193000 CVE-2025-49288,0,0,97ac98290dbbce6e9c1cc88246bf869a83494ce71b21b087c18bc155d2acfd94,2025-06-06T14:06:58.193000 CVE-2025-49289,0,0,fd792354de84cf9d0669b41ca31d9bfae3bbf12279fe8d7bb8414b6b637fbb13,2025-06-06T14:06:58.193000 -CVE-2025-4929,0,0,9aa7f26cd205a99fea5ff2d7bff4801aceb991149094badf93f19647e42edf94,2025-05-21T17:42:52.510000 +CVE-2025-4929,0,1,a8e593e93f40512d4e00d2cf8b1f6bcbb5d53e9a2cd29f3fc687456ae4295712,2025-06-11T14:54:00.567000 CVE-2025-49291,0,0,8134d1964dff1f1760992dbc201fbfd8d79201074def3a1c1fac78050d47f0c4,2025-06-06T14:06:58.193000 CVE-2025-49292,0,0,0ca180db220c352852a434aec97e01e62813479b97501ec49f80b986aca4a599,2025-06-06T14:06:58.193000 CVE-2025-49293,0,0,945e3d8bbfdfc4a328a4438a25692fd2557e65fe18072af826e236c0461cd9e5,2025-06-06T14:06:58.193000 @@ -297011,20 +297026,20 @@ CVE-2025-49509,0,0,1518f93f1ee224f1f100bcee71d6ba948043b73035e7eb346a997192f9c2e CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 CVE-2025-49510,0,0,380506e2ae8c03ebf1a0d58576260eadb6379c51baddcca2c48765ccd61fe5a4,2025-06-10T13:15:23.583000 CVE-2025-49511,0,0,89f9e9e06a92ee36a7fcee42b322bef8df2556399087804f516e0b0f17a65447,2025-06-10T13:15:23.747000 -CVE-2025-4954,0,0,4f8b18e50e35fbfc0cb799c772c703df1c5ec3452b90f5bc7c961ccbbcb5c026,2025-06-10T06:15:22.403000 +CVE-2025-4954,0,1,9b67173de6a4b8213182ed4ceb49024d3aa79e4cb7e72692c8f9984c1acc24c3,2025-06-11T14:15:37.287000 CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000 CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000 CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000 -CVE-2025-49651,0,1,3dc40157fb10bae7243a77ac51b211b66ba5acc56dee973c3a32b5a2ba7b366d,2025-06-11T13:15:24.483000 -CVE-2025-49652,0,1,4e7502c990624f15263178caeb248d6dfded2ce2c251ff5e53411eb5a9308d20,2025-06-11T13:15:24.613000 -CVE-2025-49653,0,1,1ecfe673ed5ad877726cedd55cefd4c60f1c99abefcd145ee08bdc016366d375,2025-06-11T13:15:24.720000 +CVE-2025-49651,0,0,3dc40157fb10bae7243a77ac51b211b66ba5acc56dee973c3a32b5a2ba7b366d,2025-06-11T13:15:24.483000 +CVE-2025-49652,0,0,4e7502c990624f15263178caeb248d6dfded2ce2c251ff5e53411eb5a9308d20,2025-06-11T13:15:24.613000 +CVE-2025-49653,0,0,1ecfe673ed5ad877726cedd55cefd4c60f1c99abefcd145ee08bdc016366d375,2025-06-11T13:15:24.720000 CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000 CVE-2025-4967,0,0,108222a9fb8d269319085d1510581dfa0458c27c4448fa960791612bde83ca72,2025-05-30T16:31:03.107000 CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000 -CVE-2025-49709,1,1,746dffc6d2c5432d7e4eba087556ee9d62a1593fe8d9f284a73de26c2354176d,2025-06-11T12:15:26.977000 +CVE-2025-49709,0,1,b77d5424288dcc0bed80e77e1927d6b441744d6c0d21e8a94d2316ea54f0de01,2025-06-11T14:15:36.387000 CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000 -CVE-2025-49710,1,1,e16065f68a1c3ecdcf2117f4df50c2fccdd2d13a0cce4d1033f135418707e259,2025-06-11T12:15:27.083000 +CVE-2025-49710,0,1,3bfd7fdb4da0e1ab3a8c31ff1b5a2b77e7a67d42631f74776c5e53ec20cb3a19,2025-06-11T14:15:36.527000 CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000 CVE-2025-4977,0,0,bd1fd849d67fd76fbcb9bab811ae102c8a3ea5945e2e64bb03121997ef69d512,2025-05-21T20:25:16.407000 CVE-2025-4978,0,0,d098f546d229ff0b8b6c1c02e6df2a8e7e88cccb563b41e18115eb4da78ff2f6,2025-05-21T20:25:16.407000 @@ -297139,10 +297154,10 @@ CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c4 CVE-2025-5136,0,0,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000 CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000 CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000 -CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000 +CVE-2025-5139,0,1,478cd92def8402421385452923781dbb1e2d7c36d24453f72439415b1b27838f,2025-06-11T14:15:37.437000 CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000 CVE-2025-5142,0,0,cfb77a196d5255a5a436db83dff520eaaa1d53cc832ec32bce9b0d13a0b8d87b,2025-06-04T18:29:34.470000 -CVE-2025-5144,1,1,1a91210a39f37e90277264f7461097da3f9ae047ad04d93d74703664d1f3c808,2025-06-11T13:15:24.823000 +CVE-2025-5144,0,0,1a91210a39f37e90277264f7461097da3f9ae047ad04d93d74703664d1f3c808,2025-06-11T13:15:24.823000 CVE-2025-5145,0,0,79eef495ab65fcf81286a635001443af56e362b501d3db2d9a57e69f802a1c67,2025-05-28T14:58:52.920000 CVE-2025-5146,0,0,30dc5c61e39c6bb48e155d9bcd0fd66e2395886111a482cc56b330fb6c74d9f8,2025-05-29T07:15:25.120000 CVE-2025-5147,0,0,0d68c3226bde9ea189f2d3e4a81d7d02206c36b54e63b2ea80685be3458a5459,2025-05-29T07:15:25.330000 @@ -297238,16 +297253,16 @@ CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000 CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000 -CVE-2025-5263,0,1,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000 -CVE-2025-5264,0,1,5acf980c26362c26ab94ae3c7ae821049757c87d0eefb697447d18253fa00440,2025-06-11T12:15:27.373000 -CVE-2025-5265,0,1,28606bb83a73b4f9d7dede4858210717150080ffa1d142904c522b1757edcd5e,2025-06-11T12:15:27.553000 -CVE-2025-5266,0,1,86469d529066a0232f0c8eb07f8e9f67c94f247bc436f8d1062b8a0475806c9b,2025-06-11T12:15:27.730000 -CVE-2025-5267,0,1,8716e9a87e0f688cdc06fb8b4836782dc60cade2df62eba24b97b33d9115e8be,2025-06-11T12:15:27.910000 -CVE-2025-5268,0,1,d57c0308433fa204e62ae9e945a3726f05cee3787137e819d7cdad3d4005c86c,2025-06-11T12:15:28.087000 -CVE-2025-5269,0,1,b922f617fbcbba106d44af23edcbb0031488ab18b41d436f84ab099755898527,2025-06-11T12:15:28.270000 -CVE-2025-5270,0,1,96297246b7606c4dbbeaaf8f99515d023221026a42fbd39003eb5516a389c3ab,2025-06-11T12:15:28.457000 -CVE-2025-5271,0,1,e8162e6d0dc193ebe9401a5dcd034fa2e97416454d77b1504f9845da76fee3ef,2025-06-11T12:15:28.647000 -CVE-2025-5272,0,1,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000 +CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000 +CVE-2025-5264,0,0,5acf980c26362c26ab94ae3c7ae821049757c87d0eefb697447d18253fa00440,2025-06-11T12:15:27.373000 +CVE-2025-5265,0,0,28606bb83a73b4f9d7dede4858210717150080ffa1d142904c522b1757edcd5e,2025-06-11T12:15:27.553000 +CVE-2025-5266,0,0,86469d529066a0232f0c8eb07f8e9f67c94f247bc436f8d1062b8a0475806c9b,2025-06-11T12:15:27.730000 +CVE-2025-5267,0,0,8716e9a87e0f688cdc06fb8b4836782dc60cade2df62eba24b97b33d9115e8be,2025-06-11T12:15:27.910000 +CVE-2025-5268,0,1,e9f59b14522cad4c6fd38501962b508cda347cb1089d8cbaeee3eacb6c967577,2025-06-11T14:51:14.950000 +CVE-2025-5269,0,0,b922f617fbcbba106d44af23edcbb0031488ab18b41d436f84ab099755898527,2025-06-11T12:15:28.270000 +CVE-2025-5270,0,0,96297246b7606c4dbbeaaf8f99515d023221026a42fbd39003eb5516a389c3ab,2025-06-11T12:15:28.457000 +CVE-2025-5271,0,0,e8162e6d0dc193ebe9401a5dcd034fa2e97416454d77b1504f9845da76fee3ef,2025-06-11T12:15:28.647000 +CVE-2025-5272,0,0,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000 CVE-2025-5273,0,0,7a172885547dbfa68292354132d6eab77847bfdd0e0f37bfe0a33c637c28685a,2025-05-29T14:29:50.247000 CVE-2025-5276,0,0,39d67915dab7ad2300f3ccd3a288fcee1075e32b914c45ad140eb6b7725be52b,2025-05-29T14:29:50.247000 CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000 @@ -297530,7 +297545,7 @@ CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7d CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000 CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000 CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000 -CVE-2025-5687,1,1,c421add6eee3470a0c8dd4c0cfabac86c20482eace4697dc1de0a9f06f87c7e8,2025-06-11T12:15:29.023000 +CVE-2025-5687,0,1,292ba6f1554d37b3cbf8506ac631bee8568c04e2764e21ee6a0ae1222781f5bf,2025-06-11T14:15:37.730000 CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000 CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000 CVE-2025-5693,0,0,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000 @@ -297699,8 +297714,8 @@ CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2 CVE-2025-5943,0,0,571906ffe14a79e22d0036c86683c5a92f8c755e9133387c395960e0afa9c11b,2025-06-10T18:15:33.020000 CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 CVE-2025-5952,0,0,89b97adc3e12e17ca18b9484f2cc0cbac7f8ea34e27cce81e859e2ad09b23e1a,2025-06-10T16:15:45.717000 -CVE-2025-5958,0,0,881203d72e5ff9dec1d36edbffe80ff56b2ff61971d68af539fac81daa5fb5c6,2025-06-11T01:15:20.890000 -CVE-2025-5959,0,0,bd8633464c7a0c0b351dfe476239cef2ce42ae529b390cb1de676ca144a4abb7,2025-06-11T01:15:21.030000 +CVE-2025-5958,0,1,96c847f1fcedfcbc1a4a3cb442c43d2d7018595ed5552138040384b10ef2f717,2025-06-11T14:15:37.870000 +CVE-2025-5959,0,1,82dedbdbfb3124c73cac0939bd9a9e757e9b2adfb2c48acae92ddfb7c18666c5,2025-06-11T14:15:38.037000 CVE-2025-5969,0,0,0cb5f1eef226658325ae1059818aba7cb4928688bc7acca6d60e3f96dc260577,2025-06-10T17:25:20.293000 CVE-2025-5970,0,0,d7c94f11149aa2d1fa422037b5710258375a5e88a21be20512abe255cca0c035,2025-06-10T17:25:24.033000 CVE-2025-5971,0,0,a585731e3dcf519d6d97e5105421f7765406419a5d86aa36be35cba576add91e,2025-06-10T19:15:35.400000 @@ -297710,10 +297725,10 @@ CVE-2025-5974,0,0,339321be4c5ac9108cce5e98767fc5970ae083450218fa354fd8033f05a252 CVE-2025-5975,0,0,9008eeb9527e9693001a3be4b45aa5cf8a88c8a44caffd0e0b12ea03a78b8ee2,2025-06-10T20:15:25.117000 CVE-2025-5976,0,0,6867fdd2eea80fafea5defe2bbd68074fcd28406e4e3c12b1e1b2d17570ffa73,2025-06-10T20:15:25.297000 CVE-2025-5977,0,0,f304c9ff5770b6781d3f20efc156d80096139af8a0274e3045f16c5bb9d0173f,2025-06-10T20:15:25.480000 -CVE-2025-5978,0,0,4e4d69a73c249e0a4a5dd907dae67dfe13fdf168bd6154e3a3a2e85793f26d9e,2025-06-10T21:15:22.793000 -CVE-2025-5979,0,0,d27c61690a89a70834e1ac7ec79b55e9c00b548ee2fa9335cb0305161ad45244,2025-06-10T21:15:22.970000 -CVE-2025-5980,0,0,e040dd481b18254b8331cc7db878c5d64b7a6be5a4fa7521d9ea11a576b92997,2025-06-10T21:15:23.150000 +CVE-2025-5978,0,1,833468fafff899f09b44b3f8512c6da898f71d16442bcf518b12d7261792bab5,2025-06-11T14:15:38.197000 +CVE-2025-5979,0,1,949ef8eb455e4068bca42c4c3d743edb0ab1ceb773f9800b8141d70bb61874a5,2025-06-11T14:15:38.320000 +CVE-2025-5980,0,1,5e8c433ab9210c16ea0a5bd79d3eeebd09b12dfc93a863467a89df0063df20fc,2025-06-11T14:15:38.623000 CVE-2025-5984,0,0,23b7a2e2427c55d6b8b71bdfb3210e81fbbb4de6329b5126e67b10ed13442fce,2025-06-10T23:15:58.583000 CVE-2025-5985,0,0,6446d10df39548f8cc9543e4c4495bd4e0a246e2b8805b29cf25763ee00bb5ed,2025-06-10T23:15:58.770000 -CVE-2025-5986,1,1,b188af1bd59926106ceca49db67102e84e5873a91ec7194d797228e2ae3e438a,2025-06-11T12:15:29.183000 +CVE-2025-5986,0,1,1990e16fb8c462afd3f99f716f6335400ec441a8016940956e56aaac259aed8c,2025-06-11T14:15:38.880000 CVE-2025-5991,0,0,63a683acbdc0ee08246e1a037b74c64c0c9a5c11210d84e35e546c14a58c12d4,2025-06-11T08:15:22.933000