diff --git a/CVE-2011/CVE-2011-100xx/CVE-2011-10007.json b/CVE-2011/CVE-2011-100xx/CVE-2011-10007.json index 3509f8de06a..ab8c0bbba9d 100644 --- a/CVE-2011/CVE-2011-100xx/CVE-2011-10007.json +++ b/CVE-2011/CVE-2011-100xx/CVE-2011-10007.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename.\n\nA file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed.\n\nExample:\n\n$ mkdir /tmp/poc; echo > \"/tmp/poc/|id\"\n$ perl -MFile::Find::Rule \\\n\u00a0 \u00a0 -E 'File::Find::Rule->grep(\"foo\")->in(\"/tmp/poc\")'\nuid=1000(user) gid=1000(user) groups=1000(user),100(users)" + }, + { + "lang": "es", + "value": "File::Find::Rule hasta la versi\u00f3n 0.34 para Perl es vulnerable a la ejecuci\u00f3n de c\u00f3digo arbitrario cuando `grep()` encuentra un nombre de archivo manipulado. Se abre un controlador de archivo con la forma de dos argumentos `open()`, lo que permite que un atacante controle el nombre de archivo proporcionando el par\u00e1metro MODE a `open()`, convirtiendo el nombre de archivo en un comando para su ejecuci\u00f3n. Ejemplo: $ mkdir /tmp/poc; echo > \"/tmp/poc/|id\" $ perl -MFile::Find::Rule \\ -E 'File::Find::Rule->grep(\"foo\")->in(\"/tmp/poc\")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)" } ], "metrics": { diff --git a/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json b/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json index 39bd980eb3b..31972181bef 100644 --- a/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json +++ b/CVE-2018/CVE-2018-162xx/CVE-2018-16210.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-10-12T22:15:07.377", "lastModified": "2024-11-21T03:52:17.730", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25111.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25111.json index dc191ee8647..2e36b018fb7 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25111.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25111.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in models.py." + }, + { + "lang": "es", + "value": "django-helpdesk anterior a 1.0.0 permite la exposici\u00f3n de datos confidenciales debido a os.umask(0) en models.py. " } ], "metrics": { diff --git a/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json b/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json index 574d7a408e8..063639aa5c1 100644 --- a/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json +++ b/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json @@ -3,7 +3,7 @@ "sourceIdentifier": "browser-security@yandex-team.ru", "published": "2025-05-21T07:15:59.357", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json b/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json index 4add1b72bc0..0c6f4e9cf05 100644 --- a/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json +++ b/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json @@ -3,7 +3,7 @@ "sourceIdentifier": "browser-security@yandex-team.ru", "published": "2025-05-21T07:16:00.500", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json b/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json index a34af4efa43..42254f3667e 100644 --- a/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json +++ b/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json @@ -3,7 +3,7 @@ "sourceIdentifier": "browser-security@yandex-team.ru", "published": "2025-05-21T07:16:00.653", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json index e1cb8e6db71..6f39402b6f5 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4363.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-16T21:15:33.123", "lastModified": "2025-05-19T13:35:20.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json index 9f34a1ea45a..c2b1842ee88 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T12:15:18.307", "lastModified": "2024-11-27T17:15:05.200", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26226.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26226.json index 6bb10683d92..033711d6fd6 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26226.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26226.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A use after free memory corruption issue exists in Yandex Browser for Desktop prior to version 24.4.0.682" + }, + { + "lang": "es", + "value": "Existe un problema de corrupci\u00f3n de memoria use after free en Yandex Browser para Desktop anterior a la versi\u00f3n 24.4.0.682" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json index 91ca3ab1b34..45e616a2b52 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-16T18:15:10.600", "lastModified": "2024-11-21T08:18:30.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6786.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6786.json index eeb23f82817..41b316e0a5b 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6786.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6786.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:29.520", "lastModified": "2025-05-17T04:16:02.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json index 5c4be8389d6..29f4741bbb7 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7086.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:29.950", "lastModified": "2025-05-17T03:15:26.153", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json index e90ac325f45..952846e36dc 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7088.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:30.040", "lastModified": "2025-05-17T03:15:26.553", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json index f3d03793745..c2a801d3d5e 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:30.120", "lastModified": "2025-05-20T15:16:00.430", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json index 4d808c23dbf..6a057507456 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7239.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:30.920", "lastModified": "2025-05-16T17:15:49.190", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json index e7343d10332..e64636fcc31 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7297.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:31.007", "lastModified": "2025-05-16T17:15:49.340", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json index f75eebd6d51..3ed354a699c 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:31.090", "lastModified": "2025-05-16T17:15:49.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json index ab462af277b..d9560a43017 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0970.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:32.200", "lastModified": "2025-05-16T17:15:49.807", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json index d5e75792018..5bd13cab9cb 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10098.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:32.620", "lastModified": "2025-05-20T16:15:24.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json index 1ed297b72c2..280c61a5aa7 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10149.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.037", "lastModified": "2025-05-20T16:15:24.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json index b982747abfd..671b5a3e92a 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json index d1dc1ce5f43..bea1e5c0a16 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.120", "lastModified": "2025-05-20T20:15:27.700", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json index 4f59b663d5b..406e0f82860 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10475.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.207", "lastModified": "2025-05-20T20:15:27.857", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json index a89ef64e4d7..e8d183da3d9 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.380", "lastModified": "2025-05-20T16:15:24.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json index f1fa7b7d8a4..e868a536d71 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10632.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.460", "lastModified": "2025-05-20T20:15:28.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json index f84227e5bb6..e022aa27b28 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.543", "lastModified": "2025-05-20T20:15:28.323", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json index cb61a992b21..bb8a87589dc 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11140.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:33.970", "lastModified": "2025-05-20T16:15:25.250", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json index 596cbda0999..da12a8da4af 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:34.140", "lastModified": "2025-05-20T20:15:29.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json index ab5eb35a18b..45e83e8c4df 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11372.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.013", "lastModified": "2025-05-20T20:15:29.857", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json index dfcc59d70cf..ecf7bc369d0 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:35.193", "lastModified": "2025-05-20T20:15:29.993", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json index eb0d20c1dc1..e9437fe66bb 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11691.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.633", "lastModified": "2025-01-06T18:15:18.373", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json index 9721f431d8f..f3a4d990e33 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.943", "lastModified": "2024-12-13T17:15:05.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11696.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11696.json index fff2d7ba4fc..54deb5e9914 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11696.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11696.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.143", "lastModified": "2024-12-02T18:15:08.253", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11698.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11698.json index 780abe09256..86985da1e84 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11698.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11698.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.330", "lastModified": "2024-11-27T16:15:13.130", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11705.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11705.json index bc5f40a14d5..f1f14e07d82 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11705.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11705.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.997", "lastModified": "2024-11-27T16:15:14.000", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11857.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11857.json index 1525efe37c1..a0a017f6619 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11857.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11857.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bluetooth HCI Adaptor from Realtek has a Link Following vulnerability. Local attackers with regular privileges can create a symbolic link with the same name as a specific file, causing the product to delete arbitrary files pointed to by the link. Subsequently, attackers can leverage arbitrary file deletion to privilege escalation." + }, + { + "lang": "es", + "value": "El adaptador Bluetooth HCI de Realtek presenta una vulnerabilidad de seguimiento de enlaces. Atacantes locales con privilegios regulares pueden crear un enlace simb\u00f3lico con el mismo nombre que un archivo espec\u00edfico, lo que provoca que el producto elimine archivos arbitrarios a los que apunta el enlace. Posteriormente, los atacantes pueden aprovechar la eliminaci\u00f3n arbitraria de archivos para escalar privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12163.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12163.json index 5896039a4bb..bff86e0a10b 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12163.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-30T06:15:29.113", "lastModified": "2025-01-30T16:15:29.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12168.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12168.json index d207fd112e8..fc21e2ef38b 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12168.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12168.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Yandex Telemost for Desktop before 2.7.0\u00a0has a DLL Hijacking Vulnerability because an untrusted search path is used." + }, + { + "lang": "es", + "value": "Yandex Telemost para Desktop anterior a 2.7.0 tiene una vulnerabilidad de secuestro de DLL porque se utiliza una ruta de b\u00fasqueda no confiable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12400.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12400.json index a3dbb9ec7b2..e7932c2bf9d 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12400.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12400.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-30T06:15:29.223", "lastModified": "2025-01-30T16:15:29.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12726.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12726.json index a572d58eba7..8077931227d 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12726.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12726.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:36.467", "lastModified": "2025-05-20T20:15:31.820", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json index 05f1524c350..f4e52c5a0a2 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12873.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.850", "lastModified": "2025-05-20T19:15:48.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12874.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12874.json index 806d00734f2..eca6895cdc8 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12874.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12874.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.927", "lastModified": "2025-05-20T20:15:33.430", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13053.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13053.json index a290c5799f5..8969dd094ab 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13053.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13053.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:38.013", "lastModified": "2025-05-20T20:15:33.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13915.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13915.json index 951a16e786d..a9bedb4ed6d 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13915.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13915.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Android based smartphones from vendors such as Ulefone and\u00a0Kr\u00fcger&Matz contain \"com.pri.factorytest\" application preloaded onto devices during manufacturing process.\nThe application\u00a0\"com.pri.factorytest\"\u00a0(version name: 1.0, version code: 1)\u00a0exposes a \u201dcom.pri.factorytest.emmc.FactoryResetService\u201c service allowing any application to perform a factory reset of the device.\u00a0\nApplication update did not increment the APK version. Instead, it was bundled in OS builds released later than December 2024 (Ulefone) and most probably March 2025 (Kr\u00fcger&Matz, although the vendor has not confirmed it, so newer releases might be vulnerable as well)." + }, + { + "lang": "es", + "value": "Los smartphones Android de fabricantes como Ulefone y Kr\u00fcger&Matz contienen la aplicaci\u00f3n \"com.pri.factorytest\" preinstalada durante el proceso de fabricaci\u00f3n. Esta aplicaci\u00f3n (nombre de la versi\u00f3n: 1.0, c\u00f3digo de la versi\u00f3n: 1) expone el servicio \"com.pri.factorytest.emmc.FactoryResetService\" que permite a cualquier aplicaci\u00f3n restablecer el dispositivo a la configuraci\u00f3n de f\u00e1brica. La actualizaci\u00f3n de la aplicaci\u00f3n no increment\u00f3 la versi\u00f3n del APK. En cambio, se incluy\u00f3 en compilaciones del sistema operativo publicadas despu\u00e9s de diciembre de 2024 (Ulefone) y, muy probablemente, en marzo de 2025 (Kr\u00fcger&Matz, aunque el fabricante no lo ha confirmado, por lo que las versiones m\u00e1s recientes tambi\u00e9n podr\u00edan ser vulnerables)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json index d8e9489ec09..19a44132d3c 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13916.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.android.providers.settings.fingerprint.PriFpShareProvider\u201c content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability" + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n \"com.pri.applock\", preinstalada en los smartphones Kruger&Matz, permite cifrar cualquier aplicaci\u00f3n mediante el c\u00f3digo PIN proporcionado por el usuario o datos biom\u00e9tricos. El m\u00e9todo p\u00fablico \"query()\" del proveedor de contenido \"com.android.providers.settings.fingerprint.PriFpShareProvider\", expuesto, permite que cualquier otra aplicaci\u00f3n maliciosa, sin permisos del sistema Android, extraiga el c\u00f3digo PIN. El proveedor no proporcion\u00f3 informaci\u00f3n sobre las versiones vulnerables. Solo la versi\u00f3n (nombre de la versi\u00f3n: 13, c\u00f3digo de la versi\u00f3n: 33) fue probada y se confirm\u00f3 que presenta esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json index 0fd5858c9be..1f940996e00 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13917.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability" + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n \"com.pri.applock\", preinstalada en los smartphones Kruger&Matz, permite cifrar cualquier aplicaci\u00f3n mediante el c\u00f3digo PIN proporcionado por el usuario o datos biom\u00e9tricos. La actividad expuesta de \"com.pri.applock.LockUI\" permite que cualquier otra aplicaci\u00f3n maliciosa, sin permisos del sistema Android, inyecte una intenci\u00f3n arbitraria con privilegios de sistema en una aplicaci\u00f3n protegida. Es necesario conocer el n\u00famero PIN de protecci\u00f3n (podr\u00eda revelarse mediante la explotaci\u00f3n de CVE-2024-13916) o solicitar al usuario que lo proporcione. El proveedor no proporcion\u00f3 informaci\u00f3n sobre las versiones vulnerables. Solo la versi\u00f3n (nombre de la versi\u00f3n: 13, c\u00f3digo de la versi\u00f3n: 33) fue probada y se confirm\u00f3 que presenta esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1440.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1440.json index 1514b2963cf..e65adce9b5d 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1440.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1440.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site.\n\nBy exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de redirecci\u00f3n abierta en varios productos WSO2 debido a la validaci\u00f3n incorrecta de la URL multiopci\u00f3n en el endpoint de autenticaci\u00f3n cuando esta est\u00e1 habilitada. Un atacante puede crear un enlace v\u00e1lido que redirija a los usuarios a un sitio web controlado por el atacante. Al explotar esta vulnerabilidad, un atacante puede enga\u00f1ar a los usuarios para que visiten una p\u00e1gina maliciosa, lo que permite ataques de phishing para recopilar informaci\u00f3n confidencial o realizar otras acciones da\u00f1inas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22251.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22251.json index 2c66625d3bc..7760dfa1b04 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22251.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22251.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-02-29T01:44:05.870", "lastModified": "2024-11-21T08:55:53.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json index 8003ddb0a7c..a11bcdea37a 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-03-16T05:15:20.830", "lastModified": "2025-02-13T18:16:47.843", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json index 33f5c2e89ce..094ace486e2 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22269.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-05-14T16:16:10.117", "lastModified": "2024-11-21T08:55:55.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22270.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22270.json index 976af069d3c..2a235b172a7 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22270.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22270.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-05-14T16:16:12.613", "lastModified": "2024-11-21T08:55:56.013", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23589.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23589.json index bc646842418..cf27bd19316 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23589.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23589.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs" + }, + { + "lang": "es", + "value": "Debido al algoritmo Hash obsoleto, HCL Glovius Cloud podr\u00eda permitir a los atacantes adivinar los datos de entrada mediante ataques de fuerza bruta o de diccionario de manera eficiente utilizando hardware moderno como GPU o ASIC." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json index a0661508ab1..76fe6589ad4 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:09.993", "lastModified": "2024-11-21T08:58:55.667", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json index 3b779866383..73865709ea7 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T22:15:10.850", "lastModified": "2025-03-27T20:15:23.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json index 14229ac5478..dac5bedb833 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T04:15:12.203", "lastModified": "2024-11-21T09:00:24.440", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json index 068c88ef0ef..f98bdb756f1 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25830.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:16.533", "lastModified": "2024-11-21T09:01:23.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json index 02ebfa087b3..4dbb45647ee 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T08:15:43.410", "lastModified": "2024-11-21T09:02:32.617", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json index 4d69c5446d6..cbf8a941a72 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T01:15:58.833", "lastModified": "2024-11-21T09:02:32.843", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json index 5f6d2b3351d..b5857dd0a0f 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-04-12T07:15:08.560", "lastModified": "2025-02-13T18:17:28.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json index 57f27f5a433..74496311096 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28294.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T21:15:47.910", "lastModified": "2024-11-21T09:06:09.403", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json index bbb7582e5c9..0a7f9973909 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.640", "lastModified": "2024-11-21T09:06:15.217", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json index 597177da8a3..41e82fe835c 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.697", "lastModified": "2024-11-21T09:06:15.450", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json index 6322dbcd9aa..42f41c17aa6 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T21:15:08.077", "lastModified": "2024-11-21T09:06:24.153", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json index fbee0072dcc..f2de8caea92 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:46.410", "lastModified": "2024-11-21T09:06:48.243", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28715.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28715.json index 265b78fbc1f..b52ebebf2a2 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28715.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28715.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T21:15:07.870", "lastModified": "2024-11-21T09:06:48.480", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json index e535cf9a47a..b267d6a804a 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T03:15:10.140", "lastModified": "2024-11-21T09:06:54.030", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28836.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28836.json index fec0fcd2e3e..c2bd2233e93 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28836.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28836.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T03:15:10.350", "lastModified": "2024-11-21T09:07:02.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30166.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30166.json index 844cf0f0a29..d184e9747fe 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30166.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T03:15:10.510", "lastModified": "2024-11-21T09:11:21.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json index 2bad56e80da..ed0e896614f 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.420", "lastModified": "2024-11-21T09:12:37.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json index bc421ebfafe..54bdd4117d8 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:15.947", "lastModified": "2024-11-22T16:15:21.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json index 3e9eb0cbf4c..2622fc50e3b 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3056.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json index b937585e2db..f83399ae30a 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T22:15:07.400", "lastModified": "2024-11-21T09:12:45.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json index 707993ff3db..34a76c90528 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.680", "lastModified": "2024-11-21T09:12:45.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json index fcd2ef108c2..04ff73c0e3c 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.733", "lastModified": "2024-11-21T09:12:45.993", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31613.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31613.json index 8e01acf13ac..93984c9344b 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31613.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31613.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T16:15:13.347", "lastModified": "2024-11-21T09:13:45.743", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json index f1939d294bd..1c67055abd2 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T00:15:10.690", "lastModified": "2024-11-21T09:13:50.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json index b6b53128449..65f17db7525 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T04:15:09.140", "lastModified": "2025-03-13T16:15:19.433", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json index f5de428129b..15fd23b0938 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T04:15:09.200", "lastModified": "2024-11-21T09:13:52.640", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33117.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33117.json index 564b6eb4313..843534a9b47 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33117.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T20:15:10.890", "lastModified": "2024-12-06T21:15:07.340", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json index d0d9def38bc..86065ae5f48 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33300.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:26.910", "lastModified": "2024-11-21T09:16:45.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33809.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33809.json index c8e3f54e448..772fd18ae08 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33809.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33809.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T15:15:24.040", "lastModified": "2025-03-13T15:15:44.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json index 4defe860608..8ed86b81d15 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T01:15:48.577", "lastModified": "2024-11-21T09:18:35.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json index 7e67cb4ffa2..b6d5200e819 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.303", "lastModified": "2024-11-21T09:19:29.667", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json index 9761511c335..1da7251ead0 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.373", "lastModified": "2024-11-21T09:19:29.877", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json index 174a00db430..9da26a28a6b 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T21:15:59.720", "lastModified": "2024-11-21T09:20:13.487", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json index 7adac8bc820..f1d4e52cbbe 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T21:15:59.793", "lastModified": "2024-11-21T09:20:13.697", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json index c54f581df4b..f7cab8f04eb 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T15:15:24.670", "lastModified": "2024-11-21T09:20:31.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3509.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3509.json index 2dcf5b930b4..58a85dd8430 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3509.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3509.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section.\nTo exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users.\n\nWhile this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross site scripting (XSS) almacenado en la consola de administraci\u00f3n de varios productos WSO2 debido a una validaci\u00f3n de entrada insuficiente en el editor de texto enriquecido de la secci\u00f3n de registro. Para explotar esta vulnerabilidad, un agente malicioso debe tener una cuenta de usuario v\u00e1lida con acceso administrativo a la consola de administraci\u00f3n. De tener \u00e9xito, el agente podr\u00eda inyectar payloads persistentes de JavaScript, lo que permite el robo de datos de usuario o la ejecuci\u00f3n de acciones no autorizadas en nombre de otros usuarios. Si bien este problema permite la ejecuci\u00f3n persistente de scripts del lado del cliente, las cookies de sesi\u00f3n permanecen protegidas con el indicador httpOnly, lo que evita el secuestro de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36523.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36523.json index f05d6611708..944378ce560 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36523.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T21:15:50.407", "lastModified": "2024-11-21T09:22:19.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36528.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36528.json index 5f65acb4035..fdd299dbda7 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36528.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T15:15:52.483", "lastModified": "2024-11-21T09:22:20.440", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json index 58b8f0d161f..28b3efb1e41 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36531.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T15:15:52.550", "lastModified": "2024-11-21T09:22:20.657", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json index a217ab06b77..7a4cd769b91 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T19:16:07.697", "lastModified": "2024-11-21T09:22:33.263", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json index 140d7037d91..7d2c9b7f4b8 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.653", "lastModified": "2024-11-22T16:15:24.273", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json index cf73554f0c9..04b2a4dfb8f 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.743", "lastModified": "2024-11-22T16:15:24.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37665.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37665.json index b25aedae877..1961aa950bc 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37665.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37665.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T21:15:50.503", "lastModified": "2024-11-21T09:24:12.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json index 904bd10a2b0..e77fb9b87d8 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:25.940", "lastModified": "2024-11-21T09:24:16.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json index 228f0098173..68416239760 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.533", "lastModified": "2024-11-21T09:24:17.733", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json index 7b6e4db7d7c..09f0357f97d 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T18:15:04.983", "lastModified": "2024-11-21T09:24:18.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json index 6379d2cf31b..5266e6ab929 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38341.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T16:15:32.847", "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json index 92534e39fcf..87f975f5a94 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38808.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-08-20T08:15:05.023", "lastModified": "2024-11-21T09:26:50.877", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38951.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38951.json index 3819a4625a7..233cc2b843f 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38951.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38951.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T14:15:12.403", "lastModified": "2024-11-21T09:27:00.490", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38952.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38952.json index eb5c62dbda4..10daa3d977d 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38952.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38952.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T14:15:12.517", "lastModified": "2024-11-21T09:27:00.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40112.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40112.json index 57f5df0c0ac..7c9cd6031e5 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40112.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40112.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Local File Inclusion (LFI) vulnerability exists in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before, which allows an attacker to manipulate the \"language\" cookie to include arbitrary files from the server. This vulnerability can be exploited to disclose sensitive information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales (LFI) en Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 y versiones anteriores, que permite a un atacante manipular la cookie de idioma para incluir archivos arbitrarios del servidor. Esta vulnerabilidad puede explotarse para divulgar informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json index 1fc9f3ab4a6..f73ebbe0ee8 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T19:15:32.260", "lastModified": "2025-01-08T19:15:31.043", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json index c0da14a4c77..386959b9d68 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.577", "lastModified": "2025-02-28T22:15:38.717", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json index bea6ddf1e3e..5d42ddf93ff 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.663", "lastModified": "2025-02-28T17:15:15.283", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42190.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42190.json index fe596bf3d53..57d90a2654d 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42190.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42190.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a DLL hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content." + }, + { + "lang": "es", + "value": "HCL Traveler para Microsoft Outlook (HTMO) es susceptible a una vulnerabilidad de secuestro de DLL que podr\u00eda permitir a un atacante modificar o reemplazar la aplicaci\u00f3n con contenido malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42191.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42191.json index bb82acc89f2..45d9e926580 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42191.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42191.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a COM hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content." + }, + { + "lang": "es", + "value": "HCL Traveler para Microsoft Outlook (HTMO) es susceptible a una vulnerabilidad de secuestro de COM que podr\u00eda permitir a un atacante modificar o reemplazar la aplicaci\u00f3n con contenido malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json index 6d98c73cf1c..f5118360f12 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T16:15:07.170", "lastModified": "2024-11-21T09:42:29.233", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json index f6b26503460..3fc4134963a 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45094.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-27T23:15:21.093", "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json index 2c240430c24..c39538d9ef4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45194.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T17:15:15.440", "lastModified": "2024-11-21T18:15:07.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45510.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45510.json index 8ffb0584c11..203ec9bc9d8 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45510.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45510.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T20:15:18.943", "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45511.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45511.json index 0fd68bc5767..4126a614eb5 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45511.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45511.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T19:15:06.123", "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45512.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45512.json index ba7138fbc33..48bcf4ee3b9 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45512.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45512.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T16:15:25.637", "lastModified": "2024-11-21T18:15:07.950", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45513.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45513.json index 38ad41cd359..9bf15cf1233 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45513.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45513.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T17:15:15.793", "lastModified": "2024-11-21T18:15:08.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45514.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45514.json index e035de4a4e0..21165da332f 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45514.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45514.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T16:15:25.820", "lastModified": "2024-11-21T18:15:08.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45516.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45516.json index 95afe14b2cc..9998f5a9939 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45516.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45516.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-14T20:15:20.857", "lastModified": "2025-05-19T15:15:22.270", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45517.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45517.json index 078f1a59d7b..e87e2cfd8e0 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45517.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T17:15:15.967", "lastModified": "2024-11-21T18:15:09.360", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46657.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46657.json index 894a804a645..a1ee16ca6be 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46657.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46657.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T17:15:10.287", "lastModified": "2024-12-11T16:15:11.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json index 9ed8aea5293..ae5381526b8 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48019.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-04T19:15:31.733", "lastModified": "2025-02-07T22:15:12.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json index 3f0eb47bab2..5bd00fa6036 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.843", "lastModified": "2024-10-30T18:35:13.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json index 1d5e44cf431..578fdc25e4e 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48704.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-23T16:15:24.403", "lastModified": "2025-06-02T18:15:23.020", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48877.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48877.json index 6a74310040d..21a2f00f3db 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48877.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48877.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de corrupci\u00f3n de memoria en la implementaci\u00f3n del analizador de registros de tabla de cadenas compartidas de la utilidad xls2csv versi\u00f3n 0.95. Un archivo malformado especialmente manipulado puede provocar un desbordamiento del b\u00fafer del mont\u00f3n. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json index e37997df5d6..1daaa77572c 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49350.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-29T20:15:25.213", "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query." + }, + { + "lang": "es", + "value": "IBM Db2 para Linux, UNIX y Windows (incluye DB2 Connect Server) 11.1.0 a 11.1.4.7, 11.5.0 a 11.5.9 y 12.1.0 a 12.1.1 es vulnerable a una denegaci\u00f3n de servicio, ya que el servidor puede bloquearse en determinadas condiciones con una consulta especialmente manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50599.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50599.json index a898a5baa4a..68cdef509d4 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50599.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50599.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-07T21:15:06.880", "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50625.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50625.json index c2c288689ca..b9ed013da5b 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50625.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50625.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T22:15:22.610", "lastModified": "2024-12-12T02:06:32.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50626.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50626.json index 317b07d7899..42928684395 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50626.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50626.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T22:15:22.733", "lastModified": "2024-12-12T02:06:32.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50627.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50627.json index c29534abbef..88e02fdadbe 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50627.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50627.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T22:15:22.853", "lastModified": "2024-12-11T17:15:17.200", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50628.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50628.json index 4d864c1414b..0394a763449 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50628.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T22:15:22.977", "lastModified": "2024-12-11T17:15:17.350", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json index 31cafe1a3f4..14e2159453b 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.547", "lastModified": "2024-12-03T17:15:11.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json index 4190d6bcca2..73fdade4257 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.637", "lastModified": "2024-12-03T17:15:11.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json index 5711670e44b..019b7dc7a53 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.710", "lastModified": "2024-12-03T17:15:11.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50848.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50848.json index 675d38ceed7..d128e1a8028 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50848.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50848.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T21:15:06.293", "lastModified": "2024-11-19T21:57:32.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json index 89859ae5551..566ec9816c7 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50849.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T21:15:06.360", "lastModified": "2024-11-21T21:15:22.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50920.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50920.json index 1fb6ea7edd6..ee2a0e6a945 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50920.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.290", "lastModified": "2024-12-11T16:15:12.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50921.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50921.json index 83fdee4f56f..3bd2bdf5ee3 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50921.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50921.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.380", "lastModified": "2024-12-12T02:06:39.000", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50924.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50924.json index f29095f2a16..07d05791fbf 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50924.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50924.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.463", "lastModified": "2024-12-12T02:06:39.167", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50928.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50928.json index 8251b6c917e..1d1f983e86a 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50928.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50928.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.550", "lastModified": "2024-12-12T02:06:39.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50929.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50929.json index 3a64a67afa3..d47aba9dff9 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50929.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50929.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.643", "lastModified": "2024-12-11T16:15:13.113", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50930.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50930.json index 068c41aeafc..90185299253 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50930.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50930.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.727", "lastModified": "2024-12-12T02:06:39.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50931.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50931.json index 198021e9e37..c53bf8b7a50 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50931.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50931.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T19:15:30.813", "lastModified": "2024-12-11T16:15:13.317", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5081.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5081.json index dc2639e755c..127e30476f0 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5081.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5081.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-05T06:16:41.383", "lastModified": "2024-08-05T15:35:16.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json index 655ea86d080..93a25f6b0fc 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T16:15:33.043", "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json index cc23c46491e..c96aaa7762d 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51941.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-01-21T22:15:12.447", "lastModified": "2025-01-22T15:15:14.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52035.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52035.json index 8989b10b659..82145d5197a 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52035.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de enteros en la funci\u00f3n Analizador de la Tabla de Asignaci\u00f3n de Archivos de Documentos OLE de catdoc 0.95. Un archivo malformado especialmente manipulado puede provocar da\u00f1os en la memoria del mont\u00f3n. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53552.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53552.json index 7d75d0efb72..39f17ac6e96 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53552.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53552.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T02:15:17.177", "lastModified": "2024-12-11T16:15:14.373", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53907.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53907.json index 082ab1e6236..9472cc4c13c 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53907.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53907.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-06T12:15:17.730", "lastModified": "2024-12-31T18:15:38.657", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json index de8861dc069..4bb8465612c 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53908.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-06T12:15:18.583", "lastModified": "2024-12-06T17:15:12.350", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54028.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54028.json index aeb3a160936..74c76c7105c 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54028.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer underflow vulnerability exists in the OLE Document DIFAT Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de subdesbordamiento de enteros en la funcionalidad del analizador DIFAT de documentos OLE de catdoc 0.95. Un archivo malformado especialmente manipulado puede provocar una corrupci\u00f3n de memoria en el mont\u00f3n. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54663.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54663.json index c3e30718afa..756a1631746 100644 --- a/CVE-2024/CVE-2024-546xx/CVE-2024-54663.json +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54663.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-19T23:15:07.023", "lastModified": "2024-12-31T19:15:47.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56128.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56128.json index 39b23bd3e6e..67e8bc65789 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56128.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56128.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-12-18T14:15:23.277", "lastModified": "2024-12-18T17:15:15.003", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57046.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57046.json index 413aa5865fd..2427dad8794 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57046.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57046.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T15:15:16.783", "lastModified": "2025-02-19T22:15:23.207", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json index d95595bdfdc..c745415b4b4 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57459.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A time-based SQL injection vulnerability exists in mydetailsstudent.php in the CloudClassroom PHP Project 1.0. The myds parameter does not properly validate user input, allowing an attacker to inject arbitrary SQL commands." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL basada en tiempo en mydetailsstudent.php del CloudClassroom PHP Project 1.0. El par\u00e1metro myds no valida correctamente la entrada del usuario, lo que permite a un atacante inyectar comandos SQL arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57529.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57529.json index 87ba2b71920..5a62316e920 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57529.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-21T19:16:07.277", "lastModified": "2025-05-22T19:15:42.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57783.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57783.json index 5f2a42caadd..bd540f16935 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57783.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57783.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The desktop application in Dot through 0.9.3 allows XSS and resultant command execution because user input and LLM output are appended to the DOM with innerHTML (in render.js), and because the Electron window can access Node.js APIs." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n de escritorio en Dot hasta 0.9.3 permite XSS y la ejecuci\u00f3n de comandos resultantes porque la entrada del usuario y la salida LLM se agregan al DOM con innerHTML (en render.js) y porque la ventana Electron puede acceder a las API de Node.js." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6798.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6798.json index 88b5ff95694..0df9c6cb271 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6798.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6798.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:56.450", "lastModified": "2025-05-17T04:16:05.870", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json index 1812365d06f..6ed8cfb2d39 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7073.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7073.json index 2993a5f7515..104303829b7 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7073.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7073.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A server-side request forgery (SSRF) vulnerability exists in multiple WSO2 products due to improper input validation in SOAP admin services. This flaw allows unauthenticated attackers to manipulate server-side requests, enabling access to internal and external resources available through the network or filesystem.\n\nExploitation of this vulnerability could lead to unauthorized access to sensitive data and systems, including resources within private networks, as long as they are reachable by the affected product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de server-side request forgery (SSRF) en varios productos WSO2 debido a una validaci\u00f3n de entrada incorrecta en los servicios de administraci\u00f3n SOAP. Esta falla permite a atacantes no autenticados manipular las solicitudes del lado del servidor, lo que permite el acceso a recursos internos y externos disponibles a trav\u00e9s de la red o el sistema de archivos. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda provocar el acceso no autorizado a datos y sistemas confidenciales, incluidos recursos dentro de redes privadas, siempre que sean accesibles para el producto afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7074.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7074.json index 51b5c74cea7..3b5f2c2347d 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7074.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\n\nBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de carga de archivos arbitrarios en varios productos WSO2 debido a la validaci\u00f3n incorrecta de la entrada del usuario en los servicios de administraci\u00f3n SOAP. Un agente malicioso con privilegios administrativos puede cargar un archivo arbitrario en una ubicaci\u00f3n del servidor controlada por el usuario. Al aprovechar esta vulnerabilidad, un atacante podr\u00eda cargar una carga \u00fatil especialmente manipulada, lo que podr\u00eda provocar una ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor. Su explotaci\u00f3n requiere credenciales de administrador v\u00e1lidas, lo que limita su impacto a usuarios autorizados, pero potencialmente maliciosos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7096.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7096.json index 897ee3cff07..e79b34b9203 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7096.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met:\n * SOAP admin services are accessible to the attacker.\n * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration.\n * At least one custom role exists with non-default permissions.\n * The attacker has knowledge of the custom role and the internal attribute used in the deployment.\n\n\nExploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en varios productos [Nombre del proveedor] debido a una falla en la l\u00f3gica de negocio de los servicios de administraci\u00f3n de SOAP. Un agente malicioso puede crear un nuevo usuario con permisos elevados solo cuando se cumplen todas las siguientes condiciones: * El atacante puede acceder a los servicios de administraci\u00f3n de SOAP. * La implementaci\u00f3n incluye un atributo de uso interno que no forma parte de la configuraci\u00f3n predeterminada del producto WSO2. * Existe al menos un rol personalizado con permisos no predeterminados. * El atacante conoce el rol personalizado y el atributo interno utilizado en la implementaci\u00f3n. Aprovechar esta vulnerabilidad permite a los agentes maliciosos asignar mayores privilegios a usuarios registrados autom\u00e1ticamente, evadiendo as\u00ed los mecanismos de control de acceso previstos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7097.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7097.json index 97ef6839f27..5fbde4231db 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7097.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7097.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.\n\nExploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de autorizaci\u00f3n incorrecta en varios productos WSO2 debido a una falla en el servicio de administraci\u00f3n SOAP, que permite la creaci\u00f3n de cuentas de usuario independientemente de la configuraci\u00f3n de autorregistro. Esta vulnerabilidad permite a actores maliciosos crear nuevas cuentas de usuario sin la debida autorizaci\u00f3n. La explotaci\u00f3n de esta falla podr\u00eda permitir a un atacante crear m\u00faltiples cuentas de usuario con privilegios bajos, obteniendo as\u00ed acceso no autorizado al sistema. Adem\u00e1s, la explotaci\u00f3n continua podr\u00eda provocar el agotamiento de los recursos del sistema mediante la creaci\u00f3n masiva de usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7556.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7556.json index 52a571e0dad..3760165ba28 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7556.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7556.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:56.653", "lastModified": "2025-05-17T04:16:07.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8702.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8702.json index 22a1f7ab509..b6b12ba9f74 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8702.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8702.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:59.710", "lastModified": "2025-05-17T04:16:15.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8759.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8759.json index d1236fd6260..0aabd0ed8f8 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8759.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8759.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:59.877", "lastModified": "2025-05-17T04:16:15.413", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9182.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9182.json index ca7ab61bf0a..826d1589d15 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9182.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9182.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:00.140", "lastModified": "2025-05-17T04:16:16.670", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9236.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9236.json index 1fd2b8942cb..b4968b554e3 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9236.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:00.390", "lastModified": "2025-05-17T04:16:17.077", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9831.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9831.json index d647229eea2..cd2aabb30c7 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9831.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9831.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:01.370", "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9838.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9838.json index 5a12a98a5e0..54a8acb9886 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9838.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9838.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:01.450", "lastModified": "2025-05-16T21:15:34.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9879.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9879.json index e9e7ae37ac4..c859b72cf22 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9879.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9879.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:01.533", "lastModified": "2025-05-16T21:15:34.617", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9882.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9882.json index abbed624173..4129f123a88 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9882.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9882.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:01.620", "lastModified": "2025-05-17T04:16:17.613", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json index 1934cc81fd9..5d99427a123 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0073.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 before r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 before r54p0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Use After Free en Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver permite que un proceso de usuario local sin privilegios realice operaciones de procesamiento de memoria de GPU incorrectas para obtener acceso a memoria ya liberada. Este problema afecta al controlador del kernel de GPU Valhall: desde r53p0 antes de r54p0; controlador del kernel de la arquitectura de GPU Arm 5.\u00aa generaci\u00f3n: desde r53p0 antes de r54p0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0324.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0324.json index 21e7a75d760..fc566645596 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0324.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0324.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged user to gain\u00a0administrator privileges." + }, + { + "lang": "es", + "value": "El framework de VAPIX Device Configuration permiti\u00f3 una escalada de privilegios, haciendo posible que un usuario con menores privilegios obtuviera permisos de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0325.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0325.json index 45cf5d2e056..8f4d69a6e9a 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0325.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0325.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, allowing an attacker\u00a0to block access to the guard tour configuration page in the web interface of the Axis device." + }, + { + "lang": "es", + "value": "Un par\u00e1metro de Guard Tour VAPIX API permit\u00eda el uso de valores arbitrarios y se pod\u00eda llamar incorrectamente, lo que permit\u00eda a un atacante bloquear el acceso a la p\u00e1gina de configuraci\u00f3n de ronda de guardia en la interfaz web del dispositivo Axis." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0329.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0329.json index 3ac2329663b..7ecfa5acc6f 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0329.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0329.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:01.807", "lastModified": "2025-05-20T20:15:41.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0358.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0358.json index cd74ed64028..4c2814f0895 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0358.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0358.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed a privilege escalation, enabling a\u00a0lower-privileged user to gain administrator privileges." + }, + { + "lang": "es", + "value": "Durante una prueba de penetraci\u00f3n anual realizada en nombre de Axis Communication, Truesec descubri\u00f3 una falla en el marco de configuraci\u00f3n del dispositivo VAPIX que permit\u00eda una escalada de privilegios, lo que permiti\u00f3 que un usuario con menores privilegios obtuviera privilegios de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0602.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0602.json index 36fc90cc771..424d9425255 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0602.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0602.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting Compare in Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a Compare en Collaborative Industry Innovator desde la versi\u00f3n 3DEXPERIENCE R2023x hasta la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0691.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0691.json index b9239bb4fe5..9c68aec53df 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0691.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0691.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in permissions component in Devolutions Server 2025.1.10.0 and earlier allows an authenticated user to bypass the \"Edit permission\" permission by bypassing the client side validation." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en el componente de permisos en Devolutions Server 2025.1.10.0 y versiones anteriores permite que un usuario autenticado omita el permiso \"Editar permiso\" al omitir la validaci\u00f3n del lado del cliente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json index 269609ad313..3fbb5f7448a 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0819.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0." + }, + { + "lang": "es", + "value": "La vulnerabilidad Use After Free en Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver permite que un proceso de usuario local sin privilegios realice operaciones de procesamiento de memoria de GPU v\u00e1lidas para obtener acceso a memoria ya liberada. Este problema afecta a los controladores del kernel de GPU Bifrost: de r44p0 a r49p3 y de r50p0 a r51p0; Valhall de Arm Ltd: de r44p0 a r49p3 y de r50p0 a r54p0; Arm 5th Gen GPU Architecture Kernel Driver de Arm: de r44p0 a r49p3 y de r50p0 a r54p0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1033.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1033.json index b3dc3ec8dfe..da666a24dc1 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1033.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1033.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:02.060", "lastModified": "2025-05-20T20:15:41.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json index 88b79a01da8..25f0cbe9613 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1114.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-07T23:15:14.840", "lastModified": "2025-02-10T18:15:33.877", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json index 3f887af524b..21195f1bb31 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T02:15:37.100", "lastModified": "2025-05-14T21:17:06.600", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1235.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1235.json index ced60908619..e739af42c95 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1235.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1235.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970." + }, + { + "lang": "es", + "value": "Un atacante con pocos privilegios puede fijar la fecha de los dispositivos al 19 de enero de 2038 y, por lo tanto, superar el l\u00edmite de 32 bits. Esto provoca que la fecha del switch se retrase al 1 de enero de 1970." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1245.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1245.json index 31bb854c304..79c2a9d0e0d 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1245.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1245.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Vulnerabilidad de restricci\u00f3n de conexi\u00f3n de omisi\u00f3n en Hitachi Infrastructure Analytics Advisor (componente Data Center Analytics), Hitachi Ops Center Analyzer (componente de vista detallada de Hitachi Ops Center Analyzer). Este problema afecta a Hitachi Infrastructure Analytics Advisor: Hitachi Ops Center Analyzer: desde 10.0.0-00 hasta 11.0.4-00." + "value": "Vulnerabilidad de omisi\u00f3n de la restricci\u00f3n de conexi\u00f3n en Hitachi Infrastructure Analytics Advisor (componente Data Center Analytics), Hitachi Ops Center Analyzer (componente de vista detallada de Hitachi Ops Center Analyzer). Este problema afecta a Hitachi Infrastructure Analytics Advisor: Hitachi Ops Center Analyzer: desde 10.0.0-00 hasta 11.0.4-00.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json index 38a50d67ae8..6a0a5fdbd97 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1246.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to access outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r18p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r28p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p3, from r50p0 through r54p0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n incorrecta de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver permite que un proceso de usuario sin privilegios realice operaciones de procesamiento de GPU v\u00e1lidas, incluso mediante WebGL o WebGPU, para acceder fuera de los l\u00edmites del b\u00fafer. Este problema afecta a los controladores de espacio de usuario de GPU Bifrost: de r18p0 a r49p3 y de r50p0 a r51p0; a los controladores de espacio de usuario de GPU Valhall: de r28p0 a r49p3, de r50p0 a r54p0; a los controladores de espacio de usuario de arquitectura de GPU de Arm 5.\u00aa generaci\u00f3n: de r41p0 a r49p3 y de r50p0 a r54p0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1454.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1454.json index 4d167f00206..57c8285ad78 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1454.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1454.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:02.467", "lastModified": "2025-05-16T21:15:34.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1479.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1479.json index 187953c9c3e..4d4fa9dbd5b 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1479.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1479.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An open debug interface was reported in the Legion Space software included on certain Legion devices that could allow a local attacker to execute arbitrary code." + }, + { + "lang": "es", + "value": "Se inform\u00f3 de una interfaz de depuraci\u00f3n abierta en el software Legion Space incluido en ciertos dispositivos Legion que podr\u00eda permitir que un atacante local ejecute c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1484.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1484.json index 6adbf34aef8..373279c02a6 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1484.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1484.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in the media upload component of the Asset \nSuite versions listed below. If successfully exploited an attacker \ncould impact the confidentiality or integrity of the system. An attacker can use this vulnerability to construct a request that will \ncause JavaScript code supplied by the attacker to execute within \nthe user\u2019s browser in the context of that user\u2019s session with the \napplication." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en el componente de carga de medios de las versiones de Asset Suite que se indican a continuaci\u00f3n. Si se explota con \u00e9xito, un atacante podr\u00eda afectar la confidencialidad o la integridad del sistema. Un atacante puede usar esta vulnerabilidad para crear una solicitud que haga que el c\u00f3digo JavaScript proporcionado por el atacante se ejecute en el navegador del usuario durante su sesi\u00f3n en la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1485.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1485.json index 6e217fea32f..5c1fd2ff980 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1485.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1485.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Real Cookie Banner: GDPR & ePrivacy Cookie Consent WordPress plugin before 5.1.6, real-cookie-banner-pro WordPress plugin before 5.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Real Cookie Banner: GDPR & ePrivacy Cookie Consent y real-cookie-banner-pro de WordPress anterior a la versi\u00f3n 5.1.6 no desinfecta ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de cross-site-scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json index 6e7e93f95a6..d9481150cff 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1499.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:24.230", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM InfoSphere Information Server 11.7 stores credential information for database authentication in a cleartext parameter file that could be viewed by an authenticated user." + }, + { + "lang": "es", + "value": "IBM InfoSphere Information Server 11.7 almacena informaci\u00f3n de credenciales para la autenticaci\u00f3n de la base de datos en un archivo de par\u00e1metros de texto sin formato que puede ser visto por un usuario autenticado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1701.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1701.json index 53e86f2c2e5..6574ff09e27 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1701.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1701.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running. From there, attackers with sufficient knowledge of MIM's implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges.\n\nUsers of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client.\n\n\n\nThis issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3" + }, + { + "lang": "es", + "value": "CVE-2025-1701 es una vulnerabilidad de alta gravedad en el servicio MIM Admin. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud especialmente manipulada a trav\u00e9s de la interfaz RMI para ejecutar c\u00f3digo arbitrario con los privilegios del servicio MIM Admin. La interfaz RMI solo es accesible localmente (escuchando en 127.0.0.1), lo que limita el vector de ataque al equipo local. Esto significa que, en un entorno hospitalario correctamente configurado, un atacante ya debe haber comprometido la red y, adem\u00e1s, el sistema donde se ejecuta el servicio MIM Admin. A partir de ah\u00ed, atacantes con conocimiento suficiente de la implementaci\u00f3n, el uso de la librer\u00eda y la funcionalidad de MIM, con acceso para extender la librer\u00eda RMI de MIM, podr\u00edan forzar al servicio MIM Admin a ejecutar comandos en el equipo local con sus privilegios. Los usuarios de productos de software MIM expuestos a trav\u00e9s de RDP o un sistema de virtualizaci\u00f3n de aplicaciones multiusuario deben tener en cuenta que el sistema expuesto es el entorno que aloja el cliente MIM virtualizado. Este problema afecta al Servicio de administraci\u00f3n de MIM: antes de 7.2.13, 7.3.8, 7.4.3" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1750.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1750.json index a75de9718cd..d156d1e2c05 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1750.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1750.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An SQL injection vulnerability exists in the delete function of DuckDBVectorStore in run-llama/llama_index version v0.12.19. This vulnerability allows an attacker to manipulate the ref_doc_id parameter, enabling them to read and write arbitrary files on the server, potentially leading to remote code execution (RCE)." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n de eliminaci\u00f3n de DuckDBVectorStore en la versi\u00f3n v0.12.19 de run-llama/llama_index. Esta vulnerabilidad permite a un atacante manipular el par\u00e1metro ref_doc_id, lo que le permite leer y escribir archivos arbitrarios en el servidor, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1763.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1763.json index 53be49b3320..59323653c1b 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1763.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1763.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user's browser under specific conditions, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab EE que permite ataques de cross-site-scripting y eludir la pol\u00edtica de seguridad de contenido en el navegador de un usuario en condiciones espec\u00edficas, lo que afecta a todas las versiones desde la 16.6 hasta la 17.9.7, la 17.10 hasta la 17.10.5 y la 17.11 hasta la 17.11.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1792.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1792.json index d31e57197dc..d28def57fff 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1792.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1792.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to properly enforce access controls for guest users accessing channel member information, allowing authenticated guest users to view metadata about members of public channels via the channel members API endpoint." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 no implementan correctamente los controles de acceso para los usuarios invitados que acceden a la informaci\u00f3n de los miembros del canal, lo que permite que los usuarios invitados autenticados vean metadatos sobre los miembros de los canales p\u00fablicos a trav\u00e9s del endpoint de la API de miembros del canal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json index 05df4faebb1..763e0b77f4a 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.500", "lastModified": "2025-03-26T17:15:25.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20001.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20001.json index 2882f7d2ce5..672e2d9b5d6 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20001.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An out-of-bounds read vulnerability exists in High-Logic FontCreator 15.0.0.3015. A specially crafted font file can trigger this vulnerability which can lead to disclosure of sensitive information. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites en High-Logic FontCreator 15.0.0.3015. Un archivo de fuente especialmente manipulado puede activar esta vulnerabilidad, lo que puede llevar a la divulgaci\u00f3n de informaci\u00f3n confidencial. Un atacante necesita enga\u00f1ar al usuario para que abra el archivo malicioso y as\u00ed activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20279.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20279.json index 4788646d250..86501010825 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20279.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20279.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to conduct a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web de Cisco Unified CCX podr\u00eda permitir que un atacante remoto autenticado realice un ataque XSS almacenado en un sistema afectado. Para explotar esta vulnerabilidad, el atacante debe tener credenciales administrativas v\u00e1lidas. Esta vulnerabilidad se debe a una depuraci\u00f3n inadecuada de la entrada del usuario en la interfaz de administraci\u00f3n web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un script malicioso a trav\u00e9s de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitirle realizar un ataque XSS almacenado en el sistema afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20672.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20672.json index 835bfbf0a0f..d983633464c 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20672.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20672.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00412257; Issue ID: MSV-3292." + }, + { + "lang": "es", + "value": "En el controlador Bluetooth, existe una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios, requiriendo permisos de ejecuci\u00f3n del usuario. No se requiere la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00412257; ID de problema: MSV-3292." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20673.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20673.json index 18ae379ef75..cd60ea7384e 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20673.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20673.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413200; Issue ID: MSV-3304." + }, + { + "lang": "es", + "value": "En el controlador STA de WLAN, existe un posible fallo del sistema debido a una excepci\u00f3n no detectada. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local, con privilegios de ejecuci\u00f3n de usuario requeridos. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: WCNCR00413200; ID de problema: MSV-3304." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20674.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20674.json index ab2b4307019..443e4948b3f 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20674.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20674.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303." + }, + { + "lang": "es", + "value": "En el controlador del punto de acceso WLAN, existe una forma posible de inyectar un paquete arbitrario debido a la falta de verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: WCNCR00413202; ID de problema: MSV-3303." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20675.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20675.json index e779077aec0..4fed867430c 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20675.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20675.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413201; Issue ID: MSV-3302." + }, + { + "lang": "es", + "value": "En el controlador STA de WLAN, existe un posible fallo del sistema debido a una excepci\u00f3n no detectada. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local, con privilegios de ejecuci\u00f3n de usuario requeridos. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: WCNCR00413201; ID de problema: MSV-3302." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20678.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20678.json index a5aab173a25..71604a3f854 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20678.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20678.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739." + }, + { + "lang": "es", + "value": "En el servicio ims, existe un posible fallo del sistema debido a una gesti\u00f3n incorrecta de errores. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota si un UE se conecta a una estaci\u00f3n base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se requiere la interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: MOLY01394606; ID de problema: MSV-2739." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2203.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2203.json index 635856ae611..4a1bbd285c3 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2203.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:16:05.900", "lastModified": "2025-05-16T19:15:49.473", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json index 3593caa458f..89998523313 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-01-21T22:15:12.863", "lastModified": "2025-01-22T15:15:15.237", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json index 9cadb339f56..2adb3f2dc43 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23196.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-01-21T22:15:12.987", "lastModified": "2025-01-22T15:15:15.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json index a629213549e..4e0c7197bfc 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24015.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T23:15:20.633", "lastModified": "2025-06-04T20:15:22.543", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json index 05e5c61aade..0757b20227d 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-04T11:15:09.107", "lastModified": "2025-02-15T01:15:11.327", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json index 5658cb849d1..9965276002a 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25044.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.317", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Planning Analytics Local 2.0 y 2.1 es vulnerable a ataques de cross site scripting. Esta vulnerabilidad permite a un usuario autenticado incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json index 055a5e538e6..d05d1a3daeb 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:37.257", "lastModified": "2025-03-14T18:15:31.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json index 0b16a7d1191..178d467301c 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:37.370", "lastModified": "2025-03-13T21:15:43.613", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25179.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25179.json index 2dae04b463d..75029beb97f 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25179.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25179.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages." + }, + { + "lang": "es", + "value": "El software instalado y ejecutado como un usuario sin privilegios puede realizar llamadas al sistema de GPU incorrectas para subvertir el hardware de la GPU y escribir en p\u00e1ginas de memoria f\u00edsica arbitrarias." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25426.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25426.json index 7d7af738918..aca13151364 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25426.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25426.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T22:15:40.633", "lastModified": "2025-03-05T17:15:15.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2500.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2500.json index 86bc84a8251..9154bddedbc 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2500.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2500.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in the SOAP Web services of the Asset \nSuite versions listed below. If successfully exploited, an attacker \ncould gain unauthorized access to the product and the time window of a possible password attack could be expanded." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en SOAP Web de las versiones de Asset Suite que se indican a continuaci\u00f3n. Si se explota con \u00e9xito, un atacante podr\u00eda obtener acceso no autorizado al producto y ampliar el plazo para un posible ataque de contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2501.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2501.json index b86077ba2b6..139b70b03cc 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2501.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2501.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An untrusted search path vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges." + }, + { + "lang": "es", + "value": "Se inform\u00f3 de una vulnerabilidad de ruta de b\u00fasqueda no confiable en Lenovo PC Manager que podr\u00eda permitir que un atacante local eleve privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2502.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2502.json index 1a95456df5b..bef648ad964 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2502.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2502.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper default permissions vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges." + }, + { + "lang": "es", + "value": "Se inform\u00f3 de una vulnerabilidad de permisos predeterminados incorrectos en Lenovo PC Manager que podr\u00eda permitir que un atacante local eleve privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2503.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2503.json index c6b1021089e..524d490c699 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2503.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2503.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper permission handling vulnerability was reported in Lenovo PC Manager that could allow a local attacker to perform arbitrary file deletions as an elevated user." + }, + { + "lang": "es", + "value": "Se inform\u00f3 de una vulnerabilidad de manejo inadecuado de permisos en Lenovo PC Manager que podr\u00eda permitir que un atacante local realice eliminaciones arbitrarias de archivos como un usuario elevado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json index c947251a32f..90d1969eb8b 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2518.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-29T20:15:26.137", "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 \n\nis vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query." + }, + { + "lang": "es", + "value": "IBM Db2 para Linux, UNIX y Windows (incluye DB2 Connect Server) 11.5.0 a 11.5.9 y 12.1.0 a 12.1.1 es vulnerable a una denegaci\u00f3n de servicio, ya que el servidor puede bloquearse en determinadas condiciones con una consulta especialmente manipulada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2571.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2571.json index 943edc4b7bf..2b86a726da5 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2571.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2571.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to clear Google OAuth credentials when converting user accounts to bot accounts, allowing attackers to gain unauthorized access to bot accounts via the Google OAuth signup flow." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 no borran las credenciales de Google OAuth al convertir cuentas de usuario en cuentas de bot, lo que permite a los atacantes obtener acceso no autorizado a las cuentas de bot a trav\u00e9s del flujo de registro de Google OAuth." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json index 3ef97af4b5d..9b086b9e4a9 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26013.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T16:15:33.313", "lastModified": "2025-02-21T21:15:24.470", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json index 1587445ac73..a79a5353d87 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T17:15:14.680", "lastModified": "2025-04-17T16:15:34.477", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26047.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26047.json index 8e01416211f..8ad796410ea 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26047.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26047.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T16:15:40.020", "lastModified": "2025-03-06T21:15:15.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26396.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26396.json index 5ed1b05825d..d8d301b19ed 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26396.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26396.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SolarWinds Dameware Mini Remote Control was determined to be affected by Incorrect Permissions Local Privilege Escalation Vulnerability. This vulnerability requires local access and a valid low privilege account to be susceptible to this vulnerability." + }, + { + "lang": "es", + "value": "Se determin\u00f3 que SolarWinds Dameware Mini Remote Control est\u00e1 afectado por la vulnerabilidad de escalada de privilegios locales con permisos incorrectos. Esta vulnerabilidad requiere acceso local y una cuenta v\u00e1lida con pocos privilegios para ser susceptible a ella." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26795.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26795.json index d9db3674826..0fda680857e 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26795.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26795.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un agente no autorizado e inserci\u00f3n de informaci\u00f3n confidencial en archivos de registro en el controlador JDBC de Apache IoTDB. Este problema afecta a iotdb-jdbc: de la versi\u00f3n 0.10.0 a la 1.3.3, y de la versi\u00f3n 2.0.1-beta a la 2.0.2. Se recomienda actualizar a las versiones 2.0.2 y 1.3.4, que solucionan el problema." + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un agente no autorizado e inserci\u00f3n de informaci\u00f3n confidencial en archivos de registro en el controlador JDBC de Apache IoTDB. Este problema afecta a iotdb-jdbc: desde la versi\u00f3n 0.10.0 a la 1.3.3, y de la versi\u00f3n 2.0.1-beta a la 2.0.2. Se recomienda actualizar a las versiones 2.0.2 y 1.3.4, que solucionan el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json index fbfa1a9ec03..b6c33e7d618 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27444.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@joomla.org", "published": "2025-06-04T08:15:21.613", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27445.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27445.json index ca2e6645562..9108e866b07 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27445.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27445.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de path traversal en el componente RSFirewall 2.9.7 - 3.1.5 para Joomla. Esta vulnerabilidad permite a usuarios autenticados leer archivos arbitrarios fuera del directorio root de Joomla. La falla se debe a una depuraci\u00f3n insuficiente de la informaci\u00f3n proporcionada por el usuario en los par\u00e1metros de ruta de archivo, lo que permite a los atacantes explotar secuencias de directory traversal (p. ej., ../) para acceder a archivos confidenciales." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27753.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27753.json index c21634ee86e..4033940da35 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27753.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27753.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A SQLi vulnerability in RSMediaGallery component 1.7.4 - 2.1.6 for Joomla was discovered. The vulnerability is due to the use of unescaped user-supplied parameters in SQL queries within the dashboard component. This allows an authenticated attacker to inject malicious SQL code through unsanitized input fields, which are used directly in SQL queries. Exploiting this flaw can lead to unauthorized database access, data leakage, or modification of records." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad SQLi en el componente RSMediaGallery 1.7.4 - 2.1.6 para Joomla. Esta vulnerabilidad se debe al uso de par\u00e1metros proporcionados por el usuario sin escape en las consultas SQL dentro del componente del panel de control. Esto permite a un atacante autenticado inyectar c\u00f3digo SQL malicioso a trav\u00e9s de campos de entrada no depurados, que se utilizan directamente en las consultas SQL. Explotar esta vulnerabilidad puede provocar acceso no autorizado a la base de datos, fuga de datos o modificaci\u00f3n de registros." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27754.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27754.json index fe4860600aa..728dc20a1da 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27754.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27754.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was discovered. The vulnerability allows authenticated users to inject malicious JavaScript into the plugin's resource. The injected payload is stored by the application and later executed when other users view the affected content." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad XSS almacenado en el componente RSBlog! 1.11.6 - 1.14.4 para Joomla. Esta vulnerabilidad permite a usuarios autenticados inyectar JavaScript malicioso en el recurso del complemento. La aplicaci\u00f3n almacena el payload inyectado y lo ejecuta posteriormente cuando otros usuarios visualizan el contenido afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27811.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27811.json index d5bc938b940..83a07c72dff 100644 --- a/CVE-2025/CVE-2025-278xx/CVE-2025-27811.json +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27811.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-04T14:15:28.260", "lastModified": "2025-06-04T19:15:25.043", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation in the razer_elevation_service.exe in Razer Synapse 4 through 4.0.86.2502180127 allows a local attacker to escalate their privileges via a vulnerable COM interface in the target service." + }, + { + "lang": "es", + "value": "Una escalada de privilegios local en razer_elevation_service.exe en Razer Synapse 4 a 4.0.86.2502180127 permite que un atacante local escale sus privilegios a trav\u00e9s de una interfaz COM vulnerable en el servicio de destino." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json index 6e2d6d78430..3bcc780c1fa 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T03:15:16.097", "lastModified": "2025-04-11T20:15:22.937", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json index 0187856cc70..941cbd563ac 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T04:15:18.943", "lastModified": "2025-04-11T20:15:23.677", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json index 20a6a5dce97..3f9ad4cb79c 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T04:15:20.793", "lastModified": "2025-04-11T20:15:23.793", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2817.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2817.json index 3b6d18fac5b..839e7cecc61 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2817.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2817.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-04-29T14:15:32.220", "lastModified": "2025-05-02T13:53:49.480", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2830.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2830.json index 0462137f0fc..a3e77217a40 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2830.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2830.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-04-15T15:16:08.957", "lastModified": "2025-04-15T19:16:07.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json index a94d4a8ce5e..3d9bc6de1d6 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2896.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.483", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Planning Analytics Local 2.0 y 2.1 es vulnerable a ataques de cross site scripting. Esta vulnerabilidad permite a un usuario autenticado incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29720.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29720.json index b7e8b14127c..25046255790 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29720.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29720.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-04-14T17:15:26.880", "lastModified": "2025-04-15T18:39:27.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29785.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29785.json index 6a9918da3c7..f631d6c9f81 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29785.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29785.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "quic-go is an implementation of the QUIC protocol in Go. The loss recovery logic for path probe packets that was added in the v0.50.0 release can be used to trigger a nil-pointer dereference by a malicious QUIC client. In order to do so, the attacker first sends valid QUIC packets from different remote addresses (thereby triggering the newly added path validation logic: the server sends path probe packets), and then sending ACKs for packets received from the server specifically crafted to trigger the nil-pointer dereference. v0.50.1 contains a patch that fixes the vulnerability. This release contains a test that generates random sequences of sent packets (both regular and path probe packets), that was used to verify that the patch actually covers all corner cases. No known workarounds are available." + }, + { + "lang": "es", + "value": "quic-go es una implementaci\u00f3n del protocolo QUIC en Go. La l\u00f3gica de recuperaci\u00f3n de p\u00e9rdidas para paquetes de sondeo de ruta, a\u00f1adida en la versi\u00f3n v0.50.0, puede utilizarse para que un cliente QUIC malicioso active una desreferencia de puntero nulo. Para ello, el atacante primero env\u00eda paquetes QUIC v\u00e1lidos desde diferentes direcciones remotas (activando as\u00ed la nueva l\u00f3gica de validaci\u00f3n de ruta: el servidor env\u00eda paquetes de sondeo de ruta) y, a continuaci\u00f3n, env\u00eda ACKs para los paquetes recibidos del servidor, dise\u00f1ados espec\u00edficamente para activar la desreferencia de puntero nulo. La versi\u00f3n v0.50.1 incluye un parche que corrige la vulnerabilidad. Esta versi\u00f3n incluye una prueba que genera secuencias aleatorias de paquetes enviados (tanto paquetes normales como de sondeo de ruta), que se utiliz\u00f3 para verificar que el parche cubre todos los casos excepcionales. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30084.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30084.json index 895829f7026..2923cdaa26f 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30084.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored XSS vulnerability in RSMail! component 1.19.20 - 1.22.26 for Joomla was discovered. The issue occurs within the dashboard component, where user-supplied input is not properly sanitized before being stored and rendered. An attacker can inject malicious JavaScript code into text fields or other input points, which is subsequently executed in the browser of any user who clicks on the crafted text in the dashboard." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de XSS almacenado en el componente RSMail! 1.19.20 - 1.22.26 para Joomla. El problema ocurre en el componente del panel de control, donde la informaci\u00f3n proporcionada por el usuario no se depura correctamente antes de almacenarse y renderizarse. Un atacante puede inyectar c\u00f3digo JavaScript malicioso en campos de texto u otros puntos de entrada, que posteriormente se ejecuta en el navegador de cualquier usuario que haga clic en el texto manipulado en el panel de control." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json index 6664e948a03..bccbb474034 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30087.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:26.540", "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30315.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30315.json index 576f0d7b779..6f530168972 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30315.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30315.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Las versiones 12.8 y anteriores de Adobe Connect se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado que un atacante podr\u00eda aprovechar para inyectar scripts maliciosos en campos de formulario vulnerables. JavaScript malicioso podr\u00eda ejecutarse en el navegador de la v\u00edctima al acceder a la p\u00e1gina que contiene el campo vulnerable." + "value": "Las versiones 12.8 y anteriores de Adobe Connect se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante podr\u00eda aprovechar para inyectar scripts maliciosos en campos de formulario vulnerables. Podr\u00eda ejecutarse JavaScript malicioso en el navegador de la v\u00edctima al acceder a la p\u00e1gina que contiene el campo vulnerable.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json index 36e7c11bc60..b82a868dbc6 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30415.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Denial of service due to improper handling of malformed input. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 40077." + }, + { + "lang": "es", + "value": "Denegaci\u00f3n de servicio debido al manejo inadecuado de entradas malformadas. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) anterior a la compilaci\u00f3n 40077." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json index baba2f423c1..c97186b2106 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3050.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-29T20:15:26.690", "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 could allow an authenticated user to cause a denial of service when using Q replication due to the improper allocation of CPU resources." + }, + { + "lang": "es", + "value": "IBM Db2 para Linux, UNIX y Windows (incluye DB2 Connect Server) 11.5.0 a 11.5.9 y 12.1.0 a 12.1.1 podr\u00eda permitir que un usuario autenticado provoque una denegaci\u00f3n de servicio al utilizar la replicaci\u00f3n Q debido a la asignaci\u00f3n incorrecta de recursos de CPU." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31329.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31329.json index 5158d93bf39..d779105ff20 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31329.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31329.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "SAP NetWeaver es vulnerable a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n causada por la inyecci\u00f3n de instrucciones maliciosas en la configuraci\u00f3n del usuario. Un atacante con privilegios administrativos puede manipular estas instrucciones para que, al acceder a ellas, la v\u00edctima exponga informaci\u00f3n confidencial, como las credenciales del usuario. Estas credenciales pueden utilizarse para obtener acceso no autorizado a sistemas locales o adyacentes. Esto tiene un alto impacto en la confidencialidad, sin efectos significativos en la integridad ni la disponibilidad." + "value": "SAP NetWeaver es afectado por una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n causada por la inyecci\u00f3n de instrucciones maliciosas en la configuraci\u00f3n del usuario. Un atacante con privilegios de administrador puede manipular estas instrucciones para que, al acceder a ellas, la v\u00edctima exponga informaci\u00f3n confidencial, como las credenciales del usuario. Estas credenciales pueden utilizarse para obtener acceso no autorizado a sistemas locales o adyacentes. Esto tiene un alto impacto en la confidencialidad, sin efectos significativos en la integridad ni la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json index 6a251637859..c5ab06c9923 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31500.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:26.700", "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json index 6e0b4b90043..313a1d2853f 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31501.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:26.857", "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json index 254b00ff955..0c07e5a2f1b 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32105.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T17:15:21.720", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json index c718ed6fc6d..58d23453b03 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T17:15:21.890", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32354.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32354.json index 268d899ae36..3c3c08c6a4f 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32354.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32354.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-04-29T16:15:34.770", "lastModified": "2025-05-06T16:15:28.150", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json index dd988604933..afbdb3a889f 100644 --- a/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-18T13:15:58.177", "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json index 11cdbf7735d..17cc7fb84af 100644 --- a/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-18T16:15:23.627", "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3230.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3230.json index 13fbabeaa2b..69360739623 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3230.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3230.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly invalidate personal access tokens upon user deactivation, allowing deactivated users to maintain full system access by exploiting access token validation flaws via continued usage of previously issued tokens." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 no invalidan correctamente los tokens de acceso personal tras la desactivaci\u00f3n del usuario, lo que permite que los usuarios desactivados mantengan acceso completo al sistema explotando fallas de validaci\u00f3n de tokens de acceso mediante el uso continuo de tokens emitidos previamente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3260.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3260.json index 7c10210295d..c726ecf6e20 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3260.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3260.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1).\n\nImpact:\n\n- Viewers can view all dashboards/folders regardless of permissions\n\n- Editors can view/edit/delete all dashboards/folders regardless of permissions\n\n- Editors can create dashboards in any folder regardless of permissions\n\n- Anonymous users with viewer/editor roles are similarly affected\n\nOrganization isolation boundaries remain intact. The vulnerability only affects dashboard access and does not grant access to datasources." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de seguridad en los endpoints /apis/dashboard.grafana.app/* permite a los usuarios autenticados eludir los permisos de los paneles y carpetas. La vulnerabilidad afecta a todas las versiones de la API (v0alpha1, v1alpha1, v2alpha1). Impacto: - Los usuarios pueden ver todos los paneles y carpetas, independientemente de sus permisos. - Los editores pueden ver, editar y eliminar todos los paneles y carpetas, independientemente de sus permisos. - Los editores pueden crear paneles en cualquier carpeta, independientemente de sus permisos. - Los usuarios an\u00f3nimos con roles de usuario/editor se ven afectados de forma similar. Los l\u00edmites de aislamiento de la organizaci\u00f3n se mantienen intactos. La vulnerabilidad solo afecta al acceso al panel y no a las fuentes de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json index ae18d534bfb..741b97d10db 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33004.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.643", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Planning Analytics Local 2.0 and 2.1 could allow a privileged user to delete files from directories due to improper pathname restriction." + }, + { + "lang": "es", + "value": "IBM Planning Analytics Local 2.0 y 2.1 podr\u00edan permitir que un usuario privilegiado elimine archivos de directorios debido a una restricci\u00f3n de ruta incorrecta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json index c291929966e..dfb4a77af93 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33005.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-06-01T12:15:25.807", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Planning Analytics Local 2.0 and 2.1 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system." + }, + { + "lang": "es", + "value": "IBM Planning Analytics Local 2.0 y 2.1 no invalida la sesi\u00f3n despu\u00e9s de un cierre de sesi\u00f3n, lo que podr\u00eda permitir que un usuario autenticado se haga pasar por otro usuario en el sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33043.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33043.json index 0610b4997fb..5d6d034afb0 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33043.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33043.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "APTIOV contiene una vulnerabilidad en la BIOS que permite a un atacante causar una validaci\u00f3n de entrada incorrecta localmente. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda afectar la integridad." + "value": "APTIOV contiene una vulnerabilidad en la BIOS que permite a un atacante causar una validaci\u00f3n de entrada incorrecta localmente. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda afectar a la integridad.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json index c1e867cb3da..32945c2c5da 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33079.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-27T02:15:19.393", "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json index 412d35d1c7d..27da729146b 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3357.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-05-28T15:15:24.737", "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3454.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3454.json index ef2cf77f203..957de0ead52 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3454.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3454.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.\n\nUsers with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.\n\nThe issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad en la API de proxy de origen de datos de Grafana permite omitir las comprobaciones de autorizaci\u00f3n a\u00f1adiendo una barra diagonal adicional en la ruta URL. Los usuarios con permisos m\u00ednimos podr\u00edan obtener acceso de lectura no autorizado a los endpoints GET en los or\u00edgenes de datos de Alertmanager y Prometheus. El problema afecta principalmente a los or\u00edgenes de datos que implementan permisos espec\u00edficos de ruta, como Alertmanager y algunos or\u00edgenes de datos basados en Prometheus." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3522.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3522.json index e8b855b15a4..598e90ef102 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3522.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3522.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-04-15T15:16:09.877", "lastModified": "2025-04-15T19:16:08.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3523.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3523.json index e3ba0dd71c5..b2260d232c4 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3523.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-04-15T15:16:09.957", "lastModified": "2025-04-15T18:39:27.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json index 38497b881fd..e43723fbd6a 100644 --- a/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36572.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-05-28T17:15:24.093", "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json index 6c3c555dfef..2e8197e6887 100644 --- a/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly enforce access control restrictions for System Manager roles, allowing authenticated users with System Manager privileges to view team details they should not have access to via direct API requests to team endpoints, even when explicitly configured with 'No access' to Teams in the System Console." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 no aplican correctamente las restricciones de control de acceso para los roles de administrador del sistema, lo que permite que los usuarios autenticados con privilegios de administrador del sistema vean detalles del equipo a los que no deber\u00edan tener acceso a trav\u00e9s de solicitudes de API directas a los endpoints del equipo, incluso cuando est\u00e1n configurados expl\u00edcitamente con \"Sin acceso\" a los equipos en la Consola del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37089.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37089.json index 3b8d9c64e74..4430611cb0c 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37089.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37089.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection remote code execution vulnerability exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por inyecci\u00f3n de comandos en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37090.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37090.json index 65e9668f8d1..9b614576c50 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37090.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37090.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A server-side request forgery vulnerability\u00a0exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de server-side request forgery en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37091.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37091.json index 75fcf14d1dc..937e16ddd45 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37091.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37091.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection remote code execution vulnerability\u00a0exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por inyecci\u00f3n de comandos en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37092.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37092.json index c47ff7c91a3..916dc5a2ef5 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37092.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37092.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection remote code execution vulnerability exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por inyecci\u00f3n de comandos en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37093.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37093.json index ec2cd76d68e..396b2c5c8fa 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37093.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37093.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An authentication bypass vulnerability\u00a0exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37094.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37094.json index 571015e5eb9..51a5eb875c9 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37094.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37094.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A directory traversal arbitrary file deletion vulnerability\u00a0exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos mediante directory traversal en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37095.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37095.json index f921950aaf5..9c4a7592091 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37095.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A directory traversal information disclosure vulnerability\u00a0exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de directory traversal en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37096.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37096.json index 9e30c2b4f3c..85e5d8b2dc4 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37096.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection remote code execution vulnerability exists in HPE StoreOnce Software." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por inyecci\u00f3n de comandos en el software HPE StoreOnce." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-37xx/CVE-2025-3768.json b/CVE-2025/CVE-2025-37xx/CVE-2025-3768.json index 3d638078daa..9affad9e37f 100644 --- a/CVE-2025/CVE-2025-37xx/CVE-2025-3768.json +++ b/CVE-2025/CVE-2025-37xx/CVE-2025-3768.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in Tor network blocking feature in Devolutions Server 2025.1.10.0 and earlier allows an authenticated user to bypass the tor blocking feature when the Devolutions hosted endpoint is not reachable." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en la funci\u00f3n de bloqueo de la red Tor en Devolutions Server 2025.1.10.0 y versiones anteriores permite que un usuario autenticado omita la funci\u00f3n de bloqueo de Tor cuando el endpoint alojado en Devolutions no es accesible." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3813.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3813.json index 6dbca1d2d08..3c9bebf97a2 100644 --- a/CVE-2025/CVE-2025-38xx/CVE-2025-3813.json +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3813.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018_elementor_data\u2019 parameter in all versions up to, and including, 1.7.1020 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro '_elementor_data' en todas las versiones hasta la 1.7.1020 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3878.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3878.json index b4980ec9ba0..d7ce36c93e3 100644 --- a/CVE-2025/CVE-2025-38xx/CVE-2025-3878.json +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3878.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento SMS Alert Order Notifications \u2013 WooCommerce para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del shortcode sa_verify del plugin en todas las versiones hasta la 3.8.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." + "value": "El complemento SMS Alert Order Notifications \u2013 WooCommerce para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode sa_verify del plugin en todas las versiones hasta la 3.8.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3951.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3951.json index d7508d1b7d6..c0cc970297e 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3951.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3951.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations." + }, + { + "lang": "es", + "value": "El complemento WP-Optimize para WordPress anterior a la versi\u00f3n 4.2.0 no escapa adecuadamente a la entrada del usuario al verificar los estados de compresi\u00f3n de im\u00e1genes, lo que podr\u00eda permitir a los usuarios con rol de administrador realizar ataques de inyecci\u00f3n SQL en el contexto de configuraciones de WordPress de varios sitios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-409xx/CVE-2025-40908.json b/CVE-2025/CVE-2025-409xx/CVE-2025-40908.json index 297e9abc86c..0b06dbdc265 100644 --- a/CVE-2025/CVE-2025-409xx/CVE-2025-40908.json +++ b/CVE-2025/CVE-2025-409xx/CVE-2025-40908.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified" + }, + { + "lang": "es", + "value": "YAML-LibYAML anterior a 0.903.0 para Perl usa 2 argumentos abiertos, lo que permite modificar archivos existentes" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4010.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4010.json index 6fb3bcc6bc6..84a7b4cd71d 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4010.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4010.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Netcom NTC 6200 and NWL 222 series expose a web interface to be configured and set up by operators. Multiple\u00a0endpoints of the web interface are vulnerable to arbitrary command injection and use insecure hardcoded passwords. Remote authenticated attackers can gain arbitrary code execution with elevated privileges." + }, + { + "lang": "es", + "value": "Las series Netcom NTC 6200 y NWL 222 exponen una interfaz web que los operadores pueden configurar. Varios endpoints de la interfaz web son vulnerables a la inyecci\u00f3n de comandos arbitrarios y utilizan contrase\u00f1as inseguras. Atacantes remotos autenticados pueden ejecutar c\u00f3digo arbitrario con privilegios elevados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4103.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4103.json index 8768b744696..9ee54058b39 100644 --- a/CVE-2025/CVE-2025-41xx/CVE-2025-4103.json +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4103.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP-GeoMeta plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the wp_ajax_wpgm_start_geojson_import() function in versions 0.3.4 to 0.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator." + }, + { + "lang": "es", + "value": "El complemento WP-GeoMeta para WordPress es vulnerable a la escalada de privilegios debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n wp_ajax_wpgm_start_geojson_import() en las versiones 0.3.4 a 0.3.5. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, eleven sus privilegios a los de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json index a731b6c1127..7ef11e22037 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4248.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en SourceCodester Simple To-Do List System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /complete_task.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Simple To-Do List System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /complete_task.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json index 8cd2b5dc60d..ae6f5449d22 100644 --- a/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-05T01:15:48.970", "lastModified": "2025-05-05T20:54:19.760", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json index c188b65ba76..1bdbcca3348 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43923.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T15:15:58.767", "lastModified": "2025-06-04T21:15:39.053", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json index ae06958d899..813658d691f 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43924.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T15:15:58.883", "lastModified": "2025-06-04T21:15:39.213", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-440xx/CVE-2025-44040.json b/CVE-2025/CVE-2025-440xx/CVE-2025-44040.json index bdd8f72635b..fc5291827ad 100644 --- a/CVE-2025/CVE-2025-440xx/CVE-2025-44040.json +++ b/CVE-2025/CVE-2025-440xx/CVE-2025-44040.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-21T21:16:03.263", "lastModified": "2025-05-23T15:55:02.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-440xx/CVE-2025-44073.json b/CVE-2025/CVE-2025-440xx/CVE-2025-44073.json index 827446657a0..d9edd2f6ec1 100644 --- a/CVE-2025/CVE-2025-440xx/CVE-2025-44073.json +++ b/CVE-2025/CVE-2025-440xx/CVE-2025-44073.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-06T21:16:19.067", "lastModified": "2025-05-07T14:15:44.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json index f6328e6e272..b9493a0c8d3 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44115.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in Cotonti Siena v0.9.25. Affected by this vulnerability is the file /admin.php?m=config&n=edit&o=core&p=title. The manipulation of the value of title leads to cross-site scripting." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Cotonti Siena v0.9.25. El archivo /admin.php?m=config&n=edit&o=core&p=title se ve afectado. La manipulaci\u00f3n del valor del t\u00edtulo provoca cross-site-scripting." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json index 19644455d61..1823bbc585f 100644 --- a/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T16:15:25.210", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4432.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4432.json index a4ba7840ad0..6448065d6f1 100644 --- a/CVE-2025/CVE-2025-44xx/CVE-2025-4432.json +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4432.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4433.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4433.json index 7e75e7b2621..0ae3120f188 100644 --- a/CVE-2025/CVE-2025-44xx/CVE-2025-4433.json +++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4433.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in user group management in Devolutions Server 2025.1.7.0 and earlier allows a non-administrative user with both \"User Management\" and \"User Group Management\" permissions to perform privilege escalation by adding users to groups with administrative privileges." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en la administraci\u00f3n de grupos de usuarios en Devolutions Server 2025.1.7.0 y versiones anteriores permite que un usuario no administrativo con permisos de \"Administraci\u00f3n de usuarios\" y \"Administraci\u00f3n de grupos de usuarios\" realice una escalada de privilegios agregando usuarios a grupos con privilegios administrativos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-452xx/CVE-2025-45238.json b/CVE-2025/CVE-2025-452xx/CVE-2025-45238.json index 06c6e97aae1..52b98694b47 100644 --- a/CVE-2025/CVE-2025-452xx/CVE-2025-45238.json +++ b/CVE-2025/CVE-2025-452xx/CVE-2025-45238.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T18:15:43.397", "lastModified": "2025-05-06T14:15:37.490", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-452xx/CVE-2025-45239.json b/CVE-2025/CVE-2025-452xx/CVE-2025-45239.json index 32f198ecff5..3bcad70d300 100644 --- a/CVE-2025/CVE-2025-452xx/CVE-2025-45239.json +++ b/CVE-2025/CVE-2025-452xx/CVE-2025-45239.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T18:15:43.510", "lastModified": "2025-05-13T20:15:29.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-452xx/CVE-2025-45240.json b/CVE-2025/CVE-2025-452xx/CVE-2025-45240.json index 1b0104ce510..8915f39ee2e 100644 --- a/CVE-2025/CVE-2025-452xx/CVE-2025-45240.json +++ b/CVE-2025/CVE-2025-452xx/CVE-2025-45240.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-05T17:18:49.733", "lastModified": "2025-05-05T20:54:19.760", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-457xx/CVE-2025-45752.json b/CVE-2025/CVE-2025-457xx/CVE-2025-45752.json index 0bab3e8dd23..64842f3d094 100644 --- a/CVE-2025/CVE-2025-457xx/CVE-2025-45752.json +++ b/CVE-2025/CVE-2025-457xx/CVE-2025-45752.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-21T19:16:08.867", "lastModified": "2025-05-22T19:15:51.100", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-457xx/CVE-2025-45753.json b/CVE-2025/CVE-2025-457xx/CVE-2025-45753.json index b7520afd7ba..b37bca72baf 100644 --- a/CVE-2025/CVE-2025-457xx/CVE-2025-45753.json +++ b/CVE-2025/CVE-2025-457xx/CVE-2025-45753.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-21T21:16:03.403", "lastModified": "2025-05-23T15:55:02.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-457xx/CVE-2025-45755.json b/CVE-2025/CVE-2025-457xx/CVE-2025-45755.json index 71448905d57..3d88b3582c2 100644 --- a/CVE-2025/CVE-2025-457xx/CVE-2025-45755.json +++ b/CVE-2025/CVE-2025-457xx/CVE-2025-45755.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-21T20:15:32.227", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json index d162fbed255..065d9e09ec9 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45854.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T16:15:25.600", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json index a1064b6e348..815c77dd7ed 100644 --- a/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json +++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45997.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T14:15:33.763", "lastModified": "2025-05-28T15:15:24.900", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4568.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4568.json index 0cc4d48e0f9..ef134f83e5c 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4568.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4568.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper neutralization of input provided by an unauthorized user into changes__reference_id parameter in URL allows for boolean-based Blind SQL Injection attacks." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n incorrecta de la entrada proporcionada por un usuario no autorizado en el par\u00e1metro changes__reference_id en la URL permite ataques de inyecci\u00f3n SQL ciega basados en valores booleanos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4590.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4590.json index de8003ba548..ae8829aa197 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4590.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4590.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Daisycon prijsvergelijkers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'daisycon_uitvaart' shortcode in all versions up to, and including, 4.8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Daisycon prijsvergelijkers para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del shortcode 'daisycon_uitvaart' en todas las versiones hasta la 4.8.4 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4595.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4595.json index 026aba86aa6..4c731fea255 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4595.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4595.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The FastSpring plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fastspring/block-fastspringblocks-complete-product-catalog' block in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on the 'color' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento FastSpring para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del bloque 'fastspring/block-fastspringblocks-complete-product-catalog' en todas las versiones hasta la 3.0.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en el atributo 'color'. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4597.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4597.json index d45fb28d827..604945b10ef 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4597.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4597.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Woo Slider Pro \u2013 Drag Drop Slider Builder For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the woo_slide_pro_delete_draft_preview AJAX action in all versions up to, and including, 1.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts." + }, + { + "lang": "es", + "value": "El complemento Woo Slider Pro \u2013 Drag Drop Slider Builder para WooCommerce para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de comprobaci\u00f3n de capacidad en la acci\u00f3n AJAX woo_slide_pro_delete_draft_preview en todas las versiones hasta la 1.12 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, eliminen publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json index 4a4d57891d9..7a7fdf5dd9b 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T14:15:48.880", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46257.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46257.json index db7afc1ba4b..50f40704ea2 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46257.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46257.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in BdThemes Element Pack Pro allows Cross Site Request Forgery.This issue affects Element Pack Pro: from n/a before 8.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en BdThemes Element Pack Pro permite Cross-Site Request Forgery. Este problema afecta a Element Pack Pro: desde n/d antes de 8.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46258.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46258.json index 0a2eb4df2ad..e01fd7254e1 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46258.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46258.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in BdThemes Element Pack Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Element Pack Pro: from n/a before 8.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en BdThemes Element Pack Pro permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Element Pack Pro: desde n/a antes de 8.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-468xx/CVE-2025-46806.json b/CVE-2025/CVE-2025-468xx/CVE-2025-46806.json index 6759482713a..d6b0af08311 100644 --- a/CVE-2025/CVE-2025-468xx/CVE-2025-46806.json +++ b/CVE-2025/CVE-2025-468xx/CVE-2025-46806.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Use of Out-of-range Pointer Offset vulnerability in sslh leads to denial of service on some architectures.This issue affects sslh before 2.2.4." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de uso de desplazamiento de puntero fuera de rango en SSLH conduce a la denegaci\u00f3n de servicio en algunas arquitecturas. Este problema afecta a SSLH anterior a la versi\u00f3n 2.2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-468xx/CVE-2025-46807.json b/CVE-2025/CVE-2025-468xx/CVE-2025-46807.json index cb11200a59e..2d8e84e9882 100644 --- a/CVE-2025/CVE-2025-468xx/CVE-2025-46807.json +++ b/CVE-2025/CVE-2025-468xx/CVE-2025-46807.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Allocation of Resources Without Limits or Throttling vulnerability in sslh allows attackers to easily exhaust the file descriptors in sslh and deny legitimate users service.This issue affects sslh before 2.2.4." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n en SSLH permite a los atacantes agotar f\u00e1cilmente los descriptores de archivos en SSLH y negar el servicio a usuarios leg\u00edtimos. Este problema afecta a SSLH anterior a la versi\u00f3n 2.2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4607.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4607.json index 0adf7c2e59e..230713ace53 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4607.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4607.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover." + }, + { + "lang": "es", + "value": "El complemento PSW Front-end Login & Registration para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.12 incluida, a trav\u00e9s de la funci\u00f3n customer_registration(). Esto se debe al uso de un mecanismo OTP d\u00e9bil y de baja entrop\u00eda en la funci\u00f3n forget(). Esto permite a atacantes no autenticados iniciar el restablecimiento de contrase\u00f1a de cualquier usuario, incluidos los administradores, y elevar sus privilegios para obtener el control total del sitio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4631.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4631.json index 6844fd643b1..283df0ba261 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4631.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4631.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Profitori plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the stocktend_object endpoint in versions 2.0.6.0 to 2.1.1.3. This makes it possible to trigger the save_object_as_user() function for objects whose '_datatype' is set to 'users',. This allows unauthenticated attackers to write arbitrary strings straight into the user\u2019s wp_capabilities meta field, potentially elevating the privileges of an existing user account or a newly created one to that of an administrator." + }, + { + "lang": "es", + "value": "El complemento Profitori para WordPress es vulnerable a la escalada de privilegios debido a la falta de una comprobaci\u00f3n de capacidad en el endpoint stocktend_object en las versiones 2.0.6.0 a 2.1.1.3. Esto permite activar la funci\u00f3n save_object_as_user() para objetos cuyo `_datatype' est\u00e9 configurado como `users`. Esto permite a atacantes no autenticados escribir cadenas arbitrarias directamente en el metacampo `wp_capabilities` del usuario, lo que podr\u00eda elevar los privilegios de una cuenta de usuario existente o de una nueva a los de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4672.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4672.json index 60857065cb7..7eca8b1e8c0 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4672.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4672.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Offsprout Page Builder plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization placed on the permission_callback() function in versions 2.2.1 to 2.15.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to read, create, update or delete any user meta, including flipping their own wp_capabilities to administrator and fully escalate their privileges." + }, + { + "lang": "es", + "value": "El complemento Offsprout Page Builder para WordPress es vulnerable a la escalada de privilegios debido a una autorizaci\u00f3n incorrecta en la funci\u00f3n permission_callback() en las versiones 2.2.1 a 2.15.2. Esto permite a atacantes autenticados, con acceso de colaborador o superior, leer, crear, actualizar o eliminar cualquier metadatos de usuario, incluyendo la conversi\u00f3n de sus propias capacidades de wp_capabilities a administrador y la escalada completa de sus privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4691.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4691.json index 577c3f43c28..7ad1f86d5d3 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4691.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4691.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Free Booking Plugin for Hotels, Restaurants and Car Rentals \u2013 eaSYNC Booking plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.21 via the 'view_request_details' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view the details of any booking request. The vulnerability was partially patched in versions 1.3.18 and 1.3.21." + }, + { + "lang": "es", + "value": "El complemento Free Booking Plugin for Hotels, Restaurants and Car Rentals \u2013 eaSYNC Booking para WordPress es vulnerable a una referencia directa a objetos insegura en todas las versiones hasta la 1.3.21 (incluida) a trav\u00e9s de 'view_request_details' debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto permite que atacantes no autenticados vean los detalles de cualquier solicitud de reserva. La vulnerabilidad se corrigi\u00f3 parcialmente en las versiones 1.3.18 y 1.3.21." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47272.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47272.json index 49e4f1a39de..7e151b08b95 100644 --- a/CVE-2025/CVE-2025-472xx/CVE-2025-47272.json +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47272.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The CE Phoenix eCommerce platform, starting in version 1.0.9.7 and prior to version 1.1.0.3, allowed logged-in users to delete their accounts without requiring password re-authentication. An attacker with temporary access to an authenticated session (e.g., on a shared/public machine) could permanently delete the user\u2019s account without knowledge of the password. This bypass of re-authentication puts users at risk of account loss and data disruption. Version 1.1.0.3 contains a patch for the issue." + }, + { + "lang": "es", + "value": "La plataforma CE Phoenix eCommerce, a partir de la versi\u00f3n 1.0.9.7 y anteriores a la 1.1.0.3, permit\u00eda a los usuarios conectados eliminar sus cuentas sin necesidad de volver a autenticar la contrase\u00f1a. Un atacante con acceso temporal a una sesi\u00f3n autenticada (por ejemplo, en una m\u00e1quina compartida o p\u00fablica) podr\u00eda eliminar permanentemente la cuenta del usuario sin conocer la contrase\u00f1a. Esta omisi\u00f3n de la reautenticaci\u00f3n pone a los usuarios en riesgo de p\u00e9rdida de cuenta e interrupci\u00f3n de datos. La versi\u00f3n 1.1.0.3 incluye un parche para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47288.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47288.json index cdf73be043a..dade86903aa 100644 --- a/CVE-2025/CVE-2025-472xx/CVE-2025-47288.json +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47288.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Discourse Policy plugin gives the ability to confirm users have seen or done something. Prior to version 0.1.1, if there was a policy posted to a public topic that was tied to a private group then the group members could be shown to non-group members. This issue has been patched in version 0.1.1. A workaround involves moving any policy topics with private groups to restricted categories." + }, + { + "lang": "es", + "value": "El complemento Discourse Policy permite confirmar que los usuarios han visto o hecho algo. Antes de la versi\u00f3n 0.1.1, si se publicaba una pol\u00edtica en un tema p\u00fablico vinculado a un grupo privado, los miembros del grupo pod\u00edan mostrarse a quienes no pertenec\u00edan al grupo. Este problema se ha corregido en la versi\u00f3n 0.1.1. Un workaround consiste en mover los temas de pol\u00edtica con grupos privados a categor\u00edas restringidas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json index 2e41d754d16..a2e6f165fa7 100644 --- a/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in CE Phoenix versions 1.0.9.9 through 1.1.0.2 where an attacker can inject malicious JavaScript into the testimonial description field. Once submitted, if the shop owner (admin) approves the testimonial, the script executes in the context of any user visiting the testimonial page. Because the session cookies are not marked with the `HttpOnly` flag, they can be exfiltrated by the attacker \u2014 potentially leading to account takeover. Version 1.1.0.3 fixes the issue." + }, + { + "lang": "es", + "value": "CE Phoenix es una plataforma de comercio electr\u00f3nico gratuita y de c\u00f3digo abierto. Se descubri\u00f3 una vulnerabilidad de Cross-site Scripting (XSS) Almacenado en las versiones 1.0.9.9 a 1.1.0.2 de CE Phoenix, donde un atacante puede inyectar JavaScript malicioso en el campo de descripci\u00f3n del testimonio. Una vez enviado, si el propietario de la tienda (administrador) aprueba el testimonio, el script se ejecuta cuando cualquier usuario visita la p\u00e1gina del testimonio. Dado que las cookies de sesi\u00f3n no est\u00e1n marcadas con el indicador \"HttpOnly\", el atacante puede exfiltrarlas, lo que podr\u00eda provocar el robo de cuentas. La versi\u00f3n 1.1.0.3 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47791.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47791.json index 11557deaeb7..fcb7d6d7aa3 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47791.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47791.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Nextcloud Server es un sistema de nube personal autoalojado. En Nextcloud Server anteriores a las versiones 28.0.13, 29.0.10 y 30.0.3, y en Nextcloud Enterprise Server anteriores a las versiones 28.0.13, 29.0.10 y 30.0.3, un punto final no utilizado para verificar el destinatario de un recurso compartido no estaba protegido correctamente, lo que permit\u00eda redirigir las solicitudes a otro servidor. Este punto final se elimin\u00f3 en Nextcloud Server 28.0.13, 29.0.10 y 30.0.3, y en Nextcloud Enterprise Server 28.0.13, 29.0.10 y 30.0.3. No se conocen workarounds." + "value": "Nextcloud Server es un sistema de nube personal autoalojado. En Nextcloud Server anteriores a las versiones 28.0.13, 29.0.10 y 30.0.3, y en Nextcloud Enterprise Server anteriores a las versiones 28.0.13, 29.0.10 y 30.0.3, un endpoint no utilizado para verificar el destinatario de un recurso compartido no estaba protegido correctamente, lo que permit\u00eda redirigir las solicitudes a otro servidor. Este punto final se elimin\u00f3 en Nextcloud Server 28.0.13, 29.0.10 y 30.0.3, y en Nextcloud Enterprise Server 28.0.13, 29.0.10 y 30.0.3. No se conocen soluciones alternativas.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47814.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47814.json index 5430df374ca..107b5a0880c 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47814.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47814.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-10T22:15:20.193", "lastModified": "2025-05-13T15:15:59.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47815.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47815.json index ff09acdfc70..0d7cc4bad8b 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47815.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47815.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-10T22:15:20.357", "lastModified": "2025-05-12T19:15:51.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47816.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47816.json index 6ad8a4e5455..bc68654eb5d 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47816.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-10T22:15:20.507", "lastModified": "2025-05-12T19:15:51.733", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json index f7a3fba3850..6cc25535c9f 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image." + }, + { + "lang": "es", + "value": "En sistemas operativos IGEL anteriores a la versi\u00f3n 11, el arranque seguro se puede omitir porque el m\u00f3dulo igel-flash-driver verifica incorrectamente una firma criptogr\u00e1fica. En \u00faltima instancia, se puede montar un sistema de archivos root manipulados desde una imagen de SquashFS sin verificar." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47933.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47933.json index 8fe099b0765..d73626c622d 100644 --- a/CVE-2025/CVE-2025-479xx/CVE-2025-47933.json +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47933.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.13.8, 2.14.13, and 3.0.4, an attacker can perform arbitrary actions on behalf of the victim via the API. Due to the improper filtering of URL protocols in the repository page, an attacker can achieve cross-site scripting with permission to edit the repository. This issue has been patched in versions 2.13.8, 2.14.13, and 3.0.4." + }, + { + "lang": "es", + "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. En versiones anteriores a las 2.13.8, 2.14.13 y 3.0.4, un atacante pod\u00eda realizar acciones arbitrarias en nombre de la v\u00edctima a trav\u00e9s de la API. Debido al filtrado incorrecto de los protocolos de URL en la p\u00e1gina del repositorio, un atacante puede realizar ataques de cross-site scripting con permiso para editar el repositorio. Este problema se ha corregido en las versiones 2.13.8, 2.14.13 y 3.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47941.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47941.json index 1a82468fcb9..5e7d980abcb 100644 --- a/CVE-2025/CVE-2025-479xx/CVE-2025-47941.json +++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47941.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "TYPO3 es un sistema de gesti\u00f3n de contenido web de c\u00f3digo abierto basado en PHP. En las versiones de la rama 12.x anteriores a la 12.4.31 LTS y de la rama 13.x anteriores a la 13.4.2 LTS, el cuadro de di\u00e1logo de autenticaci\u00f3n multifactor (MFA) que se muestra al iniciar sesi\u00f3n en el backend puede omitirse debido a la aplicaci\u00f3n insuficiente de las restricciones de acceso en todas las rutas del backend. Para una explotaci\u00f3n exitosa, se requieren credenciales de usuario v\u00e1lidas del backend, ya que la MFA solo puede omitirse tras una autenticaci\u00f3n exitosa. Los usuarios deben actualizar a la versi\u00f3n 12.4.31 LTS o 13.4.12 LTS de TYPO3 para solucionar el problema." + "value": "TYPO3 es un sistema de gesti\u00f3n de contenido web de c\u00f3digo abierto basado en PHP. En las versiones de la rama 12.x anteriores a la 12.4.31 LTS y de la rama 13.x anteriores a la 13.4.2 LTS, el cuadro de di\u00e1logo de autenticaci\u00f3n multifactor (MFA) que se muestra al iniciar sesi\u00f3n en el backend puede omitirse debido a una aplicaci\u00f3n insuficiente de las restricciones de acceso en todas las rutas del backend. Para una explotaci\u00f3n exitosa, se requieren credenciales de usuario v\u00e1lidas del backend, ya que la MFA solo puede omitirse tras una autenticaci\u00f3n exitosa. Los usuarios deben actualizar a la versi\u00f3n 12.4.31 LTS o 13.4.12 LTS de TYPO3 para solucionar el problema.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48063.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48063.json index 2f516aaaf64..77e5a6ef5bd 100644 --- a/CVE-2025/CVE-2025-480xx/CVE-2025-48063.json +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48063.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-21T18:15:53.200", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-481xx/CVE-2025-48175.json b/CVE-2025/CVE-2025-481xx/CVE-2025-48175.json index 485220b6337..f739cb17237 100644 --- a/CVE-2025/CVE-2025-481xx/CVE-2025-48175.json +++ b/CVE-2025/CVE-2025-481xx/CVE-2025-48175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-16T05:15:37.470", "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-483xx/CVE-2025-48331.json b/CVE-2025/CVE-2025-483xx/CVE-2025-48331.json index 2b835c5c356..50b6e4f2e9c 100644 --- a/CVE-2025/CVE-2025-483xx/CVE-2025-48331.json +++ b/CVE-2025/CVE-2025-483xx/CVE-2025-48331.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Vanquish WooCommerce Orders & Customers Exporter allows Retrieve Embedded Sensitive Data.This issue affects WooCommerce Orders & Customers Exporter: from n/a through 5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en los datos enviados en Vanquish WooCommerce Orders & Customers Exporter permite recuperar datos confidenciales integrados. Este problema afecta a WooCommerce Orders & Customers Exporter: desde n/d hasta 5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48493.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48493.json index 1f451af3cbb..392a88cd11f 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48493.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48493.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue." + }, + { + "lang": "es", + "value": "La extensi\u00f3n Redis de Yii 2 proporciona compatibilidad con el almac\u00e9n de claves-valor de Redis para el framework Yii 2.0. Si falla la conexi\u00f3n, la extensi\u00f3n escribe la secuencia de comandos en los registros. Antes de la versi\u00f3n 2.0.20, los par\u00e1metros AUTH se escrib\u00edan en texto plano, exponiendo el nombre de usuario y la contrase\u00f1a. Esto podr\u00eda ser un problema si un atacante tiene acceso a los registros. La versi\u00f3n 2.0.20 soluciona el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48494.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48494.json index 321aded53b5..e822d5e0117 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48494.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48494.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. When using end-to-end encryption, a stored cross-site scripting vulnerability can be exploited by uploading a file with JavaScript code embedded in the filename. After upload and every time someone opens the upload list, the script is then parsed. Prior to version 2.0.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users using a version prior to 2.0.0. If a user is the only authenticated user using Gokapi, they are not affected. This issue has been fixed in v2.0.0. A possible workaround would be to disable end-to-end encryption." + }, + { + "lang": "es", + "value": "Gokapi es un servidor de intercambio de archivos autoalojado con expiraci\u00f3n autom\u00e1tica y compatibilidad con cifrado. Al usar cifrado de extremo a extremo, se puede explotar una vulnerabilidad de cross-site-scripting almacenado al subir un archivo con c\u00f3digo JavaScript incrustado en el nombre. Tras la subida, y cada vez que alguien abre la lista de subidas, se analiza el script. Antes de la versi\u00f3n 2.0.0, no se implementaba un sistema de permisos de usuario, por lo que todos los usuarios autenticados pod\u00edan ver y modificar todos los recursos, incluso con cifrado de extremo a extremo, ya que la clave de cifrado deb\u00eda ser la misma para todos los usuarios de una versi\u00f3n anterior a la 2.0.0. Si un usuario es el \u00fanico autenticado que usa Gokapi, no se ve afectado. Este problema se ha solucionado en la versi\u00f3n 2.0.0. Un posible workaround ser\u00eda desactivar el cifrado de extremo a extremo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48495.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48495.json index 7c9cee99b2a..70ea685e9b0 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48495.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48495.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. By renaming the friendly name of an API key, an authenticated user could inject JS into the API key overview, which would also be executed when another user clicks on his API tab. Prior to version 2.0.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users of versions prior to 2.0.0. If a user is the only authenticated user using Gokapi, they are not affected. This issue has been fixed in v2.0.0. A workaround would be to not open the API page if it is possible that another user might have injected code." + }, + { + "lang": "es", + "value": "Gokapi es un servidor de intercambio de archivos autoalojado con expiraci\u00f3n autom\u00e1tica y compatibilidad con cifrado. Al renombrar el nombre descriptivo de una clave API, un usuario autenticado pod\u00eda inyectar c\u00f3digo JavaScript en la vista general de la clave API, que tambi\u00e9n se ejecutaba al acceder a su pesta\u00f1a de API. Antes de la versi\u00f3n 2.0.0, no se implementaba un sistema de permisos de usuario; por lo tanto, todos los usuarios autenticados pod\u00edan ver y modificar todos los recursos, incluso con cifrado de extremo a extremo, ya que la clave de cifrado deb\u00eda ser la misma para todos los usuarios de versiones anteriores a la 2.0.0. Si un usuario es el \u00fanico autenticado que usa Gokapi, no se ve afectado. Este problema se ha solucionado en la versi\u00f3n 2.0.0. Un workaround ser\u00eda no abrir la p\u00e1gina de la API si existe la posibilidad de que otro usuario haya inyectado c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json index cf512099e47..3024f66afb8 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48734.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-05-28T14:15:34.070", "lastModified": "2025-05-28T18:15:27.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json index 6918f175d50..34d7f4f0a0d 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48743.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-27T03:15:23.487", "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json index 43f34b26d12..a116649ee8b 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48744.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-05-27T03:15:23.707", "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48866.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48866.json index 919eefe65dc..2de0c0c9cd6 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48866.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48866.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action." + }, + { + "lang": "es", + "value": "ModSecurity es un motor de firewall de aplicaciones web (WAF) multiplataforma de c\u00f3digo abierto para Apache, IIS y Nginx. Las versiones anteriores a la 2.9.10 contienen una vulnerabilidad de denegaci\u00f3n de servicio similar a GHSA-859r-vvv8-rm8r/CVE-2025-47947. La acci\u00f3n `sanitiseArg` (y `sanitizeArg`, que es la misma acci\u00f3n pero un alias) es vulnerable a a\u00f1adir un n\u00famero excesivo de argumentos, lo que provoca una denegaci\u00f3n de servicio. La versi\u00f3n 2.9.10 corrige el problema. Como workaround, evite usar reglas que contengan la acci\u00f3n `sanitiseArg` (o `sanitizeArg`)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48882.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48882.json index aa552afe45a..23b3f24bc70 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48882.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48882.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPOffice Math is a library that provides a set of classes to manipulate different formula file formats. Prior to version 0.3.0, loading XML data using the standard `libxml` extension and the `LIBXML_DTDLOAD` flag without additional filtration, leads to XXE. Version 0.3.0 fixes the vulnerability." + }, + { + "lang": "es", + "value": "PHPOffice Math es una librer\u00eda que proporciona un conjunto de clases para manipular diferentes formatos de archivos de f\u00f3rmulas. Antes de la versi\u00f3n 0.3.0, cargar datos XML con la extensi\u00f3n est\u00e1ndar `libxml` y el indicador `LIBXML_DTDLOAD` sin filtrado adicional provocaba XXE. La versi\u00f3n 0.3.0 corrige esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48883.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48883.json index 7c3135ba847..2c3be03a413 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48883.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48883.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Chrome PHP allows users to start playing with chrome/chromium in headless mode from PHP. Prior to version 1.14.0, CSS Selector expressions are not properly encoded, which can lead to XSS (cross-site scripting) vulnerabilities. This is patched in v1.14.0. As a workaround, users can apply encoding manually to their selectors if they are unable to upgrade." + }, + { + "lang": "es", + "value": "Chrome PHP permite a los usuarios empezar a experimentar con Chrome/Chromium en modo headless desde PHP. Antes de la versi\u00f3n 1.14.0, las expresiones del selector CSS no se codificaban correctamente, lo que pod\u00eda provocar vulnerabilidades XSS (cross-site scripting). Esto se solucion\u00f3 en la versi\u00f3n 1.14.0. Como workaround, los usuarios pueden aplicar la codificaci\u00f3n manualmente a sus selectores si no pueden actualizar." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48885.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48885.json index f152ceba8bc..7edb317bc45 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48885.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48885.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "application-urlshortener create shortened URLs for XWiki pages. Versions prior to 1.2.4 are vulnerable to users with view access being able to create arbitrary pages. Any user (even guests) can create these docs, even if they don't exist already. This can enable guest users to denature the structure of wiki pages, by creating 1000's of pages with random name, that then become very difficult to handle by admins. Version 1.2.4 fixes the issue. No known workarounds are available." + }, + { + "lang": "es", + "value": "application-urlshortener crea URLs acortadas para p\u00e1ginas XWiki. Las versiones anteriores a la 1.2.4 son vulnerables a que los usuarios con acceso de vista puedan crear p\u00e1ginas arbitrarias. Cualquier usuario (incluso invitados) puede crear estos documentos, incluso si no existen. Esto puede permitir que los invitados desnaturalicen la estructura de las p\u00e1ginas wiki, creando miles de p\u00e1ginas con nombres aleatorios, que luego se vuelven muy dif\u00edciles de gestionar para los administradores. La versi\u00f3n 1.2.4 soluciona el problema. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json index ce6aa2dfe22..76bd4602489 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "vLLM, an inference and serving engine for large language models (LLMs), has a Regular Expression Denial of Service (ReDoS) vulnerability in the file `vllm/entrypoints/openai/tool_parsers/pythonic_tool_parser.py` of versions 0.6.4 up to but excluding 0.9.0. The root cause is the use of a highly complex and nested regular expression for tool call detection, which can be exploited by an attacker to cause severe performance degradation or make the service unavailable. The pattern contains multiple nested quantifiers, optional groups, and inner repetitions which make it vulnerable to catastrophic backtracking. Version 0.9.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "vLLM, un motor de inferencia y servicio para modelos de lenguaje grandes (LLM), presenta una vulnerabilidad de denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS) en el archivo `vllm/entrypoints/openai/tool_parsers/pythonic_tool_parser.py` de las versiones 0.6.4 a 0.9.0, excepto esta \u00faltima. La causa principal es el uso de una expresi\u00f3n regular anidada y altamente compleja para la detecci\u00f3n de llamadas a herramientas, que un atacante puede explotar para causar una degradaci\u00f3n grave del rendimiento o inhabilitar el servicio. El patr\u00f3n contiene m\u00faltiples cuantificadores anidados, grupos opcionales y repeticiones internas, lo que lo hace vulnerable a un retroceso catastr\u00f3fico. La versi\u00f3n 0.9.0 incluye un parche para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48938.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48938.json index 2d79bde68c8..b244e187991 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48938.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48938.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "go-gh is a collection of Go modules to make authoring GitHub CLI extensions easier. A security vulnerability has been identified in versions prior to 2.12.1 where an attacker-controlled GitHub Enterprise Server could result in executing arbitrary commands on a user's machine by replacing HTTP URLs provided by GitHub with local file paths for browsing. In `2.12.1`, `Browser.Browse()` has been enhanced to allow and disallow a variety of scenarios to avoid opening or executing files on the filesystem without unduly impacting HTTP URLs. No known workarounds are available other than upgrading." + }, + { + "lang": "es", + "value": "go-gh es una colecci\u00f3n de m\u00f3dulos de Go que facilita la creaci\u00f3n de extensiones de la CLI de GitHub. Se identific\u00f3 una vulnerabilidad de seguridad en versiones anteriores a la 2.12.1, donde un servidor de GitHub Enterprise controlado por un atacante pod\u00eda ejecutar comandos arbitrarios en el equipo de un usuario al reemplazar las URL HTTP proporcionadas por GitHub con rutas de archivos locales para la navegaci\u00f3n. En la versi\u00f3n 2.12.1, se mejor\u00f3 `Browser.Browse()` para permitir y deshabilitar diversos escenarios y evitar la apertura o ejecuci\u00f3n de archivos en el sistema de archivos sin afectar negativamente a las URL HTTP. No se conocen workarounds aparte de la actualizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48940.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48940.json index fee734d813d..7648a402bdb 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48940.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48940.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit the vulnerability, the installer must be unlocked (no `install/lock` file present) and the upgrade script must be accessible (by re-installing the forum via access to `install/index.php`; when the forum has not yet been installed; or the attacker is authenticated as a forum administrator). MyBB 1.8.39 resolves this issue." + }, + { + "lang": "es", + "value": "MyBB es un software de foro gratuito y de c\u00f3digo abierto. Antes de la versi\u00f3n 1.8.39, el componente de actualizaci\u00f3n no validaba correctamente la entrada del usuario, lo que permit\u00eda a los atacantes realizar la inclusi\u00f3n local de archivos (LFI) mediante un valor de par\u00e1metro especialmente manipulado. Para explotar esta vulnerabilidad, el instalador debe estar desbloqueado (sin el archivo `install/lock` presente) y el script de actualizaci\u00f3n debe ser accesible (reinstalando el foro mediante el acceso a `install/index.php`; cuando el foro a\u00fan no se haya instalado; o el atacante est\u00e9 autenticado como administrador del foro). MyBB 1.8.39 resuelve este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48941.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48941.json index 89a83b470fb..6b9b40ded38 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48941.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48941.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "MyBB is free and open source forum software. Prior to version 1.8.39, the search component does not validate permissions correctly, which allows attackers to determine the existence of hidden (draft, unapproved, or soft-deleted) threads containing specified text in the title. The visibility state (`mybb_threads.visible` integer column) of threads is not validated in internal search queries, whose result is used to output a general success or failure of the search. While MyBB validates permissions when displaying the final search results, a search operation that internally produces at least one result outputs a redirect response (as a HTTP redirect, or a success message page with delayed redirect, depending on configuration). On the other hand, a search operation that internally produces no results outputs a corresponding message in the response without a redirect. This allows a user to determine whether threads matching title search parameters exist, including draft threads (`visible` with a value of `-2`), soft-deleted threads (`visible` with a value of `-1`), and unapproved threads (`visible` with a value of `0`); in addition to displaying generally visible threads (`visible` with a value of `1`). This vulnerability does not affect other layers of permissions. In order to exploit the vulnerability, the user must have access to the search functionality, and general access to forums containing the thread(s). The vulnerability does not expose the message content of posts. MyBB 1.8.39 resolves this issue." + }, + { + "lang": "es", + "value": "MyBB es un software de foro gratuito y de c\u00f3digo abierto. Antes de la versi\u00f3n 1.8.39, el componente de b\u00fasqueda no validaba correctamente los permisos, lo que permit\u00eda a los atacantes determinar la existencia de hilos ocultos (borradores, no aprobados o eliminados temporalmente) que conten\u00edan el texto especificado en el t\u00edtulo. El estado de visibilidad (columna entera `mybb_threads.visible`) de los hilos no se valida en las consultas de b\u00fasqueda internas, cuyo resultado se utiliza para indicar si la b\u00fasqueda se ha realizado correctamente o no. Si bien MyBB valida los permisos al mostrar los resultados finales de la b\u00fasqueda, una operaci\u00f3n de b\u00fasqueda que produce internamente al menos un resultado genera una respuesta de redirecci\u00f3n (como una redirecci\u00f3n HTTP o una p\u00e1gina de mensaje de \u00e9xito con redirecci\u00f3n retrasada, seg\u00fan la configuraci\u00f3n). Por otro lado, una operaci\u00f3n de b\u00fasqueda que no produce resultados internamente genera un mensaje correspondiente en la respuesta sin redirecci\u00f3n. Esto permite al usuario determinar si existen hilos que coinciden con los par\u00e1metros de b\u00fasqueda de t\u00edtulo, incluyendo borradores (visibles con un valor de -2), hilos eliminados temporalmente (visibles con un valor de -1) e hilos no aprobados (visibles con un valor de 0); adem\u00e1s de mostrar hilos visibles (visibles con un valor de 1). Esta vulnerabilidad no afecta a otras capas de permisos. Para explotarla, el usuario debe tener acceso a la funci\u00f3n de b\u00fasqueda y acceso general a los foros que contienen los hilos. La vulnerabilidad no expone el contenido de los mensajes. MyBB 1.8.39 soluciona este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48942.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48942.json index f3b2c26a567..0432058a271 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48942.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48942.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8.0 up to but excluding 0.9.0, hitting the /v1/completions API with a invalid json_schema as a Guided Param kills the vllm server. This vulnerability is similar GHSA-9hcf-v7m4-6m2j/CVE-2025-48943, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue." + }, + { + "lang": "es", + "value": "vLLM es un motor de inferencia y servicio para modelos de lenguaje grandes (LLM). En las versiones 0.8.0 y 0.9.0, excepto esta, al acceder a la API /v1/completions con un json_schema no v\u00e1lido como par\u00e1metro guiado, se desactiva el servidor vllm. Esta vulnerabilidad es similar a la vulnerabilidad GHSA-9hcf-v7m4-6m2j/CVE-2025-48943, pero para expresiones regulares en lugar de un esquema JSON. La versi\u00f3n 0.9.0 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48943.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48943.json index 12d4d4aeda9..d6dce2b22ce 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48943.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48943.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 up to but excluding 0.9.0 have a Denial of Service (ReDoS) that causes the vLLM server to crash if an invalid regex was provided while using structured output. This vulnerability is similar to GHSA-6qc9-v4r8-22xg/CVE-2025-48942, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue." + }, + { + "lang": "es", + "value": "vLLM es un motor de inferencia y servicio para modelos de lenguaje grandes (LLM). Las versiones 0.8.0 y 0.9.0, excepto esta, presentan una vulnerabilidad de denegaci\u00f3n de servicio (ReDoS) que provoca el bloqueo del servidor vLLM si se proporciona una expresi\u00f3n regular no v\u00e1lida al usar la salida estructurada. Esta vulnerabilidad es similar a GHSA-6qc9-v4r8-22xg/CVE-2025-48942, pero para expresiones regulares en lugar de un esquema JSON. La versi\u00f3n 0.9.0 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48944.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48944.json index f086fa104be..c57bc3e247d 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48944.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48944.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "vLLM is an inference and serving engine for large language models (LLMs). In version 0.8.0 up to but excluding 0.9.0, the vLLM backend used with the /v1/chat/completions OpenAPI endpoint fails to validate unexpected or malformed input in the \"pattern\" and \"type\" fields when the tools functionality is invoked. These inputs are not validated before being compiled or parsed, causing a crash of the inference worker with a single request. The worker will remain down until it is restarted. Version 0.9.0 fixes the issue." + }, + { + "lang": "es", + "value": "vLLM es un motor de inferencia y servicio para modelos de lenguaje grandes (LLM). Desde la versi\u00f3n 0.8.0 hasta la 0.9.0 (excluyendo esta \u00faltima), el backend de vLLM utilizado con el endpoint de OpenAPI /v1/chat/completions no valida entradas inesperadas o incorrectas en los campos \"patr\u00f3n\" y \"tipo\" al invocar la funcionalidad de herramientas. Estas entradas no se validan antes de compilarse o analizarse, lo que provoca un bloqueo del trabajador de inferencia con una sola solicitud. El trabajador permanece inactivo hasta que se reinicia. La versi\u00f3n 0.9.0 corrige este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48946.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48946.json index f438dbb606c..e6e466f6a35 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48946.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48946.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. liboqs prior to version 0.13.0 supports the HQC algorithm, an algorithm with a theoretical design flaw which leads to large numbers of malformed ciphertexts sharing the same implicit rejection value. Currently, no concrete attack on the algorithm is known. However, prospective users of HQC must take extra care when using the algorithm in protocols involving key derivation. In particular, HQC does not provide the same security guarantees as Kyber or ML-KEM. There is currently no patch for the HQC flaw available in liboqs, so HQC is disabled by default in liboqs starting from version 0.13.0. OQS will update its implementation after the HQC team releases an updated algorithm specification." + }, + { + "lang": "es", + "value": "liboqs es una librer\u00eda criptogr\u00e1fica en lenguaje C que proporciona implementaciones de algoritmos de criptograf\u00eda poscu\u00e1ntica. Las versiones anteriores a la 0.13.0 de liboqs son compatibles con el algoritmo HQC, un algoritmo con un fallo de dise\u00f1o te\u00f3rico que provoca que un gran n\u00famero de textos cifrados malformados compartan el mismo valor de rechazo impl\u00edcito. Actualmente, no se conoce ning\u00fan ataque concreto contra el algoritmo. Sin embargo, los futuros usuarios de HQC deben tener especial cuidado al utilizarlo en protocolos que impliquen derivaci\u00f3n de claves. En particular, HQC no ofrece las mismas garant\u00edas de seguridad que Kyber o ML-KEM. Actualmente no hay un parche disponible en liboqs para el fallo de HQC, por lo que HQC est\u00e1 deshabilitado por defecto a partir de la versi\u00f3n 0.13.0. OQS actualizar\u00e1 su implementaci\u00f3n despu\u00e9s de que el equipo de HQC publique una especificaci\u00f3n actualizada del algoritmo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48948.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48948.json index dd59c604c43..c4b04421449 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48948.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48948.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Navidrome is an open source web-based music collection server and streamer. A permission verification flaw in versions prior to 0.56.0 allows any authenticated regular user to bypass authorization checks and perform administrator-only transcoding configuration operations, including creating, modifying, and deleting transcoding settings. In the threat model where administrators are trusted but regular users are not, this vulnerability represents a significant security risk when transcoding is enabled. Version 0.56.0 patches the issue." + }, + { + "lang": "es", + "value": "Navidrome es un servidor y transmisor de m\u00fasica de c\u00f3digo abierto basado en la web. Una falla de verificaci\u00f3n de permisos en versiones anteriores a la 0.56.0 permite a cualquier usuario autenticado eludir las comprobaciones de autorizaci\u00f3n y realizar operaciones de configuraci\u00f3n de transcodificaci\u00f3n exclusivas del administrador, como crear, modificar y eliminar ajustes de transcodificaci\u00f3n. En el modelo de amenaza donde se conf\u00eda en los administradores, pero no en los usuarios, esta vulnerabilidad representa un riesgo de seguridad significativo cuando la transcodificaci\u00f3n est\u00e1 habilitada. La versi\u00f3n 0.56.0 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48949.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48949.json index 1f426c9e29c..eb6bf115ae7 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48949.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48949.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Navidrome is an open source web-based music collection server and streamer. Versions 0.55.0 through 0.55.2 have a vulnerability due to improper input validation on the `role` parameter within the API endpoint `/api/artist`. Attackers can exploit this flaw to inject arbitrary SQL queries, potentially gaining unauthorized access to the backend database and compromising sensitive user information. Version 0.56.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "Navidrome es un servidor y transmisor de m\u00fasica de c\u00f3digo abierto basado en la web. Las versiones 0.55.0 a 0.55.2 presentan una vulnerabilidad debido a una validaci\u00f3n de entrada incorrecta en el par\u00e1metro `role` dentro del endpoint de la API `/api/artist`. Los atacantes pueden explotar esta vulnerabilidad para inyectar consultas SQL arbitrarias, lo que podr\u00eda obtener acceso no autorizado a la base de datos del backend y comprometer informaci\u00f3n confidencial del usuario. La versi\u00f3n 0.56.0 incluye un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48955.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48955.json index 67f35085af4..2982c74be7e 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48955.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48955.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 exposes both access and secret keys in logs without redaction. These credentials are later reused in variable assignments for persistence but do not require logging for debugging or system health purposes. Version 1.50.8 fixes the issue." + }, + { + "lang": "es", + "value": "Para es un servidor/framework backend multiusuario para la persistencia y recuperaci\u00f3n de objetos. Una vulnerabilidad presente en versiones anteriores a la 1.50.8 expone las claves de acceso y secretas en los registros sin censura. Estas credenciales se reutilizan posteriormente en la asignaci\u00f3n de variables para la persistencia, pero no requieren registro para fines de depuraci\u00f3n ni para el mantenimiento del sistema. La versi\u00f3n 1.50.8 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48957.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48957.json index 33c81891e98..b96340dff7a 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48957.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48957.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue." + }, + { + "lang": "es", + "value": "AstrBot es un chatbot de modelo de lenguaje de gran tama\u00f1o y un framework de desarrollo. Una vulnerabilidad de path traversal presente en las versiones 3.4.4 a 3.5.12 podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n, como claves de API para proveedores de LLM, contrase\u00f1as de cuentas y otros datos confidenciales. Esta vulnerabilidad se ha solucionado en la solicitud de incorporaci\u00f3n de cambios n.\u00ba 1676 y est\u00e1 incluida en la versi\u00f3n 3.5.13. Como workaround, los usuarios pueden editar el archivo `cmd_config.json` para desactivar la funci\u00f3n del panel. Sin embargo, se recomienda encarecidamente actualizar a la versi\u00f3n 3.5.13 o posterior para resolver este problema por completo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48958.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48958.json index b0b56509172..098bfb4473a 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48958.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48958.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Froxlor is open source server administration software. Prior to version 2.2.6, an HTML Injection vulnerability in the customer account portal allows an attacker to inject malicious HTML payloads in the email section. This can lead to phishing attacks, credential theft, and reputational damage by redirecting users to malicious external websites. The vulnerability has a medium severity, as it can be exploited through user input without authentication. Version 2.2.6 fixes the issue." + }, + { + "lang": "es", + "value": "Froxlor es un software de administraci\u00f3n de servidores de c\u00f3digo abierto. Antes de la versi\u00f3n 2.2.6, una vulnerabilidad de inyecci\u00f3n HTML en el portal de cuentas de clientes permit\u00eda a un atacante inyectar payloads HTML maliciosos en la secci\u00f3n de correo electr\u00f3nico. Esto puede provocar ataques de phishing, robo de credenciales y da\u00f1os a la reputaci\u00f3n al redirigir a los usuarios a sitios web externos maliciosos. La vulnerabilidad es de gravedad media, ya que puede explotarse mediante la entrada de datos del usuario sin autenticaci\u00f3n. La versi\u00f3n 2.2.6 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json index 0f47bff94ce..1674d18fc84 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48959.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Local privilege escalation due to insecure file permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40077." + }, + { + "lang": "es", + "value": "Escalada de privilegios locales debido a permisos de archivos inseguros. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect Cloud Agent (Windows) anterior a la compilaci\u00f3n 40077." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48960.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48960.json index 2728187bf9a..2f9182ee7fb 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48960.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48960.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Weak server key used for TLS encryption. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938." + }, + { + "lang": "es", + "value": "Se utiliza una clave de servidor d\u00e9bil para el cifrado TLS. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 16 (Linux, macOS, Windows) anterior a la compilaci\u00f3n 39938." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48961.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48961.json index 56c1938d4be..ee5a03dd9c0 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48961.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48961.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39938." + }, + { + "lang": "es", + "value": "Escalada de privilegios locales debido a permisos de carpeta inseguros. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 16 (Windows) anterior a la compilaci\u00f3n 39938." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48962.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48962.json index 17c55947b40..dd43abcecbd 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48962.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48962.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial debido a la SSRF. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 16 (Windows, Linux) anterior a la compilaci\u00f3n 39938." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48990.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48990.json index aa63babf37a..a4b8af62198 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48990.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48990.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NeKernal is a free and open-source operating system stack. Version 0.0.2 has a 1-byte heap overflow in `rt_copy_memory`, which unconditionally wrote a null terminator at `dst[len]`. When `len` equals the size of the destination buffer (256 bytes), that extra `'\\0'` write overruns the buffer by one byte. To avoid breaking existing callers or changing the public API, the patch in commit fb7b7f658327f659c6a6da1af151cb389c2ca4ee takes a minimal approach: it simply removes the overflow-causing line without adding bounds checks or altering the function signature." + }, + { + "lang": "es", + "value": "NeKernal es una pila de sistema operativo libre y de c\u00f3digo abierto. La versi\u00f3n 0.0.2 presenta un desbordamiento de pila de 1 byte en `rt_copy_memory`, que escribi\u00f3 incondicionalmente un terminador nulo en `dst[len]`. Cuando `len` es igual al tama\u00f1o del b\u00fafer de destino (256 bytes), esa escritura adicional `'\\0'` desborda el b\u00fafer en un byte. Para evitar interrumpir las llamadas existentes o modificar la API p\u00fablica, el parche en el commit fb7b7f658327f659c6a6da1af151cb389c2ca4ee adopta un enfoque minimalista: simplemente elimina la l\u00ednea que causa el desbordamiento sin a\u00f1adir comprobaciones de los l\u00edmites ni modificar la firma de la funci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48994.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48994.json index dea83c79f45..e58bcbc594d 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48994.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48994.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML prior to 4.0.4 are vulnerable to a potential algorithm confusion attack. Unless the user explicitly limits the expected signature algorithms using the `signxml.XMLVerifier.verify(expect_config=...)` setting, an attacker may supply a signature unexpectedly signed with a key other than the provided HMAC key, using a different (asymmetric key) signature algorithm. Starting with SignXML 4.0.4, specifying `hmac_key` causes the set of accepted signature algorithms to be restricted to HMAC only, if not already restricted by the user." + }, + { + "lang": "es", + "value": "SignXML es una implementaci\u00f3n del est\u00e1ndar de firma XML del W3C en Python. Al verificar firmas con la validaci\u00f3n de certificado X509 desactivada y el secreto compartido HMAC establecido (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), las versiones de SignXML anteriores a la 4.0.4 son vulnerables a un posible ataque de confusi\u00f3n de algoritmos. A menos que el usuario limite expl\u00edcitamente los algoritmos de firma esperados mediante la opci\u00f3n `signxml.XMLVerifier.verify(expect_config=...)`, un atacante podr\u00eda proporcionar una firma firmada inesperadamente con una clave distinta a la clave HMAC proporcionada, utilizando un algoritmo de firma diferente (clave asim\u00e9trica). A partir de SignXML 4.0.4, especificar `hmac_key` limita el conjunto de algoritmos de firma aceptados a HMAC \u00fanicamente, si el usuario no lo ha hecho ya." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48995.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48995.json index 3c3aeff9cfa..d74e076a02c 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48995.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48995.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML prior to 4.0.4 are vulnerable to a potential timing attack. The verifier may leak information about the correct HMAC when comparing it with the user supplied hash, allowing users to reconstruct the correct HMAC for any data." + }, + { + "lang": "es", + "value": "SignXML es una implementaci\u00f3n del est\u00e1ndar de firma XML del W3C en Python. Al verificar firmas con la validaci\u00f3n de certificado X509 desactivada y el secreto compartido HMAC establecido (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), las versiones de SignXML anteriores a la 4.0.4 son vulnerables a un posible ataque de temporizaci\u00f3n. El verificador puede filtrar informaci\u00f3n sobre el HMAC correcto al compararlo con el hash proporcionado por el usuario, lo que permite a los usuarios reconstruir el HMAC correcto para cualquier dato." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json index eb9629f0c4b..1b9baf8ee64 100644 --- a/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48998.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-03T19:15:39.727", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4857.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4857.json index e170cee05d5..0f3b96d65a7 100644 --- a/CVE-2025/CVE-2025-48xx/CVE-2025-4857.json +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4857.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Newsletters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.9.9.9 via the 'file' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Newsletters para WordPress es vulnerable a la inclusi\u00f3n local de archivos en todas las versiones hasta la 4.9.9.9 (incluida) mediante el par\u00e1metro 'file'. Esto permite a atacantes autenticados, con acceso de administrador o superior, incluir y ejecutar archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en dichos archivos. Esto puede utilizarse para eludir los controles de acceso, obtener datos confidenciales o ejecutar c\u00f3digo cuando se pueden subir e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4872.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4872.json index e7c7fe329df..58f05d21736 100644 --- a/CVE-2025/CVE-2025-48xx/CVE-2025-4872.json +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4872.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en FreeFloat FTP Server 1.0. Se ve afectada una funci\u00f3n desconocida del componente CCC Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en FreeFloat FTP Server 1.0. Afectada a una funci\u00f3n desconocida del componente CCC Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado.\n" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49009.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49009.json index ee735c2834b..b86f22f1f08 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49009.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49009.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 in `FacebookAuthFilter.java` results in a full request URL being logged during a failed request to a Facebook user profile. The log includes the user's access token in plain text. Since WARN-level logs are often retained in production and accessible to operators or log aggregation systems, this poses a risk of token exposure. Version 1.50.8 fixes the issue." + }, + { + "lang": "es", + "value": "Para es un servidor/framework backend multiusuario para la persistencia y recuperaci\u00f3n de objetos. Una vulnerabilidad presente en versiones anteriores a la 1.50.8 en `FacebookAuthFilter.java` provoca el registro de la URL completa de la solicitud durante una solicitud fallida a un perfil de usuario de Facebook. El registro incluye el token de acceso del usuario en texto plano. Dado que los registros de nivel WARN suelen conservarse en producci\u00f3n y son accesibles para operadores o sistemas de agregaci\u00f3n de registros, esto supone un riesgo de exposici\u00f3n del token. La versi\u00f3n 1.50.8 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49112.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49112.json index c40bd9f653f..339a1f84bef 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49112.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49112.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used." + }, + { + "lang": "es", + "value": "setDeferredReply en networking.c en Valkey hasta 8.1.1 tiene un desbordamiento de entero para prev->size - prev->used." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json index 68a3110526c..a81c30780b6 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization." + }, + { + "lang": "es", + "value": "Roundcube Webmail anterior a 1.5.10 y 1.6.x anterior a 1.6.11 permite la ejecuci\u00f3n remota de c\u00f3digo por parte de usuarios autenticados porque el par\u00e1metro _from en una URL no est\u00e1 validado en program/actions/settings/upload.php, lo que lleva a la deserializaci\u00f3n de objetos PHP." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4944.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4944.json index be15ab2ec59..cae89501906 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4944.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4944.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Compare and Google Maps widgets in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento LA-Studio Element Kit para Elementor de WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s de los widgets Comparar im\u00e1genes y Google Maps del complemento en todas las versiones hasta la 1.5.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4967.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4967.json index bd0de7e06da..0d7cd901769 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4967.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4967.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Esri Portal for ArcGIS 11.4 and prior allows a remote, unauthenticated attacker to bypass the Portal\u2019s SSRF protections." + }, + { + "lang": "es", + "value": "Esri Portal para ArcGIS 11.4 y versiones anteriores permiten que un atacante remoto no autenticado evite las protecciones SSRF del Portal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4983.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4983.json index aa8dd4c3232..4b92ea96eb3 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4983.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4983.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting City Referential in City Referential Manager on Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a City Referential en City Referential Manager en la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4984.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4984.json index a1fea1be4be..78c453e2b09 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4984.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4984.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting City Discover in City Referential Manager on Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a City Discover en City Referential Manager en la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4985.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4985.json index a80223eb4df..5c9efeca73d 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4985.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4985.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting Risk Management in Project Portfolio Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a Risk Management en Project Portfolio Manager desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4986.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4986.json index 771f3f0c679..71f9af0ff2c 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4986.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4986.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting Model Definition in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a Model Definition en Product Manager desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4988.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4988.json index 3943405016a..e422a3d8d9a 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4988.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4988.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting Results Analytics in Multidisciplinary Optimization Engineer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a Results Analytics en Multidisciplinary Optimization Engineer desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2024x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4989.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4989.json index 94997bfff5e..ea0f9106ebd 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4989.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4989.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a Requirements en Product Manager desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4990.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4990.json index b49fdc0339d..2aa5cfa12e7 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4990.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4990.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting Change Governance in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a Change Governance en Product Manager desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4991.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4991.json index 1fc0f8ba9f3..c391ed1244f 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4991.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4991.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting 3D Markup in Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a 3D Markup en Collaborative Industry Innovator desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4992.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4992.json index 451a12e8b74..d31e34c4e60 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4992.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4992.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-site Scripting (XSS) vulnerability affecting Service Items Management in Service Process Engineer from Release 3DEXPERIENCE R2024x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-site Scripting (XSS) Almacenado que afecta a Service Items Management en Service Process Engineer desde la versi\u00f3n 3DEXPERIENCE R2024x hasta la versi\u00f3n 3DEXPERIENCE R2025x permite que un atacante ejecute c\u00f3digo de script arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4999.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4999.json index 64ea2ee5d2c..038da025c18 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4999.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4999.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-20T21:15:24.083", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5000.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5000.json index f9f39180c1b..a09786006f0 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5000.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5000.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-20T21:15:24.253", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5016.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5016.json index 7d74caaffdc..09ff03e20de 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5016.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Relevanssi \u2013 A Better Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Excerpt Highlights in all versions up to, and including, 4.24.5 (Free) and 2.27.6 (Premium) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Relevanssi \u2013 A Better Search para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s de los extractos destacados en todas las versiones, hasta la 4.24.5 (Gratuita) y la 2.27.6 (Premium), incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5020.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5020.json index 534947c3870..100d3a31cbe 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5020.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5020.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-05-21T18:15:53.840", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5030.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5030.json index 853a353faaa..04fa01ba703 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5030.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5030.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T17:15:59.333", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5033.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5033.json index 9266893fc65..dc589a86c26 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5033.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5033.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T18:15:53.947", "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5036.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5036.json index 7c2e52ffff4..0f704671248 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5036.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5036.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A maliciously crafted RFA file, when linked or imported into Autodesk Revit, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo RFA manipulado con fines maliciosos, al vincularse o importarse a Autodesk Revit, puede forzar una vulnerabilidad de Use-After-Free. Un agente malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5053.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5053.json index 2077e512bbd..e12a693f547 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5053.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5053.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T21:16:03.970", "lastModified": "2025-05-23T15:55:02.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5054.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5054.json index 41254345985..33102e857e9 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5054.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5054.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces.\n\n\n\n\nWhen handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1)." + }, + { + "lang": "es", + "value": "La condici\u00f3n de ejecuci\u00f3n en Canonical Apport (hasta la versi\u00f3n 2.32.0 incluida) permite a un atacante local filtrar informaci\u00f3n confidencial mediante la reutilizaci\u00f3n de PID aprovechando los espacios de nombres. Al gestionar un fallo, la funci\u00f3n `_check_global_pid_and_forward`, que detecta si el proceso causante del fallo reside en un contenedor, se invocaba antes que `consistency_checks`, que intenta detectar si el proceso causante del fallo ha sido reemplazado. Por ello, si un proceso falla y se reemplaza r\u00e1pidamente por uno contenedorizado, se pod\u00eda ejecutar `apport` para reenviar el volcado de memoria al contenedor, lo que podr\u00eda filtrar informaci\u00f3n confidencial. `consistency_checks` ahora se invoca antes que `_check_global_pid_and_forward`. Adem\u00e1s, dado que la condici\u00f3n de ejecuci\u00f3n de reutilizaci\u00f3n de PID no se puede detectar de forma fiable solo desde el espacio de usuario, los fallos solo se reenv\u00edan a los contenedores si el n\u00facleo proporcion\u00f3 un pidfd o si el proceso causante del fallo no ten\u00eda privilegios (es decir, si el modo de volcado es 1)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5113.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5113.json index ac67c155b24..ffc43bc1479 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5113.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5113.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Diviotec professional series exposes a web interface. One endpoint is vulnerable to arbitrary command injection and hardcoded passwords are used." + }, + { + "lang": "es", + "value": "La serie profesional Diviotec expone una interfaz web. Un endpoint es vulnerable a la inyecci\u00f3n de comandos arbitrarios y se utilizan contrase\u00f1as codificadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5130.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5130.json index b66149e579f..8ad19db0b44 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5130.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5130.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-24T20:15:22.840", "lastModified": "2025-05-28T18:15:28.740", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5132.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5132.json index 16ce4d946f2..09f87690dee 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5132.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-24T21:15:28.977", "lastModified": "2025-05-28T18:15:29.037", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json index a21227b5bf6..2b2b903100c 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T00:15:23.043", "lastModified": "2025-05-28T18:15:29.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5190.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5190.json index 7090256b05d..2f70b443ee5 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5190.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5190.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Browse As plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2. This is due to incorrect authentication checking in the 'IS_BA_Browse_As::notice' function with the 'is_ba_original_user_COOKIEHASH' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the user id." + }, + { + "lang": "es", + "value": "El complemento Browse As para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 0.2 incluida. Esto se debe a una comprobaci\u00f3n de autenticaci\u00f3n incorrecta en la funci\u00f3n 'IS_BA_Browse_As::notice' con el valor de cookie 'is_ba_original_user_COOKIEHASH'. Esto permite que atacantes autenticados, con permisos de suscriptor o superiores, inicien sesi\u00f3n como cualquier usuario del sitio, como un administrador, si tienen acceso al ID de usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json index 3e2257ad8ad..567a11b5809 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5219.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T01:15:19.493", "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json index a9528dadd58..6fc70ad5f6d 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5220.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T02:15:20.053", "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5222.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5222.json index 1036a2887a1..088095578b7 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5222.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5222.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json index 3082ee1a576..864d834f716 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5252.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T18:15:31.763", "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5285.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5285.json index 0ba88a44076..e33c997ed15 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5285.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5285.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Product Subtitle for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018htmlTag\u2019 parameter in all versions up to, and including, 1.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Product Subtitle para WooCommerce de WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro \"htmlTag\" en todas las versiones hasta la 1.3.9 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5290.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5290.json index 53ce7e12f82..4a3e9fbf3a5 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5290.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5290.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Borderless \u2013 Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018title\u2019 parameter in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Borderless \u2013 Elementor Addons and Templates para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro 'title' en todas las versiones hasta la 1.7.1 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5292.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5292.json index 1080c8a6e0e..58142737a0b 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5292.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5292.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Element Pack Addons for Elementor \u2013 Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'marker_content\u2019 parameter in all versions up to, and including, 5.11.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Element Pack Addons for Elementor \u2013 Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder para WordPress es vulnerable a cross-site-scripting almacenado a trav\u00e9s del par\u00e1metro 'marker_content' en todas las versiones hasta la 5.11.2 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json index 2654108480b..677094618be 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5325.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in zhilink \u667a\u4e92\u8054(\u6df1\u5733)\u79d1\u6280\u6709\u9650\u516c\u53f8 ADP Application Developer Platform \u5e94\u7528\u5f00\u53d1\u8005\u5e73\u53f0 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /adpweb/a/ica/api/service/rfa/testService. The manipulation leads to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en zhilink ???(??)?????? ADP Application Developer Platform ??????? versi\u00f3n 1.0.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /adpweb/a/ica/api/service/rfa/testService. La manipulaci\u00f3n provoca la neutralizaci\u00f3n indebida de elementos especiales utilizados en un motor de plantillas. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5326.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5326.json index 79d3ee3ecc3..53cad9c4dc5 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5326.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5326.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in zhilink \u667a\u4e92\u8054(\u6df1\u5733)\u79d1\u6280\u6709\u9650\u516c\u53f8 ADP Application Developer Platform \u5e94\u7528\u5f00\u53d1\u8005\u5e73\u53f0 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file /adpweb/wechat/verifyToken/. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en zhilink ???(??)?????? ADP Application Developer Platform ??????? versi\u00f3n 1.0.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /adpweb/wechat/verifyToken/. La manipulaci\u00f3n provoca la deserializaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5341.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5341.json index 5d139a998f5..43ac3485e00 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5341.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5341.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id' and 'data-size\u2019 parameters in all versions up to, and including, 1.44.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los par\u00e1metros \"id\" y \"data-size\" en todas las versiones hasta la 1.44.1 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5356.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5356.json index d0dcd5af74c..d9e1535118f 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5356.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5356.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component BYE Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del componente BYE Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5357.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5357.json index 566b7c67b66..1fd3fdba063 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5357.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5357.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component PWD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente PWD Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json index cd565107e0a..c87f970ed23 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul/Campcodes Cyber Cafe Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /bwdates-reports-details.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json index ec0c41266be..ddca7f39764 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Campcodes Online Hospital Management System 1.0. This affects an unknown part of the file /appointment-history.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Campcodes Online Hospital Management System 1.0. Esta afecta a una parte desconocida del archivo /appointment-history.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json index f135c39494e..855b94d8b4f 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5369.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T05:15:19.087", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester PHP Display Username After Login 1.0. Affected is an unknown function of the file /login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en SourceCodester PHP Display Username After Login 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /login.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json index 571d43477fd..c575f6f45bc 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5370.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T06:15:19.887", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul News Portal 4.1. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul News Portal 4.1. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/forgot-password.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json index d958fe6a1af..4c28e69f408 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5376.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T12:15:21.157", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Health Center Patient Record Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /patient.php. The manipulation of the argument itr_no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Health Center Patient Record Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /patient.php. La manipulaci\u00f3n del argumento itr_no provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5377.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5377.json index 656769b66e1..4213f2d1b18 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5377.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5377.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Astun Technology iShare Maps 5.4.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file historic1.asp. The manipulation of the argument Zoom leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Astun Technology iShare Maps 5.4.0. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo historic1.asp. La manipulaci\u00f3n del argumento Zoom provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5378.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5378.json index 602b261cb49..8c944c7f984 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5378.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5378.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Astun Technology iShare Maps 5.4.0. This affects an unknown part of the file mycouncil2.aspx. The manipulation of the argument atTxtStreet leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Astun Technology iShare Maps 5.4.0. Esta afecta a una parte desconocida del archivo mycouncil2.aspx. La manipulaci\u00f3n del argumento atTxtStreet provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5379.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5379.json index 24982c21ef4..aac6943067f 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5379.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5379.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in NuCom NC-WR744G 8.5.5 Build 20200530.307. This vulnerability affects unknown code of the component Console Application. The manipulation of the argument CMCCAdmin/useradmin/CUAdmin leads to hard-coded credentials. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en NuCom NC-WR744G 8.5.5 Build 20200530.307. Esta vulnerabilidad afecta al c\u00f3digo desconocido del componente Console Application. La manipulaci\u00f3n del argumento CMCCAdmin/useradmin/CUAdmin genera credenciales codificadas de forma r\u00edgida. El ataque puede ejecutarse en remoto. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta vulnerabilidad, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5380.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5380.json index 64732986161..0d3118d4dc8 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5380.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5380.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ashinigit \u5929\u9752\u4e00\u767d XueShengZhuSu \u5b66\u751f\u4f4f\u5bbf\u7ba1\u7406\u7cfb\u7edf up to 4d3f0ada0e71482c1e51fd5f5615e5a3d8bcbfbb. This issue affects some unknown processing of the file /upload/ of the component Image File Upload. The manipulation of the argument File leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ashinigit ???? XueShengZhuSu ???????? hasta 4d3f0ada0e71482c1e51fd5f5615e5a3d8bcbfbb. Este problema afecta a un procesamiento desconocido del archivo /upload/ del componente \"Image File Upload\". La manipulaci\u00f3n del argumento \"File\" provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una distribuci\u00f3n continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json index 8953f8a0649..ef4497c4b6d 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5381.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T15:15:20.017", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Yifang CMS up to 2.0.2. Affected is the function downloadFile of the file /api/File/downloadFile of the component Admin Panel. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Yifang CMS hasta la versi\u00f3n 2.0.2. La funci\u00f3n \"downloadFile\" del archivo /api/File/downloadFile del componente Panel de administraci\u00f3n se ve afectada. La manipulaci\u00f3n del argumento \"File\" provoca un path traversal. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5382.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5382.json index 91818fdc803..ccdb46f3827 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5382.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5382.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in users MFA feature in Devolutions Server 2025.1.7.0 and earlier allows a user with user management permission to remove or change administrators MFA." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en la funci\u00f3n MFA de usuarios en Devolutions Server 2025.1.7.0 y versiones anteriores permite que un usuario con permiso de administraci\u00f3n de usuarios elimine o cambie la MFA de los administradores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json index 3b30cc5e56b..6873384f5de 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5383.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-31T15:15:20.833", "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Yifang CMS up to 2.0.2 and classified as problematic. Affected by this issue is some unknown functionality of the component Article Management Module. The manipulation of the argument Default Value leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Yifang CMS hasta la versi\u00f3n 2.0.2, clasificada como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del componente Article Management Module. La manipulaci\u00f3n del argumento \"Default Value\" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5384.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5384.json index d05c7c548ef..0e34212b98d 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5384.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5384.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in JeeWMS up to 20250504. It has been classified as critical. This affects the function CgAutoListController of the file /cgAutoListController.do?datagrid. The manipulation leads to sql injection. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en JeeWMS hasta la versi\u00f3n 20250504. Se ha clasificado como cr\u00edtica. Afecta a la funci\u00f3n CgAutoListController del archivo /cgAutoListController.do?datagrid. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Este producto utiliza el enfoque de versiones continuas para garantizar una entrega continua. Por lo tanto, no se dispone de informaci\u00f3n sobre las versiones afectadas ni sobre las actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5385.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5385.json index c4033cf9025..4300c3cbdfd 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5385.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in JeeWMS up to 20250504. It has been declared as critical. This vulnerability affects the function doAdd of the file /cgformTemplateController.do?doAdd. The manipulation leads to path traversal. The attack can be initiated remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad en JeeWMS hasta la versi\u00f3n 20250504. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n \"doAdd\" del archivo /cgformTemplateController.do?doAdd. La manipulaci\u00f3n provoca un path traversal. El ataque puede ejecutarse en remoto. Este producto utiliza la entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5386.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5386.json index 0352b2e11b4..bd56e80d4b8 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5386.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5386.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in JeeWMS up to 20250504. It has been rated as critical. This issue affects the function transEditor of the file /cgformTransController.do?transEditor. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en JeeWMS hasta la versi\u00f3n 20250504. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n transEditor del archivo /cgformTransController.do?transEditor. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Este producto no utiliza control de versiones. Por ello, no se dispone de informaci\u00f3n sobre las versiones afectadas y no afectadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5387.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5387.json index e0d78c60454..f808e9bd1cb 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5387.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5387.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in JeeWMS up to 20250504. Affected is the function dogenerate of the file /generateController.do?dogenerate of the component File Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en JeeWMS hasta la versi\u00f3n 20250504. La funci\u00f3n \"dogenerate\" del archivo /generateController.do?dogenerate del componente File Handler se ve afectada. La manipulaci\u00f3n genera controles de acceso inadecuados. Es posible ejecutar el ataque de forma remota. Este producto utiliza una versi\u00f3n continua para garantizar una distribuci\u00f3n continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5388.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5388.json index a99e8f6b4a4..a24821b037e 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5388.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5388.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in JeeWMS up to 20250504. Affected by this vulnerability is the function dogenerate of the file /generateController.do?dogenerate. The manipulation leads to sql injection. The attack can be launched remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como cr\u00edtica en JeeWMS hasta la versi\u00f3n 20250504. Esta vulnerabilidad afecta a la funci\u00f3n dogenerate del archivo /generateController.do?dogenerate. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de informaci\u00f3n sobre las versiones afectadas ni sobre las actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5389.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5389.json index fdad7c118c0..b5120c92696 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5389.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5389.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in JeeWMS up to 20250504. Affected by this issue is the function dogenerateOne2Many of the file /generateController.do?dogenerateOne2Many of the component File Handler. The manipulation leads to improper access controls. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en JeeWMS hasta la versi\u00f3n 20250504. Este problema afecta a la funci\u00f3n dogenerateOne2Many del archivo /generateController.do?dogenerateOne2Many del componente File Handler. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse en remoto. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5390.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5390.json index c1fe9f620a9..c4346f184d6 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5390.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5390.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in JeeWMS up to 20250504. This affects the function filedeal of the file /systemController/filedeal.do of the component File Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en JeeWMS hasta la versi\u00f3n 20250504. Esta afecta a la funci\u00f3n filedeal del archivo /systemController/filedeal.do del componente File Handler. La manipulaci\u00f3n genera controles de acceso inadecuados. Es posible iniciar el ataque de forma remota. Este producto no utiliza control de versiones. Por ello, no se dispone de informaci\u00f3n sobre las versiones afectadas y no afectadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5400.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5400.json index 58c2833da9c..c16f4cf4c6b 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5400.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5400.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. It has been classified as critical. Affected is an unknown function of the file /user.php of the component GET Parameter Handler. The manipulation of the argument u_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /user.php del componente GET Parameter Handler. La manipulaci\u00f3n del argumento u_id provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza una versi\u00f3n continua para una distribuci\u00f3n continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizaciones. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5401.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5401.json index 8104cca2bfb..3944cb9a621 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5401.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5401.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /post.php of the component GET Parameter Handler. The manipulation of the argument p_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /post.php del componente GET Parameter Handler. La manipulaci\u00f3n del argumento p_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5402.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5402.json index 51dd1bb8e11..58c619b2a70 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5402.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5402.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/includes/edit_post.php of the component GET Parameter Handler. The manipulation of the argument edit_post_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/includes/edit_post.php del componente GET Parameter Handler. La manipulaci\u00f3n del argumento edit_post_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5403.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5403.json index 4da1750b2e1..b9ddcfe48d2 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5403.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5403.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This affects an unknown part of the file /admin/view_all_posts.php of the component GET Parameter Handler. The manipulation of the argument post_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Esta vulnerabilidad afecta a una parte desconocida del archivo /admin/view_all_posts.php del componente GET Parameter Handler. La manipulaci\u00f3n del argumento post_id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no se dispone de informaci\u00f3n sobre las versiones afectadas y no afectadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5404.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5404.json index 4ab09235b7f..f074f91c9cc 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5404.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5404.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This vulnerability affects unknown code of the file /search.php of the component GET Parameter Handler. The manipulation of the argument Search leads to denial of service. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /search.php del componente GET Parameter Handler. La manipulaci\u00f3n del argumento \"Search\" provoca una denegaci\u00f3n de servicio. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza una versi\u00f3n continua para ofrecer una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizaciones. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5405.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5405.json index 21d0e876594..63880b2f31d 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5405.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5405.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This issue affects some unknown processing of the file /post.php. The manipulation of the argument comment_author/comment_email/comment_content leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Este problema afecta a un procesamiento desconocido del archivo /post.php. La manipulaci\u00f3n del argumento comment_author/comment_email/comment_content provoca cross-site-scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de versiones continuas para garantizar una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5406.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5406.json index 3d232214206..292142f20b5 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5406.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5406.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Affected is an unknown function of the file /admin/posts.php?source=add_post. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Se ve afectada una funci\u00f3n desconocida del archivo /admin/posts.php?source=add_post. La manipulaci\u00f3n del argumento \"image\" permite la carga sin restricciones. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de versiones actualizadas. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5407.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5407.json index 1e23b08ac2d..4def10ea45f 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5407.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5407.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register_script.php. The manipulation of the argument fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Chaitak-gorai Blogbook hasta la versi\u00f3n 92f5cf90f8a7e6566b576fe0952e14e1c6736513, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /register_script.php. La manipulaci\u00f3n del argumento fullname provoca cross-site-scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no hay informaci\u00f3n disponible sobre las versiones afectadas y no afectadas. Se recomienda actualizar el componente afectado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5408.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5408.json index c8cff96b87e..fbf2476f7d2 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5408.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5408.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in WAVLINK QUANTUM D2G, QUANTUM D3G, WL-WN530G3A, WL-WN530HG3, WL-WN532A3 and WL-WN576K1 up to V1410_240222 and classified as critical. Affected by this issue is the function sys_login of the file /cgi-bin/login.cgi of the component HTTP POST Request Handler. The manipulation of the argument login_page leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en WAVLINK QUANTUM D2G, QUANTUM D3G, WL-WN530G3A, WL-WN530HG3, WL-WN532A3 y WL-WN576K1 hasta V1410_240222, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n sys_login del archivo /cgi-bin/login.cgi del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento login_page provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5409.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5409.json index 2855b1afec7..a570271e57e 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5409.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5409.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Mist Community Edition up to 4.7.1. It has been classified as critical. This affects the function create_token of the file src/mist/api/auth/views.py of the component API Token Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The identifier of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Mist Community Edition hasta la versi\u00f3n 4.7.1. Se ha clasificado como cr\u00edtica. Afecta a la funci\u00f3n create_token del archivo src/mist/api/auth/views.py del componente API Token Handler. La manipulaci\u00f3n genera controles de acceso inadecuados. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 4.7.2 puede solucionar este problema. El identificador del parche es db10ecb62ac832c1ed4924556d167efb9bc07fad. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5410.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5410.json index c1cf1939a9e..54ef129b221 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5410.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5410.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Mist Community Edition up to 4.7.1. It has been declared as problematic. This vulnerability affects the function session_start_response of the file src/mist/api/auth/middleware.py. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The patch is identified as db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Mist Community Edition hasta la versi\u00f3n 4.7.1. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n session_start_response del archivo src/mist/api/auth/middleware.py. La manipulaci\u00f3n provoca un cross-site request forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 4.7.2 puede solucionar este problema. El parche se identifica como db10ecb62ac832c1ed4924556d167efb9bc07fad. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5411.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5411.json index abc630b1a92..9abe2a35c12 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5411.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5411.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Mist Community Edition up to 4.7.1. It has been rated as problematic. This issue affects the function tag_resources of the file src/mist/api/tag/views.py. The manipulation of the argument tag leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The patch is named db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Mist Community Edition hasta la versi\u00f3n 4.7.1. Se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n tag_resources del archivo src/mist/api/tag/views.py. La manipulaci\u00f3n de la etiqueta de argumento provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 4.7.2 puede solucionar este problema. El parche se llama db10ecb62ac832c1ed4924556d167efb9bc07fad. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5412.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5412.json index 11a829a2635..a37dccc0dec 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5412.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5412.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Mist Community Edition hasta la versi\u00f3n 4.7.1. La funci\u00f3n \"Login\" del archivo src/mist/api/views.py del componente Authentication Endpoint se ve afectada. La manipulaci\u00f3n del argumento \"return_to\" provoca ataques de cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 4.7.2 puede solucionar este problema. El parche se llama db10ecb62ac832c1ed4924556d167efb9bc07fad. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5420.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5420.json index 2bebba55bd9..c6bc01d69c1 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5420.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5420.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in juzaweb CMS up to 3.4.2. Affected by this vulnerability is an unknown functionality of the file /admin-cp/file-manager/upload of the component Profile Page. The manipulation of the argument Upload leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en juzaweb CMS hasta la versi\u00f3n 3.4.2. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin-cp/file-manager/upload del componente Profile Page. La manipulaci\u00f3n del argumento Upload provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5421.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5421.json index 2493d75e8a1..a77e50173f8 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5421.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5421.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in juzaweb CMS up to 3.4.2. Affected by this issue is some unknown functionality of the file /admin-cp/plugin/editor of the component Plugin Editor Page. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en juzaweb CMS hasta la versi\u00f3n 3.4.2. Este problema afecta a una funcionalidad desconocida del archivo /admin-cp/plugin/editor del componente Plugin Editor Page. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5422.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5422.json index bae4daf8b2a..87e2e9afb05 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5422.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5422.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in juzaweb CMS up to 3.4.2. This affects an unknown part of the file /admin-cp/logs/email of the component Email Logs Page. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en juzaweb CMS hasta la versi\u00f3n 3.4.2. Esta afecta a una parte desconocida del archivo /admin-cp/logs/email del componente Email Logs Page. La manipulaci\u00f3n genera controles de acceso inadecuados. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5423.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5423.json index 7a18e7d73b7..eb24473d06c 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5423.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5423.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in juzaweb CMS up to 3.4.2 and classified as critical. This vulnerability affects unknown code of the file /admin-cp/setting/system/general of the component General Setting Page. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en juzaweb CMS hasta la versi\u00f3n 3.4.2, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin-cp/setting/system/general del componente General Setting Page. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5424.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5424.json index cae2e0a6552..01039cfa135 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5424.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5424.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in juzaweb CMS up to 3.4.2 and classified as critical. This issue affects some unknown processing of the file /admin-cp/media of the component Media Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en juzaweb CMS hasta la versi\u00f3n 3.4.2, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin-cp/media del componente Media Page. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5425.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5425.json index abb678e56ac..8716e2fe837 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5425.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5425.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been classified as critical. Affected is an unknown function of the file /admin-cp/theme/editor/default of the component Theme Editor Page. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en juzaweb CMS hasta la versi\u00f3n 3.4.2. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin-cp/theme/editor/default del componente Theme Editor Page. La manipulaci\u00f3n genera controles de acceso inadecuados. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5426.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5426.json index 0890e6d94f5..d7210c79439 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5426.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5426.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin-cp/menus of the component Menu Page. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en juzaweb CMS hasta la versi\u00f3n 3.4.2. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin-cp/menus del componente Menu Page. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5427.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5427.json index b381531facc..1ca53f9ac63 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5427.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5427.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin-cp/permalinks of the component Permalinks Page. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en juzaweb CMS hasta la versi\u00f3n 3.4.2. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin-cp/permalinks del componente Permalinks Page. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json index b9fd1f42377..73e378983fe 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in juzaweb CMS up to 3.4.2. This affects an unknown part of the file /admin-cp/log-viewer of the component Error Logs Page. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en juzaweb CMS hasta la versi\u00f3n 3.4.2. Esta afecta a una parte desconocida del archivo /admin-cp/log-viewer del componente Error Logs Page. La manipulaci\u00f3n genera controles de acceso inadecuados. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5429.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5429.json index e785811fe5c..d0454cfd761 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5429.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5429.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in juzaweb CMS up to 3.4.2. This vulnerability affects unknown code of the file /admin-cp/plugin/install of the component Plugins Page. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en juzaweb CMS hasta la versi\u00f3n 3.4.2. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin-cp/plugin/install del componente Plugins Page. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json index b888541f0da..f42f0aa6c97 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in AssamLook CMS 1.0. This issue affects some unknown processing of the file /product.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en AssamLook CMS 1.0. Este problema afecta a un procesamiento desconocido del archivo /product.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json index d5d65e1e58c..8441fd8539d 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in AssamLook CMS 1.0. Affected is an unknown function of the file /department-profile.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en AssamLook CMS 1.0. La funci\u00f3n afectada es desconocida en el archivo /department-profile.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json index 714327f5329..55829e8cd9f 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in AssamLook CMS 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /view_tender.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en AssamLook CMS 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /view_tender.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5433.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5433.json index df6ccc129b8..ea8ecbda24d 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5433.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5433.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Fengoffice Feng Office 3.5.1.5 and classified as critical. Affected by this issue is some unknown functionality of the file /index.php?c=account&a=set_timezone. The manipulation of the argument tz_offset leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Fengoffice 3.5.1.5, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /index.php?c=account&a=set_timezone. La manipulaci\u00f3n del argumento tz_offset provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5434.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5434.json index b412d54b59f..3b5cbb39713 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5434.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5434.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Aem Solutions CMS up to 1.0. It has been classified as critical. This affects an unknown part of the file /page.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Aem Solutions CMS hasta la versi\u00f3n 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /page.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5435.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5435.json index b1dc9eecccb..7a00e392e1a 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5435.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5435.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Marwal Infotech CMS 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /page.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Marwal Infotech CMS 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /page.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5436.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5436.json index 0c077192af9..09baaa752e2 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5436.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5436.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Multilaser Sirius RE016 MLT1.0. It has been rated as problematic. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Multilaser Sirius RE016 MLT1.0. Se ha clasificado como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5437.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5437.json index 6e8dd9c7f41..86673cdc56f 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5437.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5437.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Multilaser Sirius RE016 MLT1.0. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi of the component Password Change Handler. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Multilaser Sirius RE016 MLT1.0. Se trata de una funci\u00f3n desconocida del archivo /cgi-bin/cstecgi.cgi del componente Password Change Handler. Esta manipulaci\u00f3n provoca una autenticaci\u00f3n incorrecta. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta vulnerabilidad, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5438.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5438.json index 9169b5f7b0f..40a6268ad58 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5438.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5438.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. Affected by this vulnerability is the function WPS of the file /goform/WPS. The manipulation of the argument PIN leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n WPS del archivo /goform/WPS. La manipulaci\u00f3n del argumento PIN provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5439.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5439.json index a3c45ace292..4efa411a1d2 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5439.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5439.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been rated as critical. Affected by this issue is the function verifyFacebookLike of the file /goform/verifyFacebookLike. The manipulation of the argument uid/accessToken leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n \"verifyFacebookLike\" del archivo /goform/verifyFacebookLike. La manipulaci\u00f3n del argumento uid/accessToken provoca la inyecci\u00f3n de comandos en el sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5440.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5440.json index f93eb6f8e90..7b31ea33e70 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5440.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5440.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function NTP of the file /goform/NTP. The manipulation of the argument manual_year_select/manual_month_select/manual_day_select/manual_hour_select/manual_min_select/manual_sec_select leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en los Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Esta vulnerabilidad afecta la funci\u00f3n NTP del archivo /goform/NTP. La manipulaci\u00f3n del argumento manual_year_select/manual_month_select/manual_day_select/manual_hour_select/manual_min_select/manual_sec_select provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5441.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5441.json index 323f408c790..d6bad79c061 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5441.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5441.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function setDeviceURL of the file /goform/setDeviceURL. The manipulation of the argument DeviceURL leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en los Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Esta vulnerabilidad afecta a la funci\u00f3n setDeviceURL del archivo /goform/setDeviceURL. La manipulaci\u00f3n del argumento DeviceURL provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5442.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5442.json index 90502698038..b2fe01f7aa1 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5442.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5442.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_pingGatewayByBBS of the file /goform/RP_pingGatewayByBBS. The manipulation of the argument ip/nm/gw leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en los Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Este problema afecta a la funci\u00f3n RP_pingGatewayByBBS del archivo /goform/RP_pingGatewayByBBS. La manipulaci\u00f3n del argumento ip/nm/gw provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json index 1f7cc68e600..d98e9d7b52e 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en los Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 (versi\u00f3n 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001). La funci\u00f3n wirelessAdvancedHidden del archivo /goform/wirelessAdvancedHidden se ve afectada. La manipulaci\u00f3n del argumento ExtChSelector/24GSelector/5GSelector provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json index 7a43cefb080..d6219b879c4 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this vulnerability is the function RP_UpgradeFWByBBS of the file /goform/RP_UpgradeFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 (1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001), clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n RP_UpgradeFWByBBS del archivo /goform/RP_UpgradeFWByBBS. La manipulaci\u00f3n del argumento type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json index b82a942b67c..2db2cd1ef57 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n RP_checkFWByBBS del archivo /goform/RP_checkFWByBBS. La manipulaci\u00f3n del argumento type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5446.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5446.json index 6cb94a1d22b..d93653aaf9f 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5446.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5446.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been classified as critical. This affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. The manipulation of the argument pwd leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Se ha clasificado como cr\u00edtica. Afecta a la funci\u00f3n RP_checkCredentialsByBBS del archivo /goform/RP_checkCredentialsByBBS. La manipulaci\u00f3n del argumento pwd provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5447.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5447.json index f6d2f7f61ec..a1003a6e121 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5447.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5447.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. This vulnerability affects the function ssid1MACFilter of the file /goform/ssid1MACFilter. The manipulation of the argument apselect_%d/newap_text_%d leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Linksys RE6500, RE6250, RE6300, RE6350, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n ssid1MACFilter del archivo /goform/ssid1MACFilter. La manipulaci\u00f3n del argumento apselect_%d/newap_text_%d provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5455.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5455.json index f3d3d5384ce..4ce3f54bf88 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5455.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5455.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code.\n\nIf the function was called with malformed data, for example, an URL that\ncontained a \"charset\" parameter that lacked a value (such as\n\"data:charset,\"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service\n(abort).\n\nThis impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un problema en la funci\u00f3n privada de la API qDecodeDataUrl() de QtCore, utilizada en QTextDocument y QNetworkReply, y, potencialmente, en el c\u00f3digo de usuario. Si la funci\u00f3n se llamaba con datos mal formados, por ejemplo, una URL que conten\u00eda un par\u00e1metro \"charset\" sin valor (como \"data:charset,\"), y Qt se compilaba con aserciones habilitadas, se encontraba con una aserci\u00f3n, lo que resultaba en una denegaci\u00f3n de servicio (abortar). Esto afecta a Qt hasta las versiones 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 y 6.9.0. Se ha corregido en las versiones 5.15.19, 6.5.9, 6.8.4 y 6.9.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json index 6b39fee036d..90a31d4a094 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5509.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T16:15:26.803", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json index bcf0ad2a41a..6e0122deb74 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5510.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T17:15:22.057", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json index b1203829758..22fa6dfa254 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5520.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T18:15:27.257", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json index 1fede239e03..4150eab68f1 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5521.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T19:15:40.113", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json index 46d72a83aa6..8288d7ab21f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T20:15:22.387", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json index 354c5c3fc75..13e19c55a00 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-03T21:15:23.483", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json index 41e17738a98..9135c5b4682 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5545.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T00:15:25.333", "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5592.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5592.json index b6efd78ffc4..5010575c08f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5592.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5592.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T14:15:35.280", "lastModified": "2025-06-04T15:15:24.060", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component PASSIVE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en FreeFloat FTP Server 1.0. Este problema afecta a una funcionalidad desconocida del componente PASSIVE Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json index 22c5cfe918e..9bb271c8681 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5597.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Authentication vulnerability in WF Steuerungstechnik GmbH airleader MASTER allows Authentication Bypass.This issue affects airleader MASTER: 3.00571." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en airleader MASTER de WF Steuerungstechnik GmbH permite omitir la autenticaci\u00f3n. Este problema afecta a airleader MASTER: 3.00571." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json index fce71cdb06a..2d1e816f267 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5598.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path Traversal vulnerability in WF Steuerungstechnik GmbH airleader MASTER allows Retrieve Embedded Sensitive Data.This issue affects airleader MASTER: 3.0046." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Path Traversal en airleader MASTER de WF Steuerungstechnik GmbH permite recuperar datos confidenciales integrados. Este problema afecta a airleader MASTER: 3.0046." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5599.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5599.json index e8d50269118..425393e52c4 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5599.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5599.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T18:15:37.970", "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json index 677ec07aa0f..59540700769 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json @@ -19,7 +19,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Radare2 5.9.9. La funci\u00f3n r_cons_pal_init de la librer\u00eda /libr/cons/pal.c del componente radiff2 se ve afectada. La manipulaci\u00f3n provoca corrupci\u00f3n de memoria. El ataque debe abordarse localmente. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El parche se identifica como 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que la carrera no supone un problema real a menos que se utilice asan. Se ha a\u00f1adido una nueva advertencia." + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Radare2 5.9.9. La funci\u00f3n r_cons_pal_init de la librer\u00eda /libr/cons/pal.c del componente radiff2 se ve afectada. La manipulaci\u00f3n provoca corrupci\u00f3n de memoria. El ataque debe abordarse localmente. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El parche se identifica como 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que la ejecuci\u00f3n no supone un problema real a menos que se utilice asan. Se ha a\u00f1adido una nueva advertencia." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json index 984ae8b6c9d..c4953757987 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json @@ -19,7 +19,7 @@ }, { "lang": "es", - "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Radare2 5.9.9. Esta vulnerabilidad afecta a la funci\u00f3n cons_stack_load de la librer\u00eda /libr/cons/cons.c del componente radiff2. La manipulaci\u00f3n del argumento -T provoca corrupci\u00f3n de memoria. Un ataque debe abordarse localmente. Es un ataque de complejidad bastante alta. Su explotaci\u00f3n parece dif\u00edcil. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El parche se llama 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que \"la carrera no supone un problema real a menos que se utilice asan\". Se ha a\u00f1adido una nueva advertencia." + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Radare2 5.9.9. Esta vulnerabilidad afecta a la funci\u00f3n cons_stack_load de la librer\u00eda /libr/cons/cons.c del componente radiff2. La manipulaci\u00f3n del argumento -T provoca corrupci\u00f3n de memoria. Un ataque debe abordarse localmente. Es un ataque de complejidad bastante alta. Su explotaci\u00f3n parece dif\u00edcil. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El parche se llama 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que \"la ejecuci\u00f3n no supone un problema real a menos que se utilice asan\". Se ha a\u00f1adido una nueva advertencia." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json index 229fa4d8d4d..36faf0197f9 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json @@ -19,7 +19,7 @@ }, { "lang": "es", - "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Radare2 5.9.9. Esta afecta a la funci\u00f3n r_cons_pal_init en la librer\u00eda /libr/cons/pal.c del componente radiff2. La manipulaci\u00f3n del argumento -T provoca corrupci\u00f3n de memoria. Es necesario realizar un ataque local. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El identificador del parche es 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que \"la carrera no supone un problema real a menos que se utilice asan\". Se ha a\u00f1adido una nueva advertencia." + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Radare2 5.9.9. Esta afecta a la funci\u00f3n r_cons_pal_init en la librer\u00eda /libr/cons/pal.c del componente radiff2. La manipulaci\u00f3n del argumento -T provoca corrupci\u00f3n de memoria. Es necesario realizar un ataque local. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El identificador del parche es 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que \"la ejecuci\u00f3n no supone un problema real a menos que se utilice asan\". Se ha a\u00f1adido una nueva advertencia." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json index 0c6676bab87..563d86d872e 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in Radare2 5.9.9 and classified as problematic. This issue affects the function r_cons_context_break_pop in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and \"crashy\". Further analysis has shown \"the race is not a real problem unless you use asan\". A new warning has been added." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Radare2 5.9.9 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a la funci\u00f3n r_cons_context_break_pop en la librer\u00eda /libr/cons/cons.c del componente radiff2. La manipulaci\u00f3n del argumento -T provoca corrupci\u00f3n de memoria. El ataque debe abordarse localmente. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El parche se llama 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que \"la ejecuci\u00f3n no supone un problema real a menos que se utilice asan\". Se ha a\u00f1adido una nueva advertencia." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5648.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5648.json index e6bb3fd77ee..e274eedfd49 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5648.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5648.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and \"crashy\". Further analysis has shown \"the race is not a real problem unless you use asan\". A new warning has been added." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Radare2 5.9.9. Se ha clasificado como problem\u00e1tica. La funci\u00f3n r_cons_pal_init de la librer\u00eda /libr/cons/pal.c del componente radiff2 est\u00e1 afectada. La manipulaci\u00f3n del argumento -T provoca corrupci\u00f3n de memoria. Un ataque debe abordarse localmente. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad a\u00fan se duda. El parche se llama 5705d99cc1f23f36f9a84aab26d1724010b97798. Se recomienda aplicar un parche para solucionar este problema. La documentaci\u00f3n explica que el par\u00e1metro -T es experimental y causa fallos. Un an\u00e1lisis posterior ha demostrado que \"la ejecuci\u00f3n no supone un problema real a menos que se utilice asan\". Se ha a\u00f1adido una nueva advertencia." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json index 2644387e482..4523b99fe92 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T09:15:23.353", "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /admin/core/new_user of the component Register Interface. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en SourceCodester Student Result Management System 1.0. Esta afecta a una parte desconocida del archivo /admin/core/new_user del componente Register Interface. La manipulaci\u00f3n genera controles de acceso inadecuados. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json index dc41fe8f227..fa2d68729ee 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in 1000projects Online Notice Board 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en 1000projects Online Notice Board 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /register.php. La manipulaci\u00f3n del argumento fname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json index cf4076f3bee..a1572bef258 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in code-projects Traffic Offense Reporting System 1.0. This issue affects some unknown processing of the file saveuser.php. The manipulation of the argument user_id/username/email/name/position leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Traffic Offense Reporting System 1.0. Este problema afecta a un procesamiento desconocido del archivo saveuser.php. La manipulaci\u00f3n del argumento user_id/username/email/name/position provoca ataques de Cross Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json index db1bf965f8f..cef501d4e76 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/between-date-userreport.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Complaint Management System 2.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/between-date-userreport.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json index dd2e5fdfbce..1a2bd5f0f61 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-state.php. The manipulation of the argument description leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Complaint Management System 2.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/edit-state.php. La manipulaci\u00f3n de la descripci\u00f3n del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json index 2b72afd14d8..376c587945b 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been classified as critical. This affects an unknown part of the file /admin/edit-subcategory.php. The manipulation of the argument subcategory leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Complaint Management System 2.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /admin/edit-subcategory.php. La manipulaci\u00f3n del argumento \"subcategory\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json index 78f07f3bcb7..b121726777e 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/edit-category.php. The manipulation of the argument description leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Complaint Management System 2.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/edit-category.php. La manipulaci\u00f3n de la descripci\u00f3n del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json index 26abfb8c8f7..67e953aaa6e 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Complaint Management System 2.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/manage-users.php. La manipulaci\u00f3n del argumento uid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json index b5d42dc10a4..b6e918655df 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/updatecomplaint.php. The manipulation of the argument Status leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Complaint Management System 2.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/updatecomplaint.php. La manipulaci\u00f3n del argumento \"Status\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json index 1d36afd11dc..7b3c09f7670 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in code-projects Traffic Offense Reporting System 1.0. This affects an unknown part of the file /save-settings.php of the component Setting Handler. The manipulation of the argument site_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en code-projects Traffic Offense Reporting System 1.0. Esta afecta a una parte desconocida del archivo /save-settings.php del componente Setting Handler. La manipulaci\u00f3n del argumento \"site_name\" provoca ataques de Cross Site Scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5664.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5664.json index 1e0df00233f..b417dd8e77d 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5664.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5664.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0 and classified as critical. This issue affects some unknown processing of the component RESTART Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del componente RESTART Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque podr\u00eda iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5665.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5665.json index 6ab8274b74f..cd178a8a067 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5665.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5665.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component XCWD Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del componente XCWD Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5666.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5666.json index 3455e685e71..f4f71cd2c8e 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5666.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5666.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component XMKD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente XMKD Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5667.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5667.json index 2519165575e..bd457df287c 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5667.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5667.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in FreeFloat FTP Server 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component REIN Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FreeFloat FTP Server 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del componente REIN Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5671.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5671.json index a0580b2225f..ce48b72b0f2 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5671.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5671.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in TOTOLINK N302R Plus up to 3.4.0-B20201028. Affected is an unknown function of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en TOTOLINK N302R Plus (hasta la versi\u00f3n 3.4.0-B20201028). La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /boafrm/formPortFw del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento service_type provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5672.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5672.json index f2fc70e240f..a3fc7cae85e 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5672.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5672.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in TOTOLINK N302R Plus up to 3.4.0-B20201028 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en TOTOLINK N302R Plus (hasta la versi\u00f3n 3.4.0-B20201028), clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /boafrm/formFilter del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento URL provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5674.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5674.json index 6ed664147e0..287b121edeb 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5674.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5674.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file urinalysis_form.php. The manipulation of the argument urinalysis_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Patient Record Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo urinalysis_form.php. La manipulaci\u00f3n del argumento urinalysis_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5675.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5675.json index b353b69d42f..ccc8fc85b60 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5675.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5675.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Teacher Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /trms/admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Teacher Record Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /trms/admin/bwdates-reports-details.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5676.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5676.json index 82052491c63..3279a72c293 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5676.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Recruitment Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/ajax.php?action=login. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5677.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5677.json index d5c345d467a..506125ac46f 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5677.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5677.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/ajax.php?action=save_application. The manipulation of the argument position_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Recruitment Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/ajax.php?action=save_application. La manipulaci\u00f3n del argumento position_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5679.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5679.json index d19e281b720..ad2f1df659b 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5679.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5679.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected is the function parseStrByFreeMarker of the file /src/main/java/com/dstz/sys/rest/controller/SysToolsController.java. The manipulation of the argument str leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Shenzhen Dashi Tongzhou Information Technology AgileBPM hasta la versi\u00f3n 2.5.0. La funci\u00f3n parseStrByFreeMarker del archivo /src/main/java/com/dstz/sys/rest/controller/SysToolsController.java se ve afectada. La manipulaci\u00f3n del argumento str provoca la deserializaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5701.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5701.json index 95b3978a1a0..c92d8ca457a 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5701.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5701.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento HyperComments para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos, lo que puede provocar una escalada de privilegios debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n hc_request_handler en todas las versiones hasta la 1.2.2 incluida. Esto permite a atacantes no autenticados actualizar opciones arbitrarias en el sitio de WordPress. Esto puede aprovecharse para actualizar el rol predeterminado de registro a administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5702.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5702.json index 5a648680889..433e0c8ba53 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5702.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5702.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program." + }, + { + "lang": "es", + "value": "La implementaci\u00f3n de strcmp optimizada para el procesador Power10 en GNU C Library versi\u00f3n 2.39 y posteriores escribe en los registros vectoriales v20 a v31 sin guardar el contenido del llamador (esos registros est\u00e1n definidos como registros no vol\u00e1tiles por la ABI powerpc64le), lo que da como resultado la sobrescritura de su contenido y la posible alteraci\u00f3n del flujo de control del llamador o la filtraci\u00f3n de las cadenas de entrada a la funci\u00f3n a otras partes del programa." } ], "metrics": { diff --git a/README.md b/README.md index b6eb6f9d13f..2528b956cb8 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-07T23:55:19.557277+00:00 +2025-06-08T02:00:20.759976+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-06-07T00:00:04.303869+00:00 +2025-06-08T00:00:10.053779+00:00 ``` ### Total Number of included CVEs @@ -38,18 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `0` -- [CVE-2025-5026](CVE-2025/CVE-2025-50xx/CVE-2025-5026.json) (`2025-06-07T23:15:21.897`) -- [CVE-2025-5097](CVE-2025/CVE-2025-50xx/CVE-2025-5097.json) (`2025-06-07T23:15:22.000`) -- [CVE-2025-5223](CVE-2025/CVE-2025-52xx/CVE-2025-5223.json) (`2025-06-07T23:15:22.067`) -- [CVE-2025-5242](CVE-2025/CVE-2025-52xx/CVE-2025-5242.json) (`2025-06-07T23:15:22.130`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `492` +- [CVE-2025-5647](CVE-2025/CVE-2025-56xx/CVE-2025-5647.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5648](CVE-2025/CVE-2025-56xx/CVE-2025-5648.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5649](CVE-2025/CVE-2025-56xx/CVE-2025-5649.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5650](CVE-2025/CVE-2025-56xx/CVE-2025-5650.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5651](CVE-2025/CVE-2025-56xx/CVE-2025-5651.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5653](CVE-2025/CVE-2025-56xx/CVE-2025-5653.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5654](CVE-2025/CVE-2025-56xx/CVE-2025-5654.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5655](CVE-2025/CVE-2025-56xx/CVE-2025-5655.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5656](CVE-2025/CVE-2025-56xx/CVE-2025-5656.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5657](CVE-2025/CVE-2025-56xx/CVE-2025-5657.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5658](CVE-2025/CVE-2025-56xx/CVE-2025-5658.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5661](CVE-2025/CVE-2025-56xx/CVE-2025-5661.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5664](CVE-2025/CVE-2025-56xx/CVE-2025-5664.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5665](CVE-2025/CVE-2025-56xx/CVE-2025-5665.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5666](CVE-2025/CVE-2025-56xx/CVE-2025-5666.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5667](CVE-2025/CVE-2025-56xx/CVE-2025-5667.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5671](CVE-2025/CVE-2025-56xx/CVE-2025-5671.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5672](CVE-2025/CVE-2025-56xx/CVE-2025-5672.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5674](CVE-2025/CVE-2025-56xx/CVE-2025-5674.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5675](CVE-2025/CVE-2025-56xx/CVE-2025-5675.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5676](CVE-2025/CVE-2025-56xx/CVE-2025-5676.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5677](CVE-2025/CVE-2025-56xx/CVE-2025-5677.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5679](CVE-2025/CVE-2025-56xx/CVE-2025-5679.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5701](CVE-2025/CVE-2025-57xx/CVE-2025-5701.json) (`2025-06-05T20:12:23.777`) +- [CVE-2025-5702](CVE-2025/CVE-2025-57xx/CVE-2025-5702.json) (`2025-06-05T21:15:22.873`) ## Download and Usage diff --git a/_state.csv b/_state.csv index aff0966687d..7e40bd39e5d 100644 --- a/_state.csv +++ b/_state.csv @@ -47847,7 +47847,7 @@ CVE-2011-10003,0,0,6412423cbcc1d2918013fc1df3cebbbcb3b7584426cce9ea1b9953240234b CVE-2011-10004,0,0,ec3da51d090457791c200e7f71e78a08f52c2aec5e3aab2bdb5915aa68bee988,2024-11-21T01:25:17.503000 CVE-2011-10005,0,0,627c8d48b59c9d04a5be3ca9721abb26f33a91af30259ed758e346cc8b2645eb,2024-11-21T01:25:17.667000 CVE-2011-10006,0,0,dd734ea71adfdfffdfb5628f909ca34f56f35c648e0de9eca7d4ff5e5f1df3de,2025-04-11T12:51:20.457000 -CVE-2011-10007,0,0,6962a55b1aab80e87d1c7a0c82160ab4ec4f8c96c7727325a3ab834ddb151ac6,2025-06-06T04:15:41.237000 +CVE-2011-10007,0,1,2071732c8c74392bb5fbbe3df6eaed14f2152538adbb3800a8f7f8addc75c604,2025-06-06T04:15:41.237000 CVE-2011-1001,0,0,11839c7b8e84067f9cb7b0fb6341ae801683b41bcddc1fb61a0d4d9d0b6749f0,2025-04-11T00:51:21.963000 CVE-2011-1002,0,0,d33347c721e3b89d36f002b1fe6013c7e41d667ea328068299497443349dd1dd,2025-04-11T00:51:21.963000 CVE-2011-1003,0,0,d7e1f3fe9a186593ca7a3a72b1b932ddf10706cfcc913dbcaa45bff48d214fa4,2025-04-11T00:51:21.963000 @@ -116634,7 +116634,7 @@ CVE-2018-16205,0,0,1f86caeec012004b2fd74347fb65b21a5d8869bb035d5d199474adf5b0630 CVE-2018-16206,0,0,096f153133d00fa3a9c383a862c234f12cd1410079be9f925b6e0b71fc9a3138,2024-11-21T03:52:17.463000 CVE-2018-16207,0,0,f515e2e88f25f4525f5741c734447fcfbd4289d9c7f85b1587b37e2c82594244,2024-11-21T03:52:17.583000 CVE-2018-1621,0,0,8e7763bfadb6a9f1b9161ad4d36701746abcc3efcccac159e423574cea723b0b,2024-11-21T04:00:05.857000 -CVE-2018-16210,0,0,ccf5d5bddc3f4f55b3fa8dfc9a5a1e686a4d6cffb9b32721e539213e41ed65c8,2024-11-21T03:52:17.730000 +CVE-2018-16210,0,1,ca9d646c7328347950206c0f5bcfea60f100fd45701699f0e744489e2fdd3a13,2024-11-21T03:52:17.730000 CVE-2018-16216,0,0,5717f7973b04da3e3ae49f5bbbef4148153bda6d6c61b07d0ba1e48df934cbd8,2024-11-21T03:52:17.880000 CVE-2018-16217,0,0,7fd43189534f945bd6cb20a8ae203685088b4224ad0046495e34d1f26cb6ba2c,2024-11-21T03:52:18.033000 CVE-2018-16218,0,0,99bd270f2fd02e047cd8f3c8890ba7e12eba9b1cd0627619c82774a4236f3c27,2024-11-21T03:52:18.180000 @@ -121454,7 +121454,7 @@ CVE-2018-25107,0,0,e74e5f133ec4c9e42aba268447c5e4b8ad803c3cf4918fd4d980370e8a360 CVE-2018-25108,0,0,b20ffbb6cbdeced293a2d0d5632cf118c9bcd4427f34608769eddf9c049b94c3,2025-01-16T11:15:06.850000 CVE-2018-25109,0,0,78a6fcfa9783d17890c8ccdbf5bd43dceffab865f734cb93193e2f03c25430f9,2025-03-23T23:15:13.060000 CVE-2018-25110,0,0,abecf77d0fbcf00bec56ae07fcdaac59d13802e5d641bed90dfb73d9379f33a8,2025-05-23T15:54:42.643000 -CVE-2018-25111,0,0,d1d17366475e485173a544457112923af9883e4ce6e5838607a959f5a4b802a1,2025-06-02T17:32:17.397000 +CVE-2018-25111,0,1,9d78b0a54261b02e9c357603b2ba3b90a7856de1d65290ce696db7354378d49c,2025-06-02T17:32:17.397000 CVE-2018-25112,0,0,954f7a367dec1fbbe0a0e8ae5051683ca4d26796a396cf4c400a9183f2d08361,2025-06-04T14:54:33.783000 CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,64c0ce8dd86b8cd41f028fc0faeb4c2703b3a3d6c99b5cfb7e065de6e8a10aab,2024-11-21T04:03:56.060000 @@ -171451,10 +171451,10 @@ CVE-2021-25250,0,0,96519546aeb87bad9029102e4300efb25b808ffdf1c828af74d8d543fe8fd CVE-2021-25251,0,0,8c8a953b35b3c6e5c868ffcdd7a83f2a6369d515eddabb2af8810ffb1ef353bd,2024-11-21T05:54:37.997000 CVE-2021-25252,0,0,b40ffbd137384ef442803b417e70cc774bb124d382846609d546be19f0b4e85e,2024-11-21T05:54:38.113000 CVE-2021-25253,0,0,cef2da2f2368330d32f768134c44dc06d846a0e31fc9829e407445816d3ee74d,2024-11-21T05:54:38.240000 -CVE-2021-25254,0,0,b987cecb25872abb1c9b2f5f961906eba10edea05e41416ec0cc75c269c265a6,2025-05-21T20:24:58.133000 -CVE-2021-25255,0,0,8f734494e2bfdd3451095920b1987c824d831a20321fa9657012802c76378ec1,2025-05-21T20:24:58.133000 +CVE-2021-25254,0,1,960f93d5016f6bf3dc79e67dedb064f927d90526e757cd272a96b2f70c33f33b,2025-05-21T20:24:58.133000 +CVE-2021-25255,0,1,729043efb02851b62a590797a0a62d62b1ed141198d79a1963da3cd4c62f6627,2025-05-21T20:24:58.133000 CVE-2021-25261,0,0,e424baf935cc2db17e7e9aa8dcc27202f3de4105b2e80009de8df8c0cea86d31,2024-11-21T05:54:38.350000 -CVE-2021-25262,0,0,3ac25dd8d430141bfa5099cc1d3decdb5a854d5368f8ad75fff64362d7d77541,2025-05-21T20:24:58.133000 +CVE-2021-25262,0,1,b857ad99d13070b22b601061c16ef46d0218113900d9a324db1fc8a90f601c0d,2025-05-21T20:24:58.133000 CVE-2021-25263,0,0,8a4f44573226c5d23cad36c4ef35264823931930bfb498cd8e6f9bcd97cb7ed2,2024-11-21T05:54:38.477000 CVE-2021-25264,0,0,edc127a1408accde22a7ba9636f26063c7c22770e733c74a28bb9bffa142ac57,2024-11-21T05:54:38.583000 CVE-2021-25265,0,0,a9dd62733ae74882452e725edf4339311bf95ed2c987dce38156b96069be94b8,2024-11-21T05:54:38.700000 @@ -209551,7 +209551,7 @@ CVE-2022-43626,0,0,e9aea1509cb419efdec4336e6ddf489c1cda9bfa8b1ec0dd8164ca3b5bc58 CVE-2022-43627,0,0,dc7f7012a26a56db94df08b49abec101d1b804569eab75e971257115807feb7b,2024-11-21T07:26:55.327000 CVE-2022-43628,0,0,ba34c0f7a368c569cc8f882b4d02bd351040f609c94e5c40a8a77a240d962a88,2024-11-21T07:26:55.453000 CVE-2022-43629,0,0,5ddd83db1f6646b01ce778b0da92fca9de49613987d197d1e6f3265332a277f4,2024-11-21T07:26:55.587000 -CVE-2022-4363,0,0,ba3493fd72ba00cb73b81c269bcd0355f75af41329aa02efa71d235630b75d62,2025-05-19T13:35:20.460000 +CVE-2022-4363,0,1,c053472be1299f4ecc062d0b8dab1de09b236fec441940a80689d567204b7377,2025-05-19T13:35:20.460000 CVE-2022-43630,0,0,232a06b1a0dc3f788d37010f97c7058d88c851ec0f6f0cdad06610dd1a6a5979,2024-11-21T07:26:55.720000 CVE-2022-43631,0,0,c24a8014ede8a0821432ae9a75484ce10deb39bee6fb5f647f56160e77ebfaf6,2024-11-21T07:26:55.860000 CVE-2022-43632,0,0,42f56d21c69a9175ecd5e3544092ae324c3980153b21a19c61f9c049da3ca3ad,2024-11-21T07:26:55.997000 @@ -217543,7 +217543,7 @@ CVE-2023-21416,0,0,8578227cd28d9dc918594758f1df82804d172b655ddb0ac318f69121c0103 CVE-2023-21417,0,0,626d43a96cdf41c9a41812562c43f2881e3193dfb2efb4d6d022d6e05ccccfe5,2024-11-21T07:42:49.323000 CVE-2023-21418,0,0,651d7519c94eb22ba781ebd3d84145698a49a9eea0acde943a104e1d6ad209ae,2024-11-21T07:42:49.447000 CVE-2023-21419,0,0,5e39dc34ffd27080ddc97d0b0449a375d0306b62a65480e082767f4c89bcbd4a,2024-11-21T07:42:49.570000 -CVE-2023-2142,0,0,631d1ced6e5796efc16bf14ab518d6c5183e00cf05853c5eedb6a969c00f5d75,2024-11-27T17:15:05.200000 +CVE-2023-2142,0,1,ee6c5544fd99e9c44117e2026fe747585b8dbcfcdfeca72d973d1d577a22cb10,2024-11-27T17:15:05.200000 CVE-2023-21420,0,0,55852f5647ccd01e25697d0fd5a2011b8edb53c9c4bd5d47c99548bcaab2e8e0,2024-11-21T07:42:49.720000 CVE-2023-21421,0,0,e95f2a5fd17563664ec1e30eed0e164b86de61f1171d1e9fc1332d0307f3e0f1,2024-11-21T07:42:49.867000 CVE-2023-21422,0,0,707fbda24e472283c65a55842c55da0b0e4d482bb08acfa1f079eef914744e8f,2024-11-21T07:42:50.010000 @@ -221580,7 +221580,7 @@ CVE-2023-2622,0,0,733f55a51be3f2a3ed41918a9ce7b53f80e9fd7b69b308d95d7f93aa57733c CVE-2023-26220,0,0,1d2c1af7c157739f85112550fa493f3df3dbeb828c2fc39deef10f615901c859,2024-11-21T07:50:56.580000 CVE-2023-26221,0,0,7fa0f1397737c64c2859f2cc6ce15fdb78a2261273fbca9e13108a3314709c34,2024-11-21T07:50:56.717000 CVE-2023-26222,0,0,6078b66183d4413ba4b662cd4c5983eaf393bf91f2df0765adc7473111042087,2024-11-21T07:50:56.850000 -CVE-2023-26226,0,0,44dee2f4f529a7120e2eaee06b0bb16cf462c6836fa826c83893c4615cf38eeb,2025-06-02T17:32:17.397000 +CVE-2023-26226,0,1,fa2c514133614431f4d288445a30adb58d0bb02de5431c2a50cbccb035641d81,2025-06-02T17:32:17.397000 CVE-2023-2623,0,0,abd562316ffb326f632a6ede08ad72f59f41c97ab2e5ede20db4c6f075713313,2024-11-21T07:58:57.173000 CVE-2023-26234,0,0,7c223294dc95fb96f41d9cc177d634bd509b94882e083fad54b82ca323de4c4a,2025-03-17T19:15:20.083000 CVE-2023-26235,0,0,2cd891987440b8912e62b623e1a943a4b7bf493058250996cfebf312464c19a9,2025-03-17T19:15:20.347000 @@ -232394,7 +232394,7 @@ CVE-2023-39997,0,0,30a8b687bafab2083717c9daa4e43951f503741e66f546539c9f352ad4028 CVE-2023-39998,0,0,0aa1d87c7d15430aef5a56459adb004cd2be2550e9c553acb348a55d9d82b230,2025-01-31T14:22:08.727000 CVE-2023-39999,0,0,82b82212a0025fead4708054dd0afb247ed047894644e263dcde31faebf34331,2024-11-21T08:16:12.447000 CVE-2023-4000,0,0,39f91b713d4713b662aa8e3a2c23ad21a9a5b27c7f23cc18f70c42a560e4fe8b,2024-11-21T08:34:11.757000 -CVE-2023-40000,0,0,d3e4ddf6a7e46064a403e9603b9905d91e7fb5ab64821a503e2d034743ef9ade,2024-11-21T08:18:30.070000 +CVE-2023-40000,0,1,2a1407722093a90e37ba5ec6b10ea074764f0585dc804d9b9fdab1824bce8663,2024-11-21T08:18:30.070000 CVE-2023-40001,0,0,ccafe70163175ef0d8ce148a91e88d6b5fe2ed58d2617d4261cdcfaf2715f565,2024-12-13T15:15:20.870000 CVE-2023-40002,0,0,d628bd72e8db6227f7563b4fdade129622158c80a90b6ea31c7755104d7bc549,2024-11-21T08:18:30.170000 CVE-2023-40003,0,0,32013fef05f2fe1c148479ccd00a1acdff49d760fc8d6affd3a7ed938f7dd491,2025-02-05T14:28:12.657000 @@ -243651,7 +243651,7 @@ CVE-2023-6782,0,0,48e117d0e4bdcb85e14a62c07a584827cae5a6f4a94d271c2449296426964d CVE-2023-6783,0,0,62a94611040db6f971d19eec3f42ee24392aa9f53fe70fb155e8d90e4a0cfd24,2025-05-19T22:15:20.297000 CVE-2023-6784,0,0,a6780c0ce527e3040402cb3f8d5193adcd8a718498fd4cea58568ab8c64cb34d,2024-11-21T08:44:33.280000 CVE-2023-6785,0,0,6b482318d0d5e6f5b72014425fa6db7522a72fd0429c99c439b842f86c6b2482,2025-03-21T19:13:55.240000 -CVE-2023-6786,0,0,df129a6cefd04f198f019abbfe46933923d9f90297c58024e87f339eb7dca920,2025-05-17T04:16:02.647000 +CVE-2023-6786,0,1,fa32073f6129a72ac7f61acac3cf3831414871b58cf0ee4e378cd754b092b316,2025-05-17T04:16:02.647000 CVE-2023-6787,0,0,c6111b25bdb59f34128f32d0354a9c53992d90f39cb77ed9799e477b019ad2f1,2025-03-14T15:15:39.403000 CVE-2023-6788,0,0,3d517e8bd2da9049e7420113a95c44f3edd7f8735bcc13aae9ada123273a49ce,2024-11-21T08:44:33.677000 CVE-2023-6789,0,0,173928c61a6c4a29a8db0f2befc43178357c56217e2d78050d1f702ee2142ec9,2024-11-21T08:44:33.820000 @@ -243935,8 +243935,8 @@ CVE-2023-7082,0,0,01da1b16e99cb894b19b28e654f0eb0d1f946ad3cc9cf73b506a5d550a9446 CVE-2023-7083,0,0,bd9fe220d9ffb8ab896a7aa5f1b550a5a279117f4114912c85245fab437efc94,2025-06-02T15:15:25.847000 CVE-2023-7084,0,0,d9889df429199caea86387e661e3ff9a19490ddaa4c78a76e3ed6d89055dc2e5,2024-11-21T08:45:13.180000 CVE-2023-7085,0,0,ff31f837c71e6103db320dfb5036954bafa30bf8481edfd8ca5717d6131b3010,2025-05-05T18:00:58.713000 -CVE-2023-7086,0,0,5f5556a768b7c5094b694e246744f2a06e6987bb2fe83cf2ef0166847738a87d,2025-05-17T03:15:26.153000 -CVE-2023-7088,0,0,4148005a3175c1264bca439ff073be17c825c20c346659e538a04eed61f85cd7,2025-05-17T03:15:26.553000 +CVE-2023-7086,0,1,9c8096f8eafdcbbc3af87abe0fc68c216a859ab479a89a9b97d052e6402649e6,2025-05-17T03:15:26.153000 +CVE-2023-7088,0,1,c667f003c64c512fc90d3021c8ce8d57b693d4054b387eed6f681444bc946746,2025-05-17T03:15:26.553000 CVE-2023-7089,0,0,3eda31786e317c37a0b05cfc344876ae32458e35d6c8f690393958bfb9334612,2024-11-21T08:45:13.543000 CVE-2023-7090,0,0,594a7b8a9d6eff78de19931d6759536c96796d341f077f4eaa2759101ee8d992,2024-11-21T08:45:13.663000 CVE-2023-7091,0,0,93fc4b825a5b5c8789b661b74bbc6e0b8bb3e21b8cd7230a257f0fe5a439447b,2024-11-21T08:45:13.810000 @@ -244008,7 +244008,7 @@ CVE-2023-7164,0,0,86ae01551ee471631921e7e17a97222573aa0ceadb73ad38d105a007afc9ab CVE-2023-7165,0,0,1fe342befafd30c0f8ef25378edb6753833ad75618642f79ff06ca8166e21319,2025-05-01T14:56:41.717000 CVE-2023-7166,0,0,057193a909b85694e45acd430a4a5075b36b9b3b5b9915241292bd84d3f880f2,2024-11-21T08:45:25.287000 CVE-2023-7167,0,0,d195faa9d00f44dff9059976300c6f8332f6b933b1f76f2f66ca1b1af4c59e97,2025-05-01T14:45:43.087000 -CVE-2023-7168,0,0,260fb0c2dd7c2cd4faeef522779919b6af216cb0e1d7d8647dcbc0702cddd99d,2025-05-20T15:16:00.430000 +CVE-2023-7168,0,1,57d9ebaa2472d6e6eb5fe753ae1407d0fc4bd83044bc9e6cd86089f311d8e1f3,2025-05-20T15:16:00.430000 CVE-2023-7169,0,0,b9fd9197e9b0a0b9a266ae5e0568621343ce559d17d6d6d84ce06645fc9b0aee,2024-11-21T08:45:25.633000 CVE-2023-7170,0,0,953fcdbddc0d6e8b3f282ae48cc838271409b9c1e47276286cd30eadbca8f0f5,2025-05-30T15:15:28.533000 CVE-2023-7171,0,0,608ea53183d14fa23ced6fd655f6766d7e0e9f517e3a1d2b265fd10fafaf515b,2024-11-21T08:45:25.907000 @@ -244077,7 +244077,7 @@ CVE-2023-7235,0,0,f38db4513534e885caf775044c7870ecf36cfb7d604410f50f3b2807a80c81 CVE-2023-7236,0,0,2b048d7e32640d15e54b70f01b10eade64ba658c8671f173bf3ebc540171d907,2025-05-05T17:58:10.357000 CVE-2023-7237,0,0,0c3bd6955eb6bf6c958eb5f374149eb8332630855855e4a2dbab3e9a5d407760,2024-11-21T08:45:34.857000 CVE-2023-7238,0,0,f2c2a16153a14b165e4d3d77c2752db1c30df7b47db9f2ea28e60d6fd1873126,2024-11-21T08:45:35.027000 -CVE-2023-7239,0,0,f13329472ab0a0d264d44605104e63bb79b2657a54e2dd77e29f0a0c07580e0c,2025-05-16T17:15:49.190000 +CVE-2023-7239,0,1,9c816819159580a32dcfadd8f4c9c7d5c1078652e0a735714bb23ac45cd5c946,2025-05-16T17:15:49.190000 CVE-2023-7240,0,0,439042a94f83d9baa88145b524f98b35bfa94251573bfe12a1c6deedbb56ec68,2024-11-21T08:45:35.173000 CVE-2023-7241,0,0,9e46c326d2897bd02e28b12a8e30d4dbed45458de5095dc41a55823e393cfdb6,2024-11-21T08:45:35.333000 CVE-2023-7242,0,0,e0a2e483a4603c7268168685c86efa9160d5f58ee87fc9d24f5e79db33cbb6f9,2024-11-21T08:45:35.470000 @@ -244122,7 +244122,7 @@ CVE-2023-7293,0,0,608de922eed5cceda3179193d6b4cf1cedf54328566b4cf84c64170cb80569 CVE-2023-7294,0,0,c39a7545702eccf7324c7475c3431bc7727f3b8eaa89f44e69b9bb7e469e84fd,2024-10-17T17:34:31.020000 CVE-2023-7295,0,0,4a7608f2a2d795efb64c4111b61d35269ed425699008d705c364c26130b3fe7b,2024-10-16T16:38:14.557000 CVE-2023-7296,0,0,5ffec4c2a7c81b387e2e7306010865ffc272336786db444e086a2ff96bd6c35e,2024-10-16T16:38:14.557000 -CVE-2023-7297,0,0,ff0b937b05053a6e74ee52716be044c67992b99a9d3a49a1699dc4aaa35cf40f,2025-05-16T17:15:49.340000 +CVE-2023-7297,0,1,5df9437a2ee1edb361871091a02ae7c4ed647901a88ca18dca00914a22be0190,2025-05-16T17:15:49.340000 CVE-2023-7298,0,0,73a0b66774294ae09c3636840df40c908dd321e9199f80183f401a006139b793,2025-05-08T15:38:44.027000 CVE-2023-7299,0,0,732af176d8692ec72ba36c97c4d288506d72870359995f66f745ed66ad90ecc5,2024-11-26T19:12:43.750000 CVE-2023-7300,0,0,f261ff112afbec4c7273260312d5d6cf726f09691a49f2d2a59fdcc067284f54,2024-12-26T09:15:05.697000 @@ -244354,7 +244354,7 @@ CVE-2024-0245,0,0,8790136d5c748161ad4df931f0b3b23af12e96cb57e69307645933cb67c0fa CVE-2024-0246,0,0,9e6a618deb2dd1e0a207aae6df232803b609e8f9b0db209f3d32cd99fdb578ec,2024-11-21T08:46:08.490000 CVE-2024-0247,0,0,88f599881e2c9ff049c1845bc3d9ecf7be8ad61db98404c94b1a4bb744b6edbc,2024-11-21T08:46:08.640000 CVE-2024-0248,0,0,ce6bb140b16c70e405d1305ebb33ae7dcefe3c07765ebedc2589481a8eebf3e2,2025-05-07T21:16:00.750000 -CVE-2024-0249,0,0,5ac2937874994d83deb797ff20f409015141910c7d4b6b3433c14314175eeca8,2025-05-16T17:15:49.497000 +CVE-2024-0249,0,1,0330e303dbc84e4c2c644aec907f67850f7f227674751d3c6d49ce5d2a417c27,2025-05-16T17:15:49.497000 CVE-2024-0250,0,0,efc40ff688f8b3db5635798766ea8928ca425fb37ac771643628cacbbb384fd8,2025-03-26T21:15:20.870000 CVE-2024-0251,0,0,351e204a87d1986e3ba82f24720fc57dfac68bb8cc531575b95ae8752f2d0a34,2024-11-21T08:46:09.027000 CVE-2024-0252,0,0,4df11d1ed2018eb98aa56422ef909f6dd5cf23034f0d5b20b34e1b16f543baa4,2024-11-21T08:46:09.167000 @@ -245036,7 +245036,7 @@ CVE-2024-0966,0,0,a371317a01bf648e72e643f48a875b8ff1eb4eef1f9ec22d108dc75da05577 CVE-2024-0967,0,0,852e27a2fed8e6fa4c2c8ea65909c2851b1f7747b0831bc7b139406eeeb99602,2024-11-21T08:47:54.870000 CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368df,2024-04-08T11:15:49.610000 CVE-2024-0969,0,0,f0f63e7c5134853236cb11c3663a549ce3f697536d3dd8f4f5859c7117e2326e,2024-11-21T08:47:55.083000 -CVE-2024-0970,0,0,d9a806e855849fa1b34007031b6b18de1fb9d91263cfd56fa9ebfc3e86add094,2025-05-16T17:15:49.807000 +CVE-2024-0970,0,1,30f19b4e6a8285d4cf8eb7004f4c82a5c2c327a7c6c02f9b28e7aba7d0205c2d,2025-05-16T17:15:49.807000 CVE-2024-0971,0,0,0fbf66131068316f18a459309bb5abd202482e32856952ee011afb233e507491,2024-11-21T08:47:55.270000 CVE-2024-0972,0,0,e58be32866f33c67069bcbf1a6ed4e3bd511aaced28f98cb0cc22c6a351ffb25,2024-11-21T08:47:55.493000 CVE-2024-0973,0,0,aed8eb330b3491d473a0c3659e7bd14152bc998dac9bc6833bcc7f238dfe0d40,2025-05-05T18:53:59.060000 @@ -245153,7 +245153,7 @@ CVE-2024-10094,0,0,699b667445fe791d93de90b3097acb73a2c1ab025cb463c440eebc573e171 CVE-2024-10095,0,0,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000 CVE-2024-10096,0,0,f8a7bcaf28fc93ccd4582e8ac942754501d986d14ae51b987ed66272d76c037c,2025-03-26T17:15:23.943000 CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000 -CVE-2024-10098,0,0,16851164c28a07740e91158d7bdc6179d37854a6eddbbabdae209c7f83ae91c2,2025-05-20T16:15:24.010000 +CVE-2024-10098,0,1,43f0e98dea0997b75414c8a11e466b071609988435cd73cebea762f6d9b317c0,2025-05-20T16:15:24.010000 CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000 CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000 CVE-2024-10100,0,0,e257ac7ecea7ed9deddddca60657be7d2649829f289e846b06e9d10c365d346b,2024-11-04T19:15:05.297000 @@ -245208,7 +245208,7 @@ CVE-2024-10145,0,0,ab90287acfe3f22a0aac67043e2d5282257df0cf5796dbc49cd99c6e2499f CVE-2024-10146,0,0,6e09dab8117419dbea9c155334f4fc0781dab4723b77ecdcf27f990383c80e63,2025-05-15T16:29:19.743000 CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb9ca,2024-11-18T17:11:17.393000 CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000 -CVE-2024-10149,0,0,94f9b983cd20bacc9559703fdee8e308f8fd9de163d11190b712296164d6f644,2025-05-20T16:15:24.687000 +CVE-2024-10149,0,1,62370eaef49aa49c6d8e1ee2c9e1f983ec26af70464ad66ec4f4278b8d403373,2025-05-20T16:15:24.687000 CVE-2024-1015,0,0,be928180cb003f6a5eec5ab2bae4726bcad9bf29373863ff5830478d50997929,2025-01-03T19:15:53.587000 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 CVE-2024-10151,0,0,fa6e76ef80ea9aa12c5b5af4e328679d268a6314b8cb2ccadad21212d1332107,2025-05-14T15:46:04.210000 @@ -245297,7 +245297,7 @@ CVE-2024-10230,0,0,0b6a0fc884e5ae244e576686edf454ca3ce274c75c14a9d5a28d123bec664 CVE-2024-10231,0,0,1cdb8518034cbde6323ad37f5ecdbdd8647d8b70c51f5e1314952e0041e1b97b,2024-10-25T17:01:55.633000 CVE-2024-10232,0,0,0d56e4d1ad2ea7a2574f878dbfab6b288953236c47236ee86211a53fb0dc2629,2024-11-01T12:57:03.417000 CVE-2024-10233,0,0,b4fa8abef351fa175b086399078c8913e9df6ab4393066a1f0be999a7b61cbdb,2025-05-28T21:04:29.167000 -CVE-2024-10234,0,0,0d89cea706744a88bd420e0ea8eae4110d01f270c165389d878f6f9e73e1ecbd,2025-03-03T15:15:13.357000 +CVE-2024-10234,0,1,1893d17cd41795582a8c43f46483f6ef12bef3fa89cc3bb862ec0381a56f8a8e,2025-03-03T15:15:13.357000 CVE-2024-10237,0,0,cc60321022b7cb6e5577da8c0f73bbdcebcda7ac9248188a1c24cddff8eea243,2025-02-04T08:15:27.920000 CVE-2024-10238,0,0,af3722233a0cb909065d9075279edbedb9fe764eee160ff09f19117c4c052fa2,2025-02-04T08:15:28.280000 CVE-2024-10239,0,0,1aeb02b8ba8e9d51182e102b3178de31d842bee8699e4cff348214784dcd3eed,2025-02-04T08:15:28.430000 @@ -245418,7 +245418,7 @@ CVE-2024-10359,0,0,3f327b3c1c406b1f8b8e8130fce0c42c09298001d3b414e6038ce8f6e6af2 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 CVE-2024-10360,0,0,49b9d570c045e2259e89921d406064d5e455c0a7c41e77df302b1e3e299adf2f,2025-01-27T15:19:13.047000 CVE-2024-10361,0,0,4217266473334ed2601403cebe7a2d843c448f33d6f69753255ccdc69a9b0980,2025-03-20T10:15:16.507000 -CVE-2024-10362,0,0,382cc68f875d5dc67649135671f5970c49c43a872d1ce2466c08a16c835b7be8,2025-05-20T20:15:27.700000 +CVE-2024-10362,0,1,8db406bb8ecfa53fd99596235b04fdf01acfeac9057f28f9b0bec80b8972105c,2025-05-20T20:15:27.700000 CVE-2024-10363,0,0,e56f9d4ee94c33e430726501cb25a61e016e8ccdef1b63816a842171bf9fb2da,2025-03-20T10:15:16.630000 CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000 CVE-2024-10366,0,0,2fb601e7bc7168487d4497aebbd697e85901de95124b916e42b8ec25871d0496,2025-03-20T10:15:16.757000 @@ -245535,7 +245535,7 @@ CVE-2024-10471,0,0,357b6c0bca07bb1b221f23d1ef55bb2accee5aef87db2dbfbf5d19504b44c CVE-2024-10472,0,0,459ec811587f0e88c6b3f693aefec4389bc2fadd96366be9e62703036cb140d8,2025-05-15T19:24:43.470000 CVE-2024-10473,0,0,e3339739f88f11a39d3988ea84894563ad15abf3691beaa3575a2f5c2a10d7b6,2025-05-15T17:39:41.120000 CVE-2024-10474,0,0,7ad065f81d3c8110aa13ec82a68760dbf0ebf9b00877e85327bd8db7bb54a207,2025-03-13T20:15:16.680000 -CVE-2024-10475,0,0,a64f9f93aaaa7a4ef65668e210cc076afc4c62968cdfd42bbd28fc8280bdde89,2025-05-20T20:15:27.857000 +CVE-2024-10475,0,1,61f2f5bb796d206d29f374225535d1e538b6ddf57964a0518af5766d00612905,2025-05-20T20:15:27.857000 CVE-2024-10476,0,0,ccbc6b379994a21d78b8965635d687e54c0adefc0ef53dc4d8c64d7eb42ff1c7,2024-12-17T16:15:23.390000 CVE-2024-10477,0,0,5945f5a0c0dded94912e59ec354ac61a7229d56159d97e42e8a275ce9d57f850,2024-10-29T14:34:04.427000 CVE-2024-10478,0,0,3c092509343a93ec957cab0db4c925179338ee0d061b602b8ae241cb8d24c713,2024-10-29T14:34:04.427000 @@ -245701,10 +245701,10 @@ CVE-2024-10628,0,0,fe3648bb198d97e4edbe93780d5b1a58e72b60d604c379b076d62a96f2c50 CVE-2024-10629,0,0,1f9c9c5683a42ffc8dadeffeff3f612e74f207dcf5dcd96d8c7fa679d62c2730,2024-11-13T17:01:16.850000 CVE-2024-1063,0,0,33b4f1a2d0cd96333caf63788d2cf890d1ebab138b3c91da9285726ecbf447d1,2024-11-21T08:49:42.713000 CVE-2024-10630,0,0,2b78ea36784a2215af96a7d4fa9ced32a586fc0d350190c904bf49da64587ad2,2025-01-14T17:15:13.857000 -CVE-2024-10631,0,0,3669a51780f323f4e1e85145eb8c544208f8bf171165efc657800b1ed464ab2a,2025-05-20T16:15:24.960000 -CVE-2024-10632,0,0,f814c0cc6e85898dfc7e13fb73388addd74302ead9c6cf519bbfa18f5139e155,2025-05-20T20:15:28.010000 +CVE-2024-10631,0,1,669ec121fbee5813a234f5a7d71b82ad8f1d7e95b250fbc544346c085f94afa4,2025-05-20T16:15:24.960000 +CVE-2024-10632,0,1,9159f9477204de07afe396bfa0deba0a119ae04eda8edb6c90041e02c6bd16be,2025-05-20T20:15:28.010000 CVE-2024-10633,0,0,b64cd913918c140fe334bc0b3014f8ec940be53af9967d66db1f33e12d719dce,2025-01-26T06:15:23.137000 -CVE-2024-10634,0,0,30c7f7115628aef8d6d3f8223af6216b63476f472f9d4fdc867cad9ab8b20c4d,2025-05-20T20:15:28.323000 +CVE-2024-10634,0,1,cce205b9f73713ba78acc8460f48c373fad4e3fa55b8b083c5991b188f32ed25,2025-05-20T20:15:28.323000 CVE-2024-10635,0,0,576f2b4aba4152eeafa19b52dea43a72446460ec93d7287b66158e3e7e541e5d,2025-05-10T00:56:29.500000 CVE-2024-10636,0,0,51d65a9a72ca10606ebab57795a091094c53b3e14bb9b9ea00131b43cbb9d73d,2025-01-26T06:15:23.293000 CVE-2024-10637,0,0,7e06c7f1ae3ed57f7c7e5d0402f64adf6b84400c16bf748102751d89e1cef638,2025-05-07T13:19:33.350000 @@ -246227,7 +246227,7 @@ CVE-2024-11137,0,0,851745d59c851ec0eef79c031d77598e3fe74f15b126feab42c4cb010ea9d CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000 CVE-2024-11139,0,0,2d6fd6ceae8e9f801cb28510138174f054ac674fa052625032eec6de670d70fb,2025-01-17T09:15:06.370000 CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000 -CVE-2024-11140,0,0,621be7eb5349a16ef590cb8ae5e484cfd74902b7419689eb24e17a3c379f2349,2025-05-20T16:15:25.250000 +CVE-2024-11140,0,1,3932ebe6094d64743df0d22756b734f8137e8962dc2a48481070805d28060739,2025-05-20T16:15:25.250000 CVE-2024-11141,0,0,b5e55f0d7bfe53f8404bc782e8f145adc10c7ecd17c29534c2a26fee94e02abb,2025-05-20T20:15:28.903000 CVE-2024-11142,0,0,fe6f6141a0a0d86940fc8736263b2e479418fc0e68e3f4b0739701acb7f10e4d,2025-05-07T16:51:23.537000 CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7fdab,2024-11-18T15:03:56.927000 @@ -246273,7 +246273,7 @@ CVE-2024-11185,0,0,1932fde8da4ceff0aad2c8c397b6223b173c5e24bf16e388d91260742a2a8 CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000 CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000 CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000 -CVE-2024-11189,0,0,8f4f61924ea15f6261918c22288b57be0f5f8ef70b5a1ff4f4bdb5b66b76af28,2025-05-20T20:15:29.040000 +CVE-2024-11189,0,1,5c58e6b12658b05251ef5d01ab5b8dd2bbc73d002bd6064d114f79afdcff1a88,2025-05-20T20:15:29.040000 CVE-2024-1119,0,0,fd6fae855233e3069d5ad6668474ced6e974623a6a3e8b05b97956b4e3b84a10,2024-11-21T08:49:50.530000 CVE-2024-11190,0,0,9dbf446a7043e2bcb0d14f792a312507c38b76789c22a7a47a68fc11e072fb71,2025-05-20T20:15:29.190000 CVE-2024-11191,0,0,252782a1be7dc774513b993a88eb45c6a508e6bc4ce0e8083e165f00ea1f9a82,2025-02-11T02:15:33.323000 @@ -246468,8 +246468,8 @@ CVE-2024-11369,0,0,f67f71afde5d9d2bf5e3a429864e22574535537898015cd20376d252ff364 CVE-2024-1137,0,0,9367f9a1347684403f58a1a7490fd736dd1a246a1ba5d989931872114e882ed8,2024-11-21T08:49:52.723000 CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a5a5,2024-11-26T17:53:22.707000 CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000 -CVE-2024-11372,0,0,d3330fb99a66979e7e4e15c3d7217efd2e613cea3ec73fb3327b332c9466d923,2025-05-20T20:15:29.857000 -CVE-2024-11373,0,0,168ecfaa158b24fd3d884428d333cfd788043bd8ea0cbcb3675b92f0dde77f9b,2025-05-20T20:15:29.993000 +CVE-2024-11372,0,1,2960ad8047fcfd9feed5a33d5cae59a01e02898974b42aa944a523f6f1702ecf,2025-05-20T20:15:29.857000 +CVE-2024-11373,0,1,56cd3a1110116fbc302be3596c7a64f377b08b6f3acf46dff85b540ff88819d3,2025-05-20T20:15:29.993000 CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000 CVE-2024-11375,0,0,09113c9c4c16e936568b412fc506dc02ef629e8e628c654e3f6f629cd5e5088f,2025-01-07T05:15:11.907000 CVE-2024-11376,0,0,5609ceefbc58fb4309dc8f69fb79b730f8dace0410f91558d90169df386137aa,2025-02-21T15:38:34.793000 @@ -246797,14 +246797,14 @@ CVE-2024-11688,0,0,8d8a43b07b745617ea451bc11d9802776a561f6818ffe3d6e83d98ef6a879 CVE-2024-11689,0,0,083793777007e12786b393e59e70bbd36f5df589b4b26e2949eb5844a08ab45f,2024-12-12T04:15:06.657000 CVE-2024-1169,0,0,d0e835c06bb4865716246ae011c1a97825e74d4108a8baf2dfaf39013a222917,2025-01-21T16:59:48.077000 CVE-2024-11690,0,0,36f949c7291ee937d7c462de6404610bf5fd12a14d132776feceaec4091ad912,2025-01-07T05:15:13.677000 -CVE-2024-11691,0,0,36fe8b3d1feccd057ef27ddd17979a52004da0a9606d16fdfdb44bd6d5656bc4,2025-01-06T18:15:18.373000 +CVE-2024-11691,0,1,69b9dceea3508ed3c64e7939d401046fb8731690246c1982ac17e5604cb9064e,2025-01-06T18:15:18.373000 CVE-2024-11692,0,0,3906d1fbe7a6981a0b83ce49778d3f38ae961e2d2e47c611f2b61bdfcd6bf36e,2025-04-03T13:31:37.263000 CVE-2024-11693,0,0,ba215220ac22b912f1f5dfd77add067325c5481e7e38821cacb852c1efbad49a,2025-04-03T13:31:28.403000 -CVE-2024-11694,0,0,356c3325ca9c4e874474b3cd33360d575197817877416f4f7f19070e37ade8d9,2024-12-13T17:15:05.960000 +CVE-2024-11694,0,1,8916c6641057644bef7fa3a5e0361bb247b1c778c22329c730d1e204bc7bf8f5,2024-12-13T17:15:05.960000 CVE-2024-11695,0,0,603e31fcb1c24b86bcc7c77f0355575d9d3afd45a4ac5b702f5f4ae2f1537ce0,2025-04-03T13:31:44.460000 -CVE-2024-11696,0,0,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000 +CVE-2024-11696,0,1,e52a3c25a42f79f391816abe4809cd26843cb7903a6c9103c57fc6ea3043b16f,2024-12-02T18:15:08.253000 CVE-2024-11697,0,0,9a3dbb49ba127252d40a8c24c532d14d61e409758d6cceef1386beae5c8436fc,2025-04-03T13:31:49.997000 -CVE-2024-11698,0,0,177bfd9d19615200c8e5399dceeed9e4f2df493f7a5fb371c3b3bff8ef5f7d90,2024-11-27T16:15:13.130000 +CVE-2024-11698,0,1,8c14904c39192913a7e4f0ca70011b55f77a09c79723dd4ce51a25e2368ec826,2024-11-27T16:15:13.130000 CVE-2024-11699,0,0,960307a2527490f1e604846ae0147273dc503f0996409a0d2dbd0756e25b75a8,2025-04-03T13:31:55.513000 CVE-2024-1170,0,0,23da02961ee2e8cf225b35104ccb43e539fbf93446d052ae9645caf24d980dd5,2025-01-21T16:58:56.397000 CVE-2024-11700,0,0,4ac05c714affba1de0567334034c6733d4fbd8855bca94dcfca8d8ce429594f4,2025-04-03T13:32:01.157000 @@ -246812,7 +246812,7 @@ CVE-2024-11701,0,0,f6940069f0517156652148641b41d18687c1f5a9bb107cc96ef023d9ab3f4 CVE-2024-11702,0,0,4d1864fa16526c5528782ef2c7a824c57bacfaac339143f94fbfc7deab0a885c,2025-04-05T00:41:30.300000 CVE-2024-11703,0,0,d53d8f54ff0653d342c4d3f6b4c7a8e39cf2d3c8aefaffe438b67e04923ea462,2025-04-05T00:46:01.770000 CVE-2024-11704,0,0,4fa09d89c318faf77ba5c529c202e65e7e689ccb5c52ec0f113ae3e40b856d1f,2025-04-07T19:40:06.320000 -CVE-2024-11705,0,0,0e1596de8042e8e852c6e998c00c8b73e87ddca14f366899c4d0d5766c7acb40,2024-11-27T16:15:14 +CVE-2024-11705,0,1,aac008389f624a73f8c993d17d945ec9098607108e781ab82b6f3ef2cde1a40c,2024-11-27T16:15:14 CVE-2024-11706,0,0,8718a0bef26f1edd737c6fd9169f4652793b53f3b28a484c2dc877f26ed8f860,2025-04-07T19:39:00.667000 CVE-2024-11707,0,0,c14d0723c12588788ccbd8bb2e9951ac0d18f4bf2138ffa0507ec2dce1fcd9c9,2024-12-03T08:15:06.223000 CVE-2024-11708,0,0,030e5c6df3649eaf2e5eddac64ccba107408ecd59574c9bbd3ff3367385df7d2,2025-04-04T16:27:07.540000 @@ -246975,7 +246975,7 @@ CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494 CVE-2024-11854,0,0,999afde0352966c3848f9613a3046f97c5bfc972302cd671fa92812a3b6bafdc,2024-12-04T12:15:19.250000 CVE-2024-11855,0,0,b8bfb341060496fd32ee788a9ac0c446229bec4b5e208f7ac30bcfa919ff4d7a,2024-12-14T05:15:07.960000 CVE-2024-11856,0,0,d5dc91ea132c91646f44dabd18a1a6c06e1b122275ee7e71ea02b3d69779ae26,2024-12-02T03:15:13.713000 -CVE-2024-11857,0,0,2b8987c0046796ad1d454e7416f37b43cda66283ac3a2e11f97967fcee9604df,2025-06-02T17:32:17.397000 +CVE-2024-11857,0,1,8e137a72fbc982b7eff3486549e3352a153c661127168f3558f5d43c822da90c,2025-06-02T17:32:17.397000 CVE-2024-11858,0,0,73fd067f9f80a3fe9add2844a0fc8b12fbc4555aad7446ed909f2e6252e70dfe,2024-12-15T14:15:22.320000 CVE-2024-11859,0,0,e0c37a256811d6c3ed803647df0b4f38245519a802f001a8c0b0c679e61a20a1,2025-04-16T11:15:41.373000 CVE-2024-1186,0,0,2e273a7149091b295fd44850226681809150a1697d95b70cddb9945c7f5d2c46,2024-11-21T08:49:59.387000 @@ -247285,12 +247285,12 @@ CVE-2024-1216,0,0,2ac4284b62a708a705b7ab9ac6ff4ec2f3952b584d951b1f83e5c9b3524c78 CVE-2024-12160,0,0,2c6191a6a825b29c030b8d3eb20fe09ec5c665c03e8080de9d738d6bc79c2538,2024-12-12T09:15:05.220000 CVE-2024-12161,0,0,b207c7a86bd84eca9a3e0c1da8f1275c869c8c594c4a05a5c0a83805aa79287c,2025-02-11T02:15:33.603000 CVE-2024-12162,0,0,74000f06bf15c8250a3d3772859e4a16bab71460bbdb53ca978f73d57f64b12c,2024-12-12T05:15:11.750000 -CVE-2024-12163,0,0,0e05ce4e4fefb76b04e78c5c9bf6047281613a653da27713de68b43a91c65ccb,2025-01-30T16:15:29.770000 +CVE-2024-12163,0,1,92457d4f200756ba7fba980e66589b9b1ee057d5e8787452a3691f944d192674,2025-01-30T16:15:29.770000 CVE-2024-12164,0,0,e252f13dd9720dcd4131988acbb14108c9d660bac4dc69fb3a06b127cc0ee4f0,2025-02-25T03:59:42.810000 CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000 CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000 CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000 -CVE-2024-12168,0,0,47c941d137cbfe78a9eb4c8ceb5c86f2badb9dcd4f23164d5fb0e62cda8b4c68,2025-06-02T17:32:17.397000 +CVE-2024-12168,0,1,bdfa385848a3b14b03a9b60f67dd48e69e1e0846dbb832059e48df1cdd76b6a6,2025-06-02T17:32:17.397000 CVE-2024-12169,0,0,2cb4d326eb74962f36bd473143efe22c253e3ffb801c22c8001cea0ca8bcb67d,2025-03-27T16:45:46.410000 CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000 CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 @@ -247533,7 +247533,7 @@ CVE-2024-12397,0,0,05ba7e0b8df1e3d8b761874a9aada6fc62cc7d0aeb21c968842feab985ace CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000 CVE-2024-12399,0,0,52bff9c41a163f77665f2da9fc0a8dd83c998cfb340cf3f1d77c6844e18524bb,2025-01-17T10:15:06.697000 CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000 -CVE-2024-12400,0,0,a85830b76fa054aa49d94ab46489fce7aee1f99cfb355c29571436cf79ad0935,2025-01-30T16:15:29.907000 +CVE-2024-12400,0,1,d04f80f5b5528501a3c6b5844134d3166af5c0ad1bb8d0fe0d821ed68dd71bd9,2025-01-30T16:15:29.907000 CVE-2024-12401,0,0,3d54c799503fe1f34f4afd973f2360c9c84c1edbf384adac46eff7496f8d6a14,2024-12-12T09:15:05.790000 CVE-2024-12402,0,0,36e3ce185be6b6d4714b97d0b9e949abc75eb52a2fa273901aa2b4c0f962b168,2025-01-07T04:15:07.990000 CVE-2024-12403,0,0,f86e636eddc7cdb9b8bf4adcd4515238330a01facfd5633ebda91511666728a4,2025-01-15T10:15:07.433000 @@ -247860,7 +247860,7 @@ CVE-2024-12722,0,0,c16b486595a8b73e41c4cfce5e092df2110a858e5d1cb43376d9531b1c87b CVE-2024-12723,0,0,e40fba982d315e05c8fdcc4bea9a388a75b90546c71f69551e4fe1a18182cb10,2025-05-24T01:21:32.697000 CVE-2024-12724,0,0,01f5ac47452998cfb2a48ff6b2b34a1826713dce5c6c70f3791840aabe42e5a0,2025-05-20T20:15:31.540000 CVE-2024-12725,0,0,1a82fcced7a1b4f10159c82af951f8fb088886ede4435c6ba6fb1dfa0037b907,2025-05-20T20:15:31.687000 -CVE-2024-12726,0,0,30c7b22f48ab58429f888235de649cf75053ac7500364fad9ad63d3b1d025062,2025-05-20T20:15:31.820000 +CVE-2024-12726,0,1,a2dd9dd1103b3f47a6596b13b99874c05b1fe5e063d67ce1c97b76c3aa545796,2025-05-20T20:15:31.820000 CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e057,2024-12-19T21:15:07.740000 CVE-2024-12728,0,0,917e9cd9de621c11266a9c64ec7f57ccf5bdf0122fd22a40a0ec7d20acff7a35,2024-12-19T21:15:07.863000 CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686c7b,2024-12-19T22:15:05.087000 @@ -248009,8 +248009,8 @@ CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8 CVE-2024-12870,0,0,a0f5cb38fbde77a7441fb3b28efd1bdff58897b947e83af560e27d7c67ee4e12,2025-03-20T10:15:31.210000 CVE-2024-12871,0,0,b825cdd5e9c19c166813a43deaafde1baf1f5e8a75e8f07a7fff39cafc87fdf3,2025-04-01T20:34:33.523000 CVE-2024-12872,0,0,29306093e7b19f5dd6c16c9efa94e10d9da9b0c6012b2abc584239cd33378025,2025-05-23T15:59:56.103000 -CVE-2024-12873,0,0,a4a396c6e777f76c457463c777b240e7a78ce452d4aafadf5773ce0a0870b94e,2025-05-20T19:15:48.787000 -CVE-2024-12874,0,0,9e677bfcd2bfece6bc34898d64709c7d97edc21316e6933c03b559cb7d17c8e9,2025-05-20T20:15:33.430000 +CVE-2024-12873,0,1,d5bfe65d1403e3a80909cbf9d7f70f1f02fe0938153304251b1d26121fd231bc,2025-05-20T19:15:48.787000 +CVE-2024-12874,0,1,fdd8e8b0edbab6a9f68c7742c56386f808bc3f2b925614c3886e53a2c4c53938,2025-05-20T20:15:33.430000 CVE-2024-12875,0,0,87b0956586183e5c613030d4ef29fd959e1646cc803bd99da499c5b331518d7b,2025-02-07T17:09:37.010000 CVE-2024-12876,0,0,321b13efcabf74dc7c36f7d793dc2e63dd6020db9b51b3c4d9cfb4e699901ff4,2025-03-13T17:55:17.550000 CVE-2024-12877,0,0,1888c35ba77d5a377e4b45354716e40dd6bfa1aa3f5f5b568834841a45c1fee2,2025-02-25T15:53:19.030000 @@ -248193,7 +248193,7 @@ CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a1 CVE-2024-13050,0,0,2f95f49a98ee2b927873c8a4799939050fe5a4ead743b8ced8639ef709fc00cc,2025-01-03T17:41:08.837000 CVE-2024-13051,0,0,e2bfef788998fb155c81675dd1f28141983b9837968453cab2c4ec820298fc19,2025-01-03T17:41:21.100000 CVE-2024-13052,0,0,5dffb894b36608d6b22aacc99d7f252feb22305e7a746eee0183dffbfd80b803,2025-05-13T21:10:05.200000 -CVE-2024-13053,0,0,d9109d63bfebe333280d2870495714214e2daf716f86e4719231d8c54a89622a,2025-05-20T20:15:33.583000 +CVE-2024-13053,0,1,e33ee308eef1cf12f427360bb20e6c9eedbfcaee310c93fce4c31b6a4033e4cb,2025-05-20T20:15:33.583000 CVE-2024-13054,0,0,0664adcd3c7ba0afdf0d729acb9d2b73bf3a8eabdc268a992dcee1924075e5f4,2025-03-13T06:15:35.427000 CVE-2024-13055,0,0,c8c2eec8d1c599dd9e99545ec3f23f82af6e7ffed7b8da116722ffbcd7885731,2025-05-07T19:03:59.043000 CVE-2024-13056,0,0,0ee05ef5f45e861c43a23e9a08c2471878b99af9f1d925b5952cd4419278510e,2025-05-07T19:06:20.933000 @@ -249096,9 +249096,9 @@ CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1bee CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000 CVE-2024-13913,0,0,97e9263ea64a11bf1d9dd911c989e4107d7a928b53ec2e2ca6bd3929a0fde8a1,2025-03-14T06:15:24.490000 CVE-2024-13914,0,0,2af344b4b59c1a7104b4453c8c333847114f5fbef4676b0e1849066fad060e76,2025-05-16T14:43:26.160000 -CVE-2024-13915,0,0,eff1de67beba1ae04a93f45d3a1edf18299aba121af55f172b50530e6e2d81e9,2025-05-30T16:31:03.107000 -CVE-2024-13916,0,0,61753259020c005a6fa64e2273819ae7334fe4eb0a75fba691c6ca5c29ffd7d3,2025-05-30T16:31:03.107000 -CVE-2024-13917,0,0,da6b00095287554436a5c18dc0ffbfa202f68ee34d07a188ce634ac99f98e3fd,2025-05-30T16:31:03.107000 +CVE-2024-13915,0,1,7e3b8a49b04252c535c65d276905da80386b7873f4b51eb2ae939148d9cf0a8c,2025-05-30T16:31:03.107000 +CVE-2024-13916,0,1,1c86da198e7ad03ce361d7ce29aaeaaf2aee1adf8190249fefeb9d64238107dd,2025-05-30T16:31:03.107000 +CVE-2024-13917,0,1,79aaa8862ed6cde99f132d7719a925663858e201dfad9471c9e04355fd7d8561,2025-05-30T16:31:03.107000 CVE-2024-13918,0,0,42b43ee8cd03c685390e4720249fe990efc04f95289c224e1def5175db4f83ef,2025-03-24T14:15:59 CVE-2024-13919,0,0,e47cf885ddbb3552eadad29313f1bea2b10cd197fed90bc6c347d954f876d2b0,2025-03-24T14:14:53.337000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 @@ -249188,7 +249188,7 @@ CVE-2024-1436,0,0,03581e684471a653499126781d2b992875f2027ea4f47a021f91838438e7c4 CVE-2024-1437,0,0,add72b0528f7bf7dd23bc8fa8e846027cf0982d7f16b5d5093296c0bd538d602,2025-04-01T13:43:41.967000 CVE-2024-1438,0,0,fb430c357e1d68126b60f1d8048d93feaf0a298b7940bd08e7f1ba2d2923a492,2024-11-21T08:50:35.250000 CVE-2024-1439,0,0,f018ca5c79044eb8d371c019838f427bc56a525451022c350168bc4b20b8a53d,2024-11-21T08:50:35.387000 -CVE-2024-1440,0,0,bd64ffd232af9133ce2c52849a5ae65ede63308d11e2ee843affbf06d2a941bf,2025-06-02T17:32:17.397000 +CVE-2024-1440,0,1,53c50423292df91db0b6a2d5facc1ccd8a77941c28281abc5289e1861f4ce96b,2025-06-02T17:32:17.397000 CVE-2024-1441,0,0,8427bdbed4e9c41538195739a095e1f356570f9911eb0d388312919c6343031e,2025-04-11T22:15:29.113000 CVE-2024-1442,0,0,d2ae5e9689666f79c8cd6fcdb6df5574b7bc8d53d4d2e3769df0e7673b9ac707,2025-03-11T16:56:13.943000 CVE-2024-1443,0,0,d64ab6359e51b21266d3040ac868c3e514796f54387001a584845450bafd7a7e,2024-11-21T08:50:35.827000 @@ -251743,7 +251743,7 @@ CVE-2024-22246,0,0,3ad8f091c992ef0cbdd48a2a2293d5474828742dbc9e91a3177d9a9487836 CVE-2024-22247,0,0,98551df5e52ed97248ab470679d67b187ff4dc2bf422d4a17c411b750b658cc5,2024-11-21T08:55:53.110000 CVE-2024-22248,0,0,7d11e6f20b6e40a0e1b3d2474db81de7a92f55a017f57048c4c374e5a84d824e,2024-11-21T08:55:53.237000 CVE-2024-22250,0,0,40db3fb51052a18ec19cf444cfe62376d1b552d431677cfcf8f3962e85474381,2024-11-21T08:55:53.373000 -CVE-2024-22251,0,0,7962e8c1073d0793f33908f5af22b8fc0809c0ba75822692ea4b295588a7524f,2024-11-21T08:55:53.500000 +CVE-2024-22251,0,1,60a0ef2d9eb4244af31562bc80f2ae8f39324cf96dba1a3e4c0c62d2c8096f1b,2024-11-21T08:55:53.500000 CVE-2024-22252,0,0,f5949bf1f821b4b0a30bff45e5e17fba5e511d8e2938928ceac12ac2a4f6fc6a,2025-03-27T20:15:21.593000 CVE-2024-22253,0,0,d82ed5452593dc092b271c1ab049fd5d5f5b58e7da58c6d4ec27f5d12d786bf6,2025-05-07T15:35:46.910000 CVE-2024-22254,0,0,3a56bec7fa36896f03cccbd63ae8f55be5ed77c66a50a8e191612be7b3df1c97,2025-05-07T15:37:28.313000 @@ -251751,7 +251751,7 @@ CVE-2024-22255,0,0,9e18cdd84446e31a757b60582f5ccca6ae00b45a149bd719400a2670fcf49 CVE-2024-22256,0,0,993de2145831c7f61700fd0ab2fd95ca6c5116ee67bd38000c382e5007dbfbd6,2024-11-21T08:55:54.243000 CVE-2024-22257,0,0,1a5a0b35972b87fc52a9911fc56030783b26d8d4485f5584791104f906536b2c,2025-02-13T18:16:47.687000 CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d6d9,2024-12-05T21:15:07.530000 -CVE-2024-22259,0,0,1d5817a8999b58be866796e36ca3e4199c3e466f70ce279e4c60007061b8260b,2025-02-13T18:16:47.843000 +CVE-2024-22259,0,1,194a58c1207f15255f8add96ae77695d3c94493aa0b0477e6e7be379746cb760,2025-02-13T18:16:47.843000 CVE-2024-2226,0,0,e107cca46a2655e701e8c46100939a0066c75df49d6d2a8a3cb908f83c971a7b,2025-01-31T01:45:28.230000 CVE-2024-22260,0,0,69cd08889223393ff53cc4a0d777e6e7eee01e3e0b81747bd7ed583cdd66c1f7,2025-03-19T18:15:20.353000 CVE-2024-22261,0,0,46d669194198080bacc4599579892d52d349bfce87a7598545a77f0180f961cd,2025-02-27T15:14:51.320000 @@ -251761,9 +251761,9 @@ CVE-2024-22264,0,0,41cf9408b734afbf4c752259ac6ee58534aaed593aedeaa9456d16bebd1e9 CVE-2024-22266,0,0,5a01c6e98b30179eaa3c94d91a1ca14baf1020518f14d649701450e7ae82dd1c,2024-11-21T08:55:55.490000 CVE-2024-22267,0,0,104400d906916687382e6059349a61fee72323b8edae8c01227a38e83f6cb1bc,2025-03-14T15:15:39.803000 CVE-2024-22268,0,0,bc1e6e036ca5b6fa9995e3668ab5416b25db7e7589d663e8e27f39530c1b1891,2025-03-27T15:15:49.787000 -CVE-2024-22269,0,0,6f6bcbd688495176e530478d6f55b7081f705e0b9921cc259dfe873140857dfe,2024-11-21T08:55:55.890000 +CVE-2024-22269,0,1,988e3aee3134438d85874bd11e9ccee9e7e802a5c06ad05b3459e38caa48c9e9,2024-11-21T08:55:55.890000 CVE-2024-2227,0,0,f4193cad275230e4a77caad12789eba12ab0bb05070cfcfc47b838d20d262771,2024-11-21T09:09:18 -CVE-2024-22270,0,0,686ed972793d7f5a552dfbb080535e83ba0afe88182341280195825995aa4303,2024-11-21T08:55:56.013000 +CVE-2024-22270,0,1,7b719d9fdc016717f142115013896dafdf332f999d65299f77507d8beac3f78d,2024-11-21T08:55:56.013000 CVE-2024-22271,0,0,75c1718838fa265bf8dac6e03c9384a09b6896e0d07a3322cc92b020117c5dd0,2024-11-21T08:55:56.137000 CVE-2024-22272,0,0,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000 CVE-2024-22273,0,0,57d23372dcf9fbefdc38d1098eb55f47fbc7c3b9c8cc29f9336c883da00fab81,2025-03-26T16:15:19.423000 @@ -252682,7 +252682,7 @@ CVE-2024-23583,0,0,d466b31bd822320b06edf9dbc1d34f95b8752ca4f50f2f6d9f32d574f76d0 CVE-2024-23584,0,0,086e732a9729c9254a40a2efdcf274b8f5be7ce13440e21608cc18ba34ca8dcf,2025-03-13T14:15:22.607000 CVE-2024-23586,0,0,c502bc9b7c2b6af5f29de7b2d6d88cf75e4aed9d064587993c85e2b92f277c38,2024-10-07T15:30:56.227000 CVE-2024-23588,0,0,c896bd9b8289657f23ce61f2b7bc0d6a9b21890ffc09a248ae27bab09f369a62,2024-11-21T08:57:57.760000 -CVE-2024-23589,0,0,7d3c05e81748e9e96194d336598d68d8eb11e20611f39cf1379c0ea2cd493422,2025-05-30T16:31:03.107000 +CVE-2024-23589,0,1,85f795a24604d13ac6022879540ab3f66b6cc006c27b745d3a1cdfd30ee74158,2025-05-30T16:31:03.107000 CVE-2024-2359,0,0,f8a16aff6b690ef0a387e0bd83c3d967a7f54dab13e1526a35b1308feb8246a0,2024-11-21T09:09:35.413000 CVE-2024-23590,0,0,aa2d0bee53a4e6db1324113f2976ef5c3ac355214ede701fea4ecfdbf40994ad,2024-11-21T08:57:57.913000 CVE-2024-23591,0,0,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000 @@ -253121,7 +253121,7 @@ CVE-2024-24100,0,0,f4ba34cc95b0190f580ada65b8f03eca5c5575fefce42a920c29ade696fa7 CVE-2024-24101,0,0,8c8c5d78f74164f6c55dbd2d7ee4be4970b1a59ee1d4279b7a0532aeb6a8d129,2025-03-13T17:15:28.980000 CVE-2024-24105,0,0,aa3f860d6915309f408681b2b3119d25030316f86ea69fb09f732429052412d3,2025-03-27T20:15:23.327000 CVE-2024-2411,0,0,80617ce8dc31b8e83eb2beef80c39afc1f74e19ab0ddd6a4eb931ef62e887412,2025-02-13T17:01:09.280000 -CVE-2024-24110,0,0,24e3bfd7edfbdc9c648c149e52de113518ac1893351463aa09c13045ca7b364b,2024-11-21T08:58:55.667000 +CVE-2024-24110,0,1,08e62b495fdb729dbc6065f0f4b980c13ab27ee88d8152ccb823762509962f43,2024-11-21T08:58:55.667000 CVE-2024-24112,0,0,fa2e3e7c3fcd453559e34c075845d4fcb313c6fd23214935b122beb782fc0c40,2025-05-08T19:15:58.530000 CVE-2024-24113,0,0,a516f265b8153f0a027545f2a188df9a3586caa127e0706759a4bc7bf3b498c3,2025-05-15T20:15:45.590000 CVE-2024-24115,0,0,3bbcdb03c559df344243325b54bdfce43d333b593de152334d8a64bb5fe49231,2024-11-21T08:58:56.140000 @@ -253191,7 +253191,7 @@ CVE-2024-24265,0,0,6e9c18a10ed665d0971c17b8d66c12683e1c03339bff964445be562bd85c0 CVE-2024-24266,0,0,af02336efcfa0543c3e97f34d9dba916b482a01f48e05fd35bbfc898afb8622c,2025-06-05T19:15:27.480000 CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000 CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000 -CVE-2024-24272,0,0,11fb412eb83c0a2aa1fd2ad772f5b73042c54fabd3e8078b95ce1c85c48de32e,2025-03-27T20:15:23.717000 +CVE-2024-24272,0,1,46ae69797319549d9edf794666b290a4d67db636dbf7faad557e08964c373ef7,2025-03-27T20:15:23.717000 CVE-2024-24275,0,0,3c8aa5e14da0cb646977d6dea2bbdcc1e8a016977bac5e3f5c10f87d01f6c88e,2025-03-27T21:15:45.937000 CVE-2024-24276,0,0,7bffcccdaa3ffe4fc240b27bb8a64ead8af378a61a210ff0bd0560962909da4b,2025-03-27T21:15:46.123000 CVE-2024-24278,0,0,3cbad9839e249836fd2db6ae47deedb03afcdc79c37d76090948905d5a88401f,2025-05-23T14:45:05.690000 @@ -253841,7 +253841,7 @@ CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f0 CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000 CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000 CVE-2024-25180,0,0,6c4f9519ece96564cb8bbb38c56337d15b68729b9ea597b77e43cb8c48c7e78f,2025-05-13T14:46:15.803000 -CVE-2024-25187,0,0,e6ea206ce3cb7e537109adc61d6002bbd3264a3245b68d2f966bb5270c5f8cfd,2024-11-21T09:00:24.440000 +CVE-2024-25187,0,1,dc84ac70b7a834ca4d8817cfba89f5533dd0ade82e09a3247aa14cb146afc867,2024-11-21T09:00:24.440000 CVE-2024-25189,0,0,509ea081e277357b278ee949dac27256cde1e5cd64a689b5f46c4a4823913802,2024-11-21T09:00:24.657000 CVE-2024-2519,0,0,25506805cec23f34da1bcf6347cfcf15afa6fdde406c956fdefd44554556e9ce,2025-02-14T16:59:14.683000 CVE-2024-25190,0,0,b1ba4d33a756c63f1888b43396a47998407e09c652481bc438cf266fbee6871e,2024-11-21T09:00:24.893000 @@ -254245,7 +254245,7 @@ CVE-2024-25817,0,0,24fb9fa88c35098258f5c3f08547ebdab9fa05429aca7f1384875ff62d1c8 CVE-2024-25825,0,0,0ffb769a5b15104308a542a8126cf407f088d0f85637998c3ea573ab17a15826,2024-10-11T21:36:24.583000 CVE-2024-25828,0,0,6c0bb5940de5e96f5ca16393f1d0a516655bbac4099e03e4a759fc54dedd226e,2025-04-03T13:18:40.520000 CVE-2024-2583,0,0,ec8ed9d2db80677fb7b8998ce552570f1169e1022c7b0e5cf7b08113f45fef05,2025-05-12T19:41:58.157000 -CVE-2024-25830,0,0,48f111b9df759d41453a93b4045c2ff567a72cf519523820b0bdb3651b1197ce,2024-11-21T09:01:23.427000 +CVE-2024-25830,0,1,36eaf1f78125ca0107f62f34d0507b6a57fb2b3942a9e7a40a3ce0775863e581,2024-11-21T09:01:23.427000 CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000 CVE-2024-25832,0,0,0359e72eed9b587f1da939ee2b4f202d62bdd6b390e2936728c43fb3aef82845,2025-03-27T15:15:50.607000 CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000 @@ -254799,10 +254799,10 @@ CVE-2024-26519,0,0,42ca4a0c4b211c122582c27745eb547ffa77c2e7db99d10a1b3d6d738459a CVE-2024-2652,0,0,1afd95108c8cfaee7b679614bcc752c2677b9aa793c8284b60f0740fc9eb0a27,2025-02-11T02:15:34.433000 CVE-2024-26520,0,0,7cdc56c5d27885a06d263f0d33badd1c8b5db539649a135f3710771b22a3a7e2,2024-11-21T09:02:32.160000 CVE-2024-26521,0,0,7a4a8c17931324da0360080baca8e9b8985dc9e1a6b4a9fe5e3ac63cc7433d0c,2024-11-21T09:02:32.387000 -CVE-2024-26529,0,0,10e5da07aaf6222757a327b3019ccb7168bffdf2d8b6f4a7805796ec8e2dbef6,2024-11-21T09:02:32.617000 +CVE-2024-26529,0,1,13dd109218fc3681b79aadcbd907b30ca74ae2768f049720456b0aa2533764d1,2024-11-21T09:02:32.617000 CVE-2024-2653,0,0,2740d2471c15491d9ea329b79cb148ef218e8f532d711ebb3c9abf47fb26cb31,2024-11-21T09:10:13.160000 CVE-2024-2654,0,0,de0e9aeb600c35d393cda0d9b71327456c70ba2dcd19304dcb4a563e697a2b27,2025-03-24T14:41:58.103000 -CVE-2024-26540,0,0,5970c3a2d028ecebe91244fa68ea154ff04c44c8c8a65c7d51e6549924364887,2024-11-21T09:02:32.843000 +CVE-2024-26540,0,1,3d64b9896eeddd880dc18112546effadecf914643710c25da435a35d7a7a5a49,2024-11-21T09:02:32.843000 CVE-2024-26542,0,0,5f0b8fac4544c06b01df41a855001250d28bffc49ff87601287cb3ea22616524,2024-11-21T09:02:33.060000 CVE-2024-26548,0,0,ebb38b51037a544aeaca78d2978daf5dbe43c77d36d6e5cbe956e6afdca5f326,2025-05-13T14:34:21.830000 CVE-2024-2655,0,0,0feab97c289640bf500dd7527d61858533072964c9502239802f5c822f5470cc,2025-01-17T19:18:36.207000 @@ -255591,7 +255591,7 @@ CVE-2024-27305,0,0,e12f3c61dd0cffc99acfa36652f57b0b6eeecc0c2f6472e94e57f7ef61b87 CVE-2024-27306,0,0,7a28ab142666bcaf42530dd089da65a8aca11e816370cd89a9870260ca5d05b6,2024-11-21T09:04:17.527000 CVE-2024-27307,0,0,cf618de8ec42069f47b1c5022714176e378177129a4fe94cef62bc4f79ac235a,2024-11-21T09:04:17.667000 CVE-2024-27308,0,0,37f214bdd3eae19c6ca746aa11f3f3b092a842a3922749c87981b4f4a93b4ee5,2024-11-21T09:04:17.800000 -CVE-2024-27309,0,0,d79648887d436046026f41cb547e0a0acaebb7f40fe073ad8aa718f24d3c9c57,2025-02-13T18:17:28.160000 +CVE-2024-27309,0,1,570c97a789fd13ad0b10fc55182811a30969fc7ac7f41d6a0269deb68c312af1,2025-02-13T18:17:28.160000 CVE-2024-2731,0,0,f36a4a3bfea742e45f44c0d5df175483b69ed20da7cae25a4955506b87b8aba4,2024-11-21T09:10:23.687000 CVE-2024-27310,0,0,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000 CVE-2024-27311,0,0,0c755bcc622ed9c321ec0b34f3a1b0b3952780668adba0a01799036912b6aff4,2024-11-21T09:04:18.287000 @@ -256377,7 +256377,7 @@ CVE-2024-28286,0,0,0757249cbaa15bc07df502c32c1b53781d52e423b8f162fc3de5e29bd12f0 CVE-2024-28287,0,0,a8c69a5ccabbb193237debf5f07040ef395a0f376f000c1003682d3fc4f3b2ce,2024-11-21T09:06:08.947000 CVE-2024-28288,0,0,917c615d247f423af0c4696050d5dac2e677cd6cdc4f1d78fcb72e3632aa5e47,2024-11-21T09:06:09.163000 CVE-2024-2829,0,0,5d6ede104c5f721bc49057f0a400b43bce14f079f98156f2630e18adcc15a282,2024-12-12T17:32:37.870000 -CVE-2024-28294,0,0,83a0f1cfaf3a0a6e45a122ff3eb7a36b3d5b2a0704ba057ac51a8eb262098597,2024-11-21T09:06:09.403000 +CVE-2024-28294,0,1,3ae0ef29c23ab2081bf5322722a839f143a622ee152bd16000ea8be5160f62d1,2024-11-21T09:06:09.403000 CVE-2024-28297,0,0,2f90ba80ca09a6f9461789685b9552d0992b42d6f8030246a9adeea0ef96aa0c,2024-08-05T12:41:45.957000 CVE-2024-28298,0,0,e699e722cbf011d43f72c05e5b1039030ec755e642e99b84c321beb8e894ce0b,2024-09-11T14:54:30.973000 CVE-2024-2830,0,0,d2b398e13680fffd1feef4865ec761ce55ccafcd61c9a27e21c35146151ba78a,2024-11-21T09:10:37.780000 @@ -256413,8 +256413,8 @@ CVE-2024-28387,0,0,edcf845b6fe208900e49529598d8e9e75d7f2e72dd97a85453bae639adf9e CVE-2024-28388,0,0,95b64f8911ba70a40936aac75bd6274ffeb9103197023d39d5c96d0976370013,2024-11-21T09:06:14.763000 CVE-2024-28389,0,0,94fdc93233da7727f0a9074cdad3ddf52c584c8e8f2b21467b47ad4499de76ba,2024-11-21T09:06:14.990000 CVE-2024-2839,0,0,bbe9f5435e5c7bdec670ff8dd9c7f0c19451bb7cce7859cd58a9f3bb599942ce,2025-01-28T18:11:04.917000 -CVE-2024-28390,0,0,d8cc4c3ca2b065f434b3a72f6e2cc5ffe2f819ed7fce0e06214acf67ea99db46,2024-11-21T09:06:15.217000 -CVE-2024-28391,0,0,73a11028a3462639bec211b4ea8963bd22b1b69f527f00f4163ada857a56364f,2024-11-21T09:06:15.450000 +CVE-2024-28390,0,1,8b5a3e4c3e540123e9f4c25a2556a5ba072326ec9a886385cc4b55bc446d641a,2024-11-21T09:06:15.217000 +CVE-2024-28391,0,1,0cfdc0970646c6a29b4535a385b1b671beaabe151c1ae1ecc3929ee18b7c71d0,2024-11-21T09:06:15.450000 CVE-2024-28392,0,0,d390c6938d5b44056d413b2b408bcc32550deb780a0d9ab9cc047b0024cc367e,2024-11-21T09:06:15.677000 CVE-2024-28393,0,0,c9f4dc38aa7cb62a7fcaedfa3fead844b0689c54fefaa509c2816ddb9d2b633f,2024-11-21T09:06:15.917000 CVE-2024-28394,0,0,c9f8c97d4aca10910d8f2d44c13ca923fb7aa68ef01730f568b161c43521e5c7,2024-11-21T09:06:16.133000 @@ -256450,7 +256450,7 @@ CVE-2024-28446,0,0,130fe6f11acb7921804657dac29074c2a724a37c0f7026ddccf60719c6661 CVE-2024-28447,0,0,96f74453ed1c3ab881a5353933e4fe8cdaefba2a1eb3251d1371e6f2bfd54cd7,2024-11-21T09:06:23.603000 CVE-2024-2845,0,0,80105c9d9b479536e543f6f21c5940bb1e70afb1eb269649ceef66615a154207,2024-11-21T09:10:39.807000 CVE-2024-28456,0,0,ad91c18de021a8979ada1ac9be6d1ef0a012ed4dac545d0eff1ea9a48f1067db,2025-03-27T20:15:25.390000 -CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f7252c,2024-11-21T09:06:24.153000 +CVE-2024-28458,0,1,f0a88bd4e0af743dcf93dc794cdbbff9507aa57dc92b0582648ff8a3cda4c2d2,2024-11-21T09:06:24.153000 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2847,0,0,071016739328742b92b352de5364c32b24bf8902a38c2e6f36bcce22b371719e,2025-03-24T13:28:51.537000 CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000 @@ -256551,8 +256551,8 @@ CVE-2024-28709,0,0,e561d43db0fcfedfba49cc4e0ad9b7df245718849f34cf15c2746fbbbd304 CVE-2024-2871,0,0,00a3f70b188d4cab7c8441ec548194239184a6bf2caa9d2c154a343ad4f6f55d,2025-02-07T19:34:58.843000 CVE-2024-28710,0,0,7ad2d331f1ff2a6c136748841c0166b43d4373b2229d7792bca3a0fa8b058dce,2025-03-25T17:15:53.377000 CVE-2024-28713,0,0,2660345ba02ff88ce3f8082cd6d8b2d36e81d83381b6e06b251f4d9ba4804eb1,2024-11-21T09:06:48.013000 -CVE-2024-28714,0,0,5adb671b5f1da5817b959a796da73a9dd96d2cc6664053362be0a0cde09a9432,2024-11-21T09:06:48.243000 -CVE-2024-28715,0,0,bf474a2934373fa766659bd0c07b849760591138185bb60693f79178e335e6b2,2024-11-21T09:06:48.480000 +CVE-2024-28714,0,1,457ce115a45e3373db362f2c5cad735326647eda50a6c6a00a6972e9dd495beb,2024-11-21T09:06:48.243000 +CVE-2024-28715,0,1,d9472ea6a43c015dd517a111759ac118e36738fa957d5cf07fc0beb9d6a287d7,2024-11-21T09:06:48.480000 CVE-2024-28716,0,0,3dcaba8e53d55236594341cc0c05e3a01de74966176d9fe2a191736842553636,2024-11-21T09:06:48.700000 CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a78221c4,2024-11-21T09:06:48.930000 CVE-2024-28718,0,0,4b42598c1833414216b23ff75ba486396d15aa100de693110a04f3bae6d22b6f,2024-11-21T09:06:49.160000 @@ -256585,7 +256585,7 @@ CVE-2024-28751,0,0,ceaed3272b135a4722d7745acb0bc62f516b0fe247956e66de3108e0ddf15 CVE-2024-28752,0,0,3743867d820cb3fac6cc93d0ae0ebb1af1934f8628bb7b6539e88268ce65acb8,2025-02-13T18:17:48.857000 CVE-2024-28753,0,0,bf7e9c161fe17ddef885af4de9deb82e14e1947648f4df3c13214108525d2ba1,2025-05-01T00:17:11.497000 CVE-2024-28754,0,0,2214144a78c46b2580bfbfec179b899b282fb753a98595a9fdf69833f99d7b2c,2025-05-01T00:13:29.087000 -CVE-2024-28755,0,0,d332744b9da960b762c5d5977c7018fd16bdb34f9bd7917dae4345ef0687f0bf,2024-11-21T09:06:54.030000 +CVE-2024-28755,0,1,163c8c2cf8da1f76adb3923ec4d582428a1d613293b4d594d252564f3eeef50a,2024-11-21T09:06:54.030000 CVE-2024-28756,0,0,690c3487a07876dd049c19665e845da2f28dadbd04cc6a33595a62792634596a,2024-11-21T09:06:54.270000 CVE-2024-28757,0,0,81da43f42617b41a14b128c7de9bea07265204ff81eb0bea8f4158090d852760,2025-03-28T19:15:21.230000 CVE-2024-28759,0,0,0a4255815bf43753569b9bf94f2fbddf12d43389c8cf8017f7885f21185e8276,2025-03-28T20:15:21.890000 @@ -256651,7 +256651,7 @@ CVE-2024-28832,0,0,d36740d578b94e121524c78aca6be42c6639b820da2e5a247680f98779cbf CVE-2024-28833,0,0,fa5f7f551c6db18003fcd4eb03f3ed4f2450ffe38b2398151d32446828703756,2024-11-21T09:07:01.503000 CVE-2024-28834,0,0,d614da2408fa7af8139c3a0c0d8bcb70b30384a1d7b7872f763949216531488e,2024-11-21T21:15:19.513000 CVE-2024-28835,0,0,2a76269f5b0f30ba77f1f70a1e00b84220b50714e4656af78c5aba43ea723cd5,2024-11-22T12:15:18.570000 -CVE-2024-28836,0,0,5f193e90d9e05ca3b5a38df704ab96f4c0a916e5e28336610fa3e47d12a5e3c7,2024-11-21T09:07:02.010000 +CVE-2024-28836,0,1,62ea4ea06a96083984430503a551a9fb234940211a4bbed05c5870784420ae10,2024-11-21T09:07:02.010000 CVE-2024-2884,0,0,cacce53e5e51217e3dfb169dce36dcfaad319ed4c44e6d50f237c0f4a253faa4,2025-03-19T16:15:24.330000 CVE-2024-28847,0,0,268bcd99493c8142c03138ae4c578b554dcd0966d72dfbc92319b075a2d99f62,2024-11-21T09:07:02.247000 CVE-2024-28848,0,0,ac0cc2f13d6479fa9ef5f40a6043a1e1afd98b06da363160eb2fde1d86caf54a,2024-11-21T09:07:02.380000 @@ -257661,7 +257661,7 @@ CVE-2024-30162,0,0,1d89027fadd32d888ac91deacfb634da9306e22312414c5b33187ff9291e6 CVE-2024-30163,0,0,2887459b66695d41f1e6d12551511852bcbdefc140339f61da6a07ca21c85b99,2025-03-19T17:15:39.967000 CVE-2024-30164,0,0,6998914e7b9a904a0ad839bc7bfbf870f6e9811a73e1e955fe85aadcbe3e160e,2024-11-21T09:11:20.680000 CVE-2024-30165,0,0,36d8b80b6275d52da8de003880254279acb2ea19b7eba966f7643a6302de347c,2024-11-21T09:11:20.927000 -CVE-2024-30166,0,0,ed495d02dae5bda84eb98a18b714a97f03e0a0f04788a61cdc1482fe6447f3dc,2024-11-21T09:11:21.147000 +CVE-2024-30166,0,1,18fa3c77f36083e2cd864840a6f6292b4ff3d6d72cbd7928cc677dd932a94ea6,2024-11-21T09:11:21.147000 CVE-2024-3017,0,0,d4aec23ba050936007b98f21f6c10b9585a3d459061927c976eed38f1f480c88,2024-11-21T09:28:41.480000 CVE-2024-30170,0,0,ed60f0d302cd151d50df6d1bb62de9bb721767f8db7fef2c2cb93566e32436d2,2024-08-12T16:13:53.803000 CVE-2024-30171,0,0,6ebe5e9eae1a7ad2da52de3f79b45587d88b57791a58fe5821737eae0455762c,2024-11-21T09:11:21.590000 @@ -258061,7 +258061,7 @@ CVE-2024-30556,0,0,8394748f811bbbbbc5f018da98bc56eaa890d296c422a1ec18748a9acffb5 CVE-2024-30557,0,0,73719cff1ffe9366cfd217ccf85949ff49e1ba941dc4dcc225869ca71b030df0,2024-11-21T09:12:10.367000 CVE-2024-30558,0,0,4bb241e7c9ba6e4c41288966623f3f4e6bce41e40adda6c3545d328dffee22be,2024-11-21T09:12:10.493000 CVE-2024-30559,0,0,619283ace15f1b905d526a616ba5ff133b0ac08af72ee96d9e7e1858b01606b7,2024-11-21T09:12:10.620000 -CVE-2024-3056,0,0,156a3ff16ef1e7c0a07171966ca2163c4735c8d33004ad66e5a8927f3659dcdd,2024-12-27T16:15:24.437000 +CVE-2024-3056,0,1,098948e02adb6fef2c90c331cb02bb99822b3f63a60e571b278c499abbabb9bb,2024-12-27T16:15:24.437000 CVE-2024-30560,0,0,b59125ce2223ca2880fb89db3a3f3dfd059a1d0d73b4049fe43e1fd24daf2c54,2024-11-21T09:12:10.740000 CVE-2024-30561,0,0,ac7e0304f31638e780a2d720d189c314381f988fd2e6f5eb3ed2071500f77264,2024-11-21T09:12:10.877000 CVE-2024-30564,0,0,b20ff337c9f1037b2e952029ea8bdf19426b12dd02e41f2275aa126ef8bb1798,2024-11-21T09:12:11.007000 @@ -258281,8 +258281,8 @@ CVE-2024-3094,0,0,b9e85c0248ef2cd036bdd4cbb530b96250054f5e14f6d51439fbf04202b0fd CVE-2024-30946,0,0,377a4d69a3316def640c171befad2d35850a0a77388338767e966f749486eb06,2025-04-01T18:05:53.003000 CVE-2024-30949,0,0,31959e66683fc85ff4c276689d94014abb248a7fae0f804c055ab1ee5864556a,2024-08-21T15:48:31.937000 CVE-2024-3095,0,0,cbe393ec5392dd667126d228b108af98c0fb9795feb5e5dd8f573e0e9ea21bf5,2024-11-21T09:28:53.367000 -CVE-2024-30950,0,0,b89c7a77e19e6186378775b35941100486a32d1a3e4b0646359fba744faa31dc,2024-11-21T09:12:37.683000 -CVE-2024-30951,0,0,e2ddf0b14f4dcaeb216be2fcf0887e33437786ba7d58824597b7a914c5499983,2024-11-22T16:15:21.960000 +CVE-2024-30950,0,1,c1797e304f0cff93dabb1fac92746869d9852c169fae68bbd4a04b91570159ed,2024-11-21T09:12:37.683000 +CVE-2024-30951,0,1,61bea179d0012be248c12a7b49faacb006651fd5849426e79eed6512813350ac,2024-11-22T16:15:21.960000 CVE-2024-30952,0,0,29254c769977b2a21104b7bc3b0a8b336663d1d5367ab8c3beaf574fad73c358,2025-03-21T21:15:35.300000 CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000 CVE-2024-3096,0,0,6ca88014ce9a550e53740c810ba5e3769e3b253e549db68d15a92323deb5b97a,2025-02-13T18:18:09.553000 @@ -258331,10 +258331,10 @@ CVE-2024-31030,0,0,2db6cd87c60f7cba647aba4826c76d42ed0417061d17f5a5018404da807f4 CVE-2024-31031,0,0,a40df481a620a7d230484f07ff93a7a4fe0711a2410e3138fc89f889af0f1188,2024-11-21T09:12:44.903000 CVE-2024-31032,0,0,e702405228d09553ece2bdc0352b8b45095427e9fa8e7955f679e55af20e2fcd,2024-11-21T09:12:45.123000 CVE-2024-31033,0,0,0c9876f1f7699edaaf20bd486b2d0f4a44b9fca47defdf69e7e92d25a918fefb,2024-11-21T09:12:45.350000 -CVE-2024-31036,0,0,a597d938d99fd01a4f05274c7052e64f19f8416a9b5c88373a9cbbe6c74ba915,2024-11-21T09:12:45.570000 +CVE-2024-31036,0,1,320a51acab827b5d37020b83564dfffd9aca98638cefa3812e1bd2ea9696700a,2024-11-21T09:12:45.570000 CVE-2024-3104,0,0,9bfd1c8aa5b4e014e62890c50cd4cea704588702c7ca86175d35f3b244f64537,2024-11-21T09:28:54.563000 -CVE-2024-31040,0,0,b6aa3a7d04a82ada101d614e880323ff3f482f854cbd1a27788fe22f4ca74907,2024-11-21T09:12:45.783000 -CVE-2024-31041,0,0,58606da329610490094c69e57a6e0bd651a4432056e0dc1ae92017cc5776a337,2024-11-21T09:12:45.993000 +CVE-2024-31040,0,1,6ba23bdacaedfa612d50a99761a699fec9ed7d54aeccae1ec2a3d9166ef093d8,2024-11-21T09:12:45.783000 +CVE-2024-31041,0,1,b75059e0a7695edaebc103078218ee6b58e5dbb076a591dc445c471bb0852293,2024-11-21T09:12:45.993000 CVE-2024-31047,0,0,72dbb8970f9822abc0ce34482f5428d56b2ed11de070e20d26d991147ce9c9fe,2024-11-21T09:12:46.207000 CVE-2024-3105,0,0,84feae1bbc69233e3efa769dd357754a7d54983a559abad6a239194aa6dbc066,2024-11-21T09:28:54.717000 CVE-2024-31061,0,0,8b79c6b582e94a5772b403ef365a2568a08e1a521fb33c0f0446400b2cd799d3,2025-04-03T15:09:53.590000 @@ -258825,7 +258825,7 @@ CVE-2024-3161,0,0,7ff2082f6351ede04bcaee458485774bc296f65d182897eb72643563eb3d12 CVE-2024-31610,0,0,4c6b6dc6d800562d34453d1236b542d5c9b28b5e80099dade9f215221da4dfa3,2025-04-04T14:39:00.233000 CVE-2024-31611,0,0,d6f3916293f769d89e5742cac6baba324d007ac090647f4cd7a68157e23c229d,2025-03-13T18:15:39.873000 CVE-2024-31612,0,0,e21e87a0350dc1dc4c0062c07acc797b1f129606b80779537140509864823f0b,2024-11-21T09:13:45.513000 -CVE-2024-31613,0,0,8529aaba53cef39837e08da4d416a9a7517ff6599fa9309021dc8bc85d085dbe,2024-11-21T09:13:45.743000 +CVE-2024-31613,0,1,e4cc018a10eb09ec127780360331f50e28e127e10eaa61dbacb6ef2a1200c5a4,2024-11-21T09:13:45.743000 CVE-2024-31615,0,0,61049b753eaeb4c1ebb4ab43b6a4cb337141661b3876613701b7239d58530e53,2025-04-16T18:43:40.233000 CVE-2024-31616,0,0,ce5060690e6e6c38f4b42fed4bd764ea68b08181e44c5a8e5340e1acdf22588b,2024-11-21T09:13:46.163000 CVE-2024-31617,0,0,73a3cec0d5d804d344deae1a6a39fc6ea66b3e9cd931143fe074d1b7ff4884db,2025-06-05T15:20:09.800000 @@ -258877,7 +258877,7 @@ CVE-2024-31744,0,0,83351da41e2f0f78c478d134c6a6a32ac303a7f74c88c74911c725e1530b5 CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7eb7c,2024-04-25T16:15:11.227000 CVE-2024-31747,0,0,1ff83f224bdbf8af1f9f4bcb86a91e1f678c13094ae1a77fdf1fd657baea901e,2024-11-21T09:13:50.523000 CVE-2024-3175,0,0,5f6302a6462e73c7261678b54271c3937e1258b7b4f3007957ea22e83fdb94e8,2024-11-21T09:29:04.757000 -CVE-2024-31750,0,0,896cef647bc97728a92279cc05735984d8f36316e928d9d02c63e89c0b652aea,2024-11-21T09:13:50.730000 +CVE-2024-31750,0,1,ebc9cb1e3513b20141faf6cc056c1c0b45ffe30f8c3ff897fd2fe4195d0a3bf7,2024-11-21T09:13:50.730000 CVE-2024-31755,0,0,71bb3aeb22181c517b85e9c0b60741c7bd35507479d56fe5a7b173dda191453a,2024-11-21T09:13:50.943000 CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000 CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000 @@ -258888,8 +258888,8 @@ CVE-2024-3177,0,0,5bf72b0bc06971896d316946ec2a45f35a4b8a5d69e19bb6025aca04738c4b CVE-2024-31771,0,0,8e057a4c7ee5341cf741c545c5de0c42c8357074d8177829bdceb15ae04f34a8,2024-11-21T09:13:52.057000 CVE-2024-31777,0,0,7d39a926878da060c40fa51d8497d0b8588d217d8e3fe5862751b007c9080250,2024-11-21T09:13:52.283000 CVE-2024-3178,0,0,bd9ccb3de86d5f400ed0d1b42c5f29b2c8a2c83bff134722290e4e42bbb62188,2024-12-16T19:02:56.037000 -CVE-2024-31783,0,0,976b3c737986dd2ad9e9eae3fa4a38364439a5edb56f8991f7c45d56bb3fe7f8,2025-03-13T16:15:19.433000 -CVE-2024-31784,0,0,92dd28c3140eb7ec5e9d1baef667042c67f22a7098e4a18a2b1e0a2348e2a1bb,2024-11-21T09:13:52.640000 +CVE-2024-31783,0,1,1b8c49320678c1ccd1d27d607e7632b0acf98370bc4a8f789eb554104969f2b5,2025-03-13T16:15:19.433000 +CVE-2024-31784,0,1,f1392842505b72c301eab8b24988106d79c5016d7e81170b70b5cc6eabe4391c,2024-11-21T09:13:52.640000 CVE-2024-3179,0,0,9a56868d90ea74197493de115b9ccc37e34e21c0dcd5e812b7cdcf499135cd56,2024-12-16T19:03:45.313000 CVE-2024-31798,0,0,6c775446367d3139431a8bed0f06dd67790f81a1b7aff5c3c1630353cd491833,2024-08-16T13:59:00.523000 CVE-2024-31799,0,0,f21a03b695d6a36e6ba51b291aa1aa934c4d6926891338e496632c5eaf8bf345,2024-08-16T18:35:10.927000 @@ -260007,7 +260007,7 @@ CVE-2024-33110,0,0,6ffbc94f167a52dfbd0ed621b524235b74f27a94f81d2620691ca07e335ee CVE-2024-33111,0,0,17f4a588b6771453aae4fc0d8fe54488d2c27b36ab3b37893b9ded6fd2912f18,2025-05-21T13:02:32.660000 CVE-2024-33112,0,0,f8ad2bcf8d7e340ab8b56d4ec4e1bfe3463c718134abce8b16f9a87aaa63e418,2025-05-21T13:02:30.203000 CVE-2024-33113,0,0,7cf7987cc0dd6caecd85afedffd5aa13c551f5a0cf5e90dfd19e9f43dd0dd370,2025-05-21T13:02:27.457000 -CVE-2024-33117,0,0,fa5a8875d38650ef6b59de02925d02e55a750e8834071e6e262197cc6d34464f,2024-12-06T21:15:07.340000 +CVE-2024-33117,0,1,8552376d82bc5ea5f10b0096ec96a0896f4535cab3b58e17a1204148ea532a7a,2024-12-06T21:15:07.340000 CVE-2024-33118,0,0,01cf7fb9b011c86aa5f92aee373c394da860653f62b9c7477080c66ec60949f5,2024-11-21T09:16:32.650000 CVE-2024-3312,0,0,5f7abfea07e26708b46deb725eba9cf7ab27075e45367056ede9366567e02312,2024-11-21T09:29:22.277000 CVE-2024-33120,0,0,6059ae7834dce7456d75514ab19c32a74ce0bc8de7f67b7ab7f5e8e4997c2e7a,2025-05-01T14:55:22.393000 @@ -260085,7 +260085,7 @@ CVE-2024-33297,0,0,f985b4ec95c2159e5e76f9d25a77776d09282d508692ae1cc59363a781355 CVE-2024-33298,0,0,9c06b8ccfb08582acacd17859b848ecaf4ddac6e1a1c8fdec283caac233271cd,2025-01-13T16:15:16.813000 CVE-2024-33299,0,0,526210a22947a8b57295bbb5ff835f3ee5d2471b06fd3b2ff15a98e0e72c6e1d,2025-01-14T16:15:28.893000 CVE-2024-3330,0,0,c065d4bcab4f16db3053a980305730ff33dd0d5eb8ac38631155f08ab4ecfec1,2024-11-21T09:29:24.060000 -CVE-2024-33300,0,0,fcfcc67a598fdec5020eaee48abef6ddc9c4f0ced0fdd6058b024ed4c721c78b,2024-11-21T09:16:45.987000 +CVE-2024-33300,0,1,4c87fcee45bed843a10e43cd66534cea414b4428b2b4aaeda626beb02fba4beb,2024-11-21T09:16:45.987000 CVE-2024-33302,0,0,0c7be401f051d22afd63a81d9dc3334104a73c22a0ce5b2bcb8cef27905c6773,2025-04-22T16:16:27.233000 CVE-2024-33303,0,0,05ff887d8066217fded343844e694b013fdf584e0d06817c5541ff4b5f6bc0b1,2025-04-22T16:16:04.177000 CVE-2024-33304,0,0,b8a7c1e293a96b3b10a57a8135c5ad2ae036faa22554ea9e6c2e44f72034ad48,2025-04-22T16:48:57.193000 @@ -260440,7 +260440,7 @@ CVE-2024-33805,0,0,4ea95364c9464019939f3f94936b8688d722b06fad52fbeeef4b595d7ddb6 CVE-2024-33806,0,0,ddb5e7e5961ed8599a01c1fb6fad34b5ab465edeef84b85f5fa3c206f30f59b5,2025-03-25T17:18:42.710000 CVE-2024-33807,0,0,833725a27cf95506eb88c7a1d30758babdde5c5e149663c2e7958e9ef741aa14,2025-03-25T17:14:05.797000 CVE-2024-33808,0,0,42cf0b3dc36e6b94e81e34d753f9588a43c4cf40076d9723e5f62db9b48cf068,2025-03-25T17:14:01.137000 -CVE-2024-33809,0,0,aea8c72ce59d9f32084648a437e49b49dc21c64ea187c0b17a927ea733049c70,2025-03-13T15:15:44.147000 +CVE-2024-33809,0,1,89854efbd4d08020f80738d60d7980fa486b12aad18b245d9e4e719484cb1ac6,2025-03-13T15:15:44.147000 CVE-2024-3381,0,0,54f1490359f84b37b9085d1c2a64f460d8cc1a4d213b5755f1dd6de7bae13285,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,0d7c4b76cba1dfa6da185b5a73313b4cd3894cea6b8d1c4bba28860c0480eb08,2025-03-27T16:15:23.787000 CVE-2024-33819,0,0,7e61d4c0dd3553f64a2e5fef11b92143383472dd77b567ea2aea59f5055dae94,2024-11-21T09:17:32.847000 @@ -260905,7 +260905,7 @@ CVE-2024-34398,0,0,4678c93c73e8144cbdfc3aa33b9d1ca48656b5f205f2aceccc9c17c7a1776 CVE-2024-34399,0,0,fa616a5babcaf42787946ebecb7f12ab699617c74e0d38a5c61b1374f609b858,2024-09-20T12:30:17.483000 CVE-2024-3440,0,0,3f13bc3624027e098a71bfa9faf881800f72231b484f42c72b9113d8573cc5ea,2025-02-10T16:13:08.300000 CVE-2024-34400,0,0,61addbb37f2be6f3520fd1cbc50bcd9bbc76a89c19689ad04dca7f6a95f34a40,2024-11-21T09:18:35.293000 -CVE-2024-34401,0,0,a0f9ca74dfc1b2500841b9ba9d3dde49543b7606a9aa85cfee512273d63252a5,2024-11-21T09:18:35.513000 +CVE-2024-34401,0,1,17dfabdc2f67ced4077ed7d4ab062f2ac2bfc0279065c6aa36a38fe72cbf9bdf,2024-11-21T09:18:35.513000 CVE-2024-34402,0,0,e2263cc9bf7b4e27acf49cdb19cf0fdb717ff43ddb40b241b482f3718a709dbe,2024-11-21T09:18:35.737000 CVE-2024-34403,0,0,b1c3c1354b2410af6d5a743f38e48d435410bc652a0d6da4974ed394e2f4ae27,2024-11-21T09:18:35.980000 CVE-2024-34404,0,0,45cd797469fadab4130ad07f7dba5d42cc10e87e49d302cddd2916272514d9be,2025-03-28T20:15:23.287000 @@ -261326,8 +261326,8 @@ CVE-2024-34832,0,0,d666b06e90db5d6103a7a5afb8a8f24858f5807cda782791ee77b38748da0 CVE-2024-34833,0,0,e921c52f8ba4aab0c818e238060dd9e8102cfc354231beb927b6583adaca3137,2025-04-30T16:21:23.247000 CVE-2024-3484,0,0,6436f89a5a918c130a3185756b1df756c1acba6c004c2b7a667c8fe8c3a2a0ce,2025-01-21T17:31:21.470000 CVE-2024-3485,0,0,b0e5c6c944785af17b0befd8263495908fedb37d601a800c28021c805e2af58c,2025-01-21T17:30:23.697000 -CVE-2024-34852,0,0,b5d778647377695a8f9d30be5e34452bb8b134a5e4c77a1a85e39c5ed3d54671,2024-11-21T09:19:29.667000 -CVE-2024-34854,0,0,e1292fba7b34ffda5f5cbe95fab865a828db46fcd69f4a14c16db96d4a28ec1f,2024-11-21T09:19:29.877000 +CVE-2024-34852,0,1,58074201394c52bf220e9a5d6579c41c5aa06e41596fec606364d65b4be22f3f,2024-11-21T09:19:29.667000 +CVE-2024-34854,0,1,ed8e2e8029ffc1bca2e9996fdb26935c25a1a7d30f9250be8b01cc26bde7837a,2024-11-21T09:19:29.877000 CVE-2024-3486,0,0,0d5993d17197571d5cd09f33d87d89a1217d980bbed31e625a79bf331807c3d7,2025-01-21T17:55:27.967000 CVE-2024-3487,0,0,f02d105b9c966812a2abef4e8ab06614b7e6d7c4676b4647188943cf735a64a0,2025-01-21T17:54:33.157000 CVE-2024-3488,0,0,e0d7148f43b957ef9d7e5c6884cee4d75f931d9a140eaac64ca4f557ed9c60d6,2025-01-21T17:54:10.537000 @@ -261426,7 +261426,7 @@ CVE-2024-35083,0,0,608f9f5d7e778fb0939ccaaa2002964287dae0e2642a5d1c518490fcaebfd CVE-2024-35084,0,0,5cebce0b1d6e0704cb9e32c97f7027807d9e6664716448c81b7ed8c20bcd799f,2025-04-16T15:32:44.437000 CVE-2024-35085,0,0,fce59019f7575ce68622c1e7420aa62bb4dd53c6113e171b8a8cfba62923674d,2025-04-16T15:34:57.970000 CVE-2024-35086,0,0,d8e1d1bdacc5ed170c8ec27df2235aa1c7265e19682262238c6b6618c2c9b1a9,2025-04-16T15:35:13.213000 -CVE-2024-3509,0,0,eb136785b6c31cdfa3212b9b9930594bc47515cfcf0b59217df587b41156b86b,2025-06-02T17:32:17.397000 +CVE-2024-3509,0,1,d33a9cf710569ce3e7c61fd218017ac15526e71e2dec354bf44f5d73d84f44b4,2025-06-02T17:32:17.397000 CVE-2024-35090,0,0,57515b1e110142159dcff7b319a07b249e6490e9ad373396967deb7d7fbe620f,2025-04-16T15:35:55.507000 CVE-2024-35091,0,0,ea73b0f950d47c6cc0344d5f10fe10783681ac0bb030f2124db41ba13fffdfe3,2025-04-16T15:36:06.897000 CVE-2024-35099,0,0,622c0a02b32c3af2d24cc4a9a067bcdb6bf7a1fe3455c3c1fcf62397d9aecda6,2025-05-05T17:09:33.593000 @@ -261659,8 +261659,8 @@ CVE-2024-35368,0,0,9da6139a9df4799940792f290317b8db49591fdcf449097ad52cd2ef059da CVE-2024-35369,0,0,79648abe9572ba1d5982014a4b7711db4e7c9a57af06868d6c57445dadffc06c,2025-06-03T16:06:20.667000 CVE-2024-3537,0,0,88b73d7c8f1a261b4ffca2882db9825d253d6931cd78c575f5af74b30d9c4cba,2025-02-27T20:01:58.463000 CVE-2024-35371,0,0,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000 -CVE-2024-35373,0,0,481f4ed161a06ef81ce7d0e02b090623a3872526595ddf52059f6e945fd562bc,2024-11-21T09:20:13.487000 -CVE-2024-35374,0,0,f6d205f549730fc4f84ce2601f2413d348ea0ccdb43faa971609cf87bc50ed30,2024-11-21T09:20:13.697000 +CVE-2024-35373,0,1,003544dc8eb6fa6dad302354eeb11440cd20673e34000cbfd2387e6712ce6727,2024-11-21T09:20:13.487000 +CVE-2024-35374,0,1,d65b84ca8909409687eacc78608d4a5b59421573852643f942728fbca2dd58aa,2024-11-21T09:20:13.697000 CVE-2024-35375,0,0,529750c66b29cd8b61cda96bf1c7f758feb6c70ad58ef963cf3f9538cbd23843,2025-04-01T18:05:20.387000 CVE-2024-3538,0,0,f9085328d3641db4852851bac8f6772b68244406d157d6e79d2469ff9aab69a8,2025-02-27T20:02:24.880000 CVE-2024-35384,0,0,8505a2311391c3bfc28b204f55b0770217b74ceb837f59d871e564b739b790d0,2025-05-05T17:20:11.990000 @@ -261772,7 +261772,7 @@ CVE-2024-35593,0,0,91dcda4b6eb9e36336ff5f21e45be42b4410cbde9e6c00e7ab19e173d2ca6 CVE-2024-35595,0,0,ed19450d89ea0f5e939a230190c62bcdcc5cc3f271196e7ee45a9c064bc5fa31,2024-11-21T09:20:31.177000 CVE-2024-3560,0,0,c397428cfcb9b5f18b3a90eac4419a387b27d100babfed08ae37c835d54a300b,2025-01-08T17:25:20.823000 CVE-2024-3561,0,0,88f3e14256d827f46421032889c1c5cda4496483f1001600d1896efa64027275,2024-11-21T09:29:52.747000 -CVE-2024-35618,0,0,86fcbce4eb035f60808d5accf542869518cdd99394694db30f159b5f58d7d866,2024-11-21T09:20:31.393000 +CVE-2024-35618,0,1,33b30812f225ee6bf70fa6d1920c4326fecdb5fba7b8c0a942399a10ef9d3b99,2024-11-21T09:20:31.393000 CVE-2024-3562,0,0,9c9f57c5460d61dfdd495d1b087a7861097e9d1e1b57cf14e2455042c8f7bd8b,2024-11-21T09:29:52.887000 CVE-2024-35621,0,0,f51785ebb78acd187faa8aa0ad2ba379530bd3204bd70cc267998376acf520f2,2025-03-28T20:15:23.563000 CVE-2024-35627,0,0,ccde48a8bacc26f12c1c71247e00206b1167454eafcdd659b3ddf4fc995347d2,2024-11-21T09:20:31.750000 @@ -262644,12 +262644,12 @@ CVE-2024-36517,0,0,25520f7bbfeaaa0d674db75f5ceb0dc55bd7766c7f78310f1683242faeb8d CVE-2024-36518,0,0,b008988df19e903bad3b0bc86f6b8c800a5baaacddd161bf228ff0ddf48948e3,2024-11-21T23:06:35.190000 CVE-2024-3652,0,0,f3d59df85a77fa4be0249e01ff821e4b507f89580101327f0c903d244ca366dd,2024-11-21T09:30:05.313000 CVE-2024-36522,0,0,9b80d6d8ad834b2ad12a9c002e135616fd5e236e3616bd648663cccfef77bea3,2024-11-21T09:22:19.577000 -CVE-2024-36523,0,0,f96b73948767a108aa6a4c53933a5a70a8e86ecf0fee88d486802d21f173b77f,2024-11-21T09:22:19.770000 +CVE-2024-36523,0,1,dc465e2d7dbaf26a7ffbd5ea3623a483d3bc760775e8b283b9659c08d888d538,2024-11-21T09:22:19.770000 CVE-2024-36526,0,0,7eb130a5f3d73c89b7f5cd8217a059ab207fdeab2df485fcb069aa0328d07168,2024-11-21T09:22:19.993000 CVE-2024-36527,0,0,2fe968f9db97e47864d546cb83cbb537d4cf1bd288baee48e4ffbf302a88ab2b,2024-11-21T09:22:20.213000 -CVE-2024-36528,0,0,c13588383991fe9c602e7c68f7b98c2db4078ac01cc7d059f8d85dce82512c46,2024-11-21T09:22:20.440000 +CVE-2024-36528,0,1,e6575c53837c766c2fb93853d57b99f52cecc01814536ab060ee03bda6759f4b,2024-11-21T09:22:20.440000 CVE-2024-3653,0,0,54e462017b45f0c8f3e8f7e260b096f8028d979506f49d916b7586b57d75848f,2024-11-21T09:30:06.253000 -CVE-2024-36531,0,0,ae9ed48c8b05e38e32dbfef6efdd9a83a4feba02677f4dba6b702b86319620fa,2024-11-21T09:22:20.657000 +CVE-2024-36531,0,1,29df2394df869cadfdf7a50c5e2aedeb087d9c71589cab5d3631ff40577d0ee0,2024-11-21T09:22:20.657000 CVE-2024-36532,0,0,d4193996b0397e0a4dee577d3e251e2d9d6acc4697b78e5be5b0ad0f0577a357,2024-11-21T09:22:20.870000 CVE-2024-36533,0,0,7b37764a0b7853f615719a995566f68d7a7deee74def6781711cb81ae23e8665,2024-11-21T09:22:21.090000 CVE-2024-36534,0,0,2ccc9352f401338f7a13af480165921c3a497a579b8305661c53b267de31f42b,2024-11-21T09:22:21.297000 @@ -262749,7 +262749,7 @@ CVE-2024-36691,0,0,3dfc8ca2b0f56703968ad393c59292478596f8672b0393464c33aed3c6378 CVE-2024-36694,0,0,97e39bbb6c67fa2d3fcd0bc2d169d009680f66af761bc61f98a7f5a4b2e194ab,2025-04-22T15:36:02.527000 CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000 CVE-2024-3670,0,0,011df7aa7dd67fee8fa9e90a9f41b6f2c6e7db6b1976b1ea32e3493be7d0fa3a,2024-11-21T09:30:08.863000 -CVE-2024-36702,0,0,11a423e8b76e0ae816b52eb2a97a90ec57ed54a684cfbef050a165eeffd8c59a,2024-11-21T09:22:33.263000 +CVE-2024-36702,0,1,f2d45f17ea3e82ce7479247dd0f91368cc9f35c357535cff5ac3d52970c44728,2024-11-21T09:22:33.263000 CVE-2024-3671,0,0,6c7e9db7bcb8bd4d88fb03dcd55efbced3b42311885eaba44cee8ee531e31882,2024-11-21T09:30:08.970000 CVE-2024-3672,0,0,1f2bc8d9980c77a412c99b81b7443d8ae5ee623a7dabac082ebd0f43059e4c21,2025-03-12T18:51:24.880000 CVE-2024-36728,0,0,98745f7ae6a09e8beeab307ac2ef178bbd4a93f3ec3657860e7a261efded73ee,2025-04-01T18:21:29.640000 @@ -263569,9 +263569,9 @@ CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000 CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000 CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000 -CVE-2024-37663,0,0,fed344a0d61f1e567327514f6a8e91ad3162275e1c47738bf38d3802a419ffbb,2024-11-22T16:15:24.273000 -CVE-2024-37664,0,0,ec10d2a017c572696a305d5984bbbc6e09db1615173526af4be64eee6d7ed665,2024-11-22T16:15:24.463000 -CVE-2024-37665,0,0,1eb587434ded45d2e868af7abc77840ba8d1cc348193e8d80a8fd746774e5a12,2024-11-21T09:24:12.510000 +CVE-2024-37663,0,1,0350e1df46b9c03476a6921b27b5739d2a9a16e3abb310ac2c48fd9f451c04a6,2024-11-22T16:15:24.273000 +CVE-2024-37664,0,1,e6af7d2e65909320ac2e066c551b6342cf322fc988e4e028dd24fa51ad921593,2024-11-22T16:15:24.463000 +CVE-2024-37665,0,1,12bbb23ba5b5e0edb3ec11fda3f7d1e627031136f537c2d99361efcc408d306b,2024-11-21T09:24:12.510000 CVE-2024-3767,0,0,b4ea3f0e16993e9f310cfbde1e62879723209ff6ca6fab1f3423f8b6c9db7f57,2025-05-30T12:15:19.907000 CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a803,2025-03-14T16:15:32.600000 CVE-2024-37672,0,0,e44dfa3a5448c7ddc8be3e7358264cb6292a7fdffc27b2a73e33c9a81cd357fa,2024-11-21T09:24:12.893000 @@ -263600,17 +263600,17 @@ CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000 CVE-2024-3775,0,0,527f7d608f8da6f09f241b673d5077f6d9275917117f8ac6d0ce1a26efac2c10,2025-04-08T16:30:51.500000 CVE-2024-37758,0,0,6aad1ab20925aeaf835ed115698dffcd6067c2af6f08e49e2fb33789c105b9ec,2024-12-20T20:15:22.937000 -CVE-2024-37759,0,0,18b1e88dc7a3b7f932762ee7014dce51b56c599cd2ee7466ac0b38dc37564402,2024-11-21T09:24:16.593000 +CVE-2024-37759,0,1,b1cd31f2236f385048ddf3870ec884f6633938acd4c831aec3f48ff18d5b0d47,2024-11-21T09:24:16.593000 CVE-2024-3776,0,0,f1875e31c2fb41ed87b0999dab19da3668683a670607040ff349bb93a48f4c45,2025-04-08T16:31:04.280000 CVE-2024-37762,0,0,e5f736f5834235475cd2df0b4cffb0c488f0e2566543dfa263c43f8239901743,2025-04-30T16:37:36.887000 CVE-2024-37763,0,0,7f19c01bae82333f6ad4461e377e4924b7a38f62f73deecf0f18a1d6b2fd4dd4,2025-04-30T16:38:05.183000 CVE-2024-37764,0,0,d554af21a7c3a4aff573a0be9ab9a1629f6264406707d6bf9252e1ef489570b5,2025-04-30T16:38:17.533000 CVE-2024-37765,0,0,f3185fbbd47204674a24d470b2645be2cabf14618451b7bda752c2ac08d56bf5,2025-04-30T16:38:29.140000 -CVE-2024-37767,0,0,58a85c325101746390b58f934ab900468240b96d335a9904d63295638f00e941,2024-11-21T09:24:17.733000 +CVE-2024-37767,0,1,221f7c9d46be834de8a85bc4b526d4356361ed9b8b092428c421ed3eda85d264,2024-11-21T09:24:17.733000 CVE-2024-37768,0,0,50094b0f1db8404ad9bfd9bc5a559978e0dd5a7ad1bf07217a58688f10b9ae46,2025-03-13T18:15:41.653000 CVE-2024-37769,0,0,ebb9ba49fb51ffaaf91f9ff8b56894aba69c0664bde10d7ebfe9dd5080822c95,2024-11-21T09:24:18.103000 CVE-2024-3777,0,0,9c64d20bbd11f2588c9550f82e52ef8d41c5199ff9e437f1c31687a8996d07cb,2025-04-08T16:31:20.500000 -CVE-2024-37770,0,0,3ae1b26b08d620f39fd2fc9b0f3e94aeedfe3c4571e06714b0c443b19a9d4c82,2024-11-21T09:24:18.330000 +CVE-2024-37770,0,1,e315feabdb774b919bbc85ae95ea95f3beb4ffce467fa75edde7f8b2876de384,2024-11-21T09:24:18.330000 CVE-2024-37773,0,0,2e017074765151e5ff695c0297fa00e3f03e86b1bfb2dff271743421377148ee,2024-12-17T16:15:25.580000 CVE-2024-37774,0,0,2ab42b0c0633061036f05297b975d97fe83d08d18d378d73ce77bd2cc921027b,2024-12-17T15:15:14.210000 CVE-2024-37775,0,0,d5fbd8966422b87b56ffba076c5e4680a0b14972527b1e66a09cef04e7bc291f,2024-12-17T15:15:14.637000 @@ -264123,7 +264123,7 @@ CVE-2024-3833,0,0,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf13 CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000 CVE-2024-38337,0,0,419fb31ae4d2b0caed4b428a1b986d96cd628992c203de404d42c789b322191a,2025-01-19T15:15:19.770000 CVE-2024-3834,0,0,947eb53652569d79e3c1cf44919e7a8749c280dc3486461656b1c499598740e9,2024-11-21T09:30:29.777000 -CVE-2024-38341,0,0,850315cd3964564c03901563209428a4f21a570d75d8364e7b2ec5e86e435079,2025-05-29T14:29:50.247000 +CVE-2024-38341,0,1,d6b7ad42eb9b27f59505a9d63e5829475baa65be56435069ce2ebf38890e6f2b,2025-05-29T14:29:50.247000 CVE-2024-38344,0,0,c3f614f414d62cde3a55726244e500e4dd08719f2cd9a8082171daa986ea9b20,2024-12-06T18:15:24.490000 CVE-2024-38345,0,0,400450ff3ebad18f0e8e828d45ea71d10de9ed5d2c1fe1a079e13b55da9d6f74,2025-03-13T15:15:45.720000 CVE-2024-38346,0,0,529192cac0436274637fa1618166663c66d81af410ac645501c6761c48d76600,2025-02-13T18:18:07.873000 @@ -264595,7 +264595,7 @@ CVE-2024-38797,0,0,245d3d65a782de4eae4eea11e0031ff3495cc97cf7a3b931f76e416d5c7fa CVE-2024-3880,0,0,d56040986238a77f83b423da390e12e4147bf016a3fc99a53781cb6cca9f4edd,2025-01-27T16:24:26.973000 CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000 CVE-2024-38807,0,0,dddf460600b3bd4efb51aaec3cf95bb5fba4990a48f37da4c2207afc16479dc6,2025-03-27T17:15:56.383000 -CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000 +CVE-2024-38808,0,1,b5ff2c2f3626a1d3beaf729582255315f5a976dd995ff1404a771bdc7a2ace0f,2024-11-21T09:26:50.877000 CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000 CVE-2024-3881,0,0,38ab6d7d284c0ca3e6b9161a425cbc55ade2a75172ea4255ce3e799638ef4528,2025-01-27T16:25:02.423000 CVE-2024-38810,0,0,b0fcd74f79fa35c178fd95ad339848e90aaf2c1a13bef0d087d4ef4c6710587b,2025-02-28T22:44:24.380000 @@ -264687,8 +264687,8 @@ CVE-2024-38944,0,0,aea38a4752802a1f34132bcbb575e35233d1954a8780f67f8d4f7cb5965d4 CVE-2024-38949,0,0,c2dc06410437d6b7466efea86067a9318190842975673bba6b77a4e1a5edd255,2025-06-06T17:15:02.730000 CVE-2024-3895,0,0,eec6aef993f3d43c7eb882a2a9d8a867f219e712647ca683547eabd57b58d62f,2025-02-27T16:42:58.907000 CVE-2024-38950,0,0,b05ec5a7eea79ccf66874cc1c1e33b8a664ca20ede6d8633e744c6ba6aa1834a,2025-06-06T17:15:28.550000 -CVE-2024-38951,0,0,17e6d72d6ddc33d1e74949cddb49cc4cea8c80a6d51eb19eb8f6f6dcf3bf4102,2024-11-21T09:27:00.490000 -CVE-2024-38952,0,0,f38baf84d36c6a8308d09b2d27a0d4f36a3cd4be5595209fae6a993eda0806ec,2024-11-21T09:27:00.710000 +CVE-2024-38951,0,1,eb1c2f990a3b53454a63f35363a173d66e10d642cf9e31141f2b2fd6c7afce16,2024-11-21T09:27:00.490000 +CVE-2024-38952,0,1,0991fb9a2c897c3ad97ee716b4d0ae9028499c340a952e809c6cd3d168088a86,2024-11-21T09:27:00.710000 CVE-2024-38953,0,0,fd9efa483bb26dd3f6907738be0603b61a425b96c3ed89017c91e47bd1d62539,2025-03-20T21:15:20.563000 CVE-2024-38959,0,0,b7a13ba0d1a286828b3ead96faf20fb0b1734fa356194aa9829d2fe8b6d41b7c,2024-11-21T09:27:01.083000 CVE-2024-3896,0,0,247cf3f6006a9a5af036afb01e7d744e3318331cf38d00425d835aad5e159e83,2024-11-21T09:30:39.127000 @@ -265544,7 +265544,7 @@ CVE-2024-40101,0,0,5bdb2e8f2571881865018ae9258456ef3354760d07b9ba22859fe6143cbad CVE-2024-4011,0,0,023a65dd1f5eb72b47a28389dd0798106b90c6451db9a08d936ec1bf45bba714,2024-11-21T09:42:01.843000 CVE-2024-40110,0,0,7977104a17d98c8ed6f9bcceda6dc05f4e647c9fc83bc6f905a0f6c4f3a00efd,2025-04-23T14:19:36.130000 CVE-2024-40111,0,0,35b0050b7d8d9045b9cae343cd8e95f47419f422608243682c7eeeadc6be1b0f,2025-04-21T14:38:21.703000 -CVE-2024-40112,0,0,0ed7defdcaf4ab10159732c2d397d7c7c6b7d57d4ba24b557fa6e023f17aeb86,2025-06-02T19:15:25.003000 +CVE-2024-40112,0,1,037ee99c210c192c001d6905016d08cc3f7336be57446d8647a10dd09442c32c,2025-06-02T19:15:25.003000 CVE-2024-40113,0,0,5bf901ea49053a76af8065063b17a3af27a6eb321f89a005976d39d56242def1,2025-06-02T20:15:21.963000 CVE-2024-40114,0,0,d74f70d40261a14b21c8166a9b0367f1ba5b7cf19e4a44031ad7d7f14ebbda4a,2025-06-02T20:15:22.130000 CVE-2024-40116,0,0,19134811427fbe9dee5753b9d0c099a969fd07ce07ff2e8eb545bbcd0f670222,2025-03-26T16:15:20.330000 @@ -265617,7 +265617,7 @@ CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000 CVE-2024-40422,0,0,6808f4638a336c49c8bee4ab2c82ba14479baa38f197ca7d031042a0e1bcff02,2025-01-29T22:15:29.260000 CVE-2024-40425,0,0,81a735aa760a40f04f27a92364bcdd5799b5ae544ac617e40c579d873b6adcfa,2025-04-28T14:46:31.877000 -CVE-2024-40427,0,0,edb2ed6f04ab924988a6c43762419200f816f91f867e2f61b6ea78a526ec38ae,2025-01-08T19:15:31.043000 +CVE-2024-40427,0,1,8a9b7dde248d9739ba8feaac03cb0cadb2208f2e3117f71629e605cca7df72f0,2025-01-08T19:15:31.043000 CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000 CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000 CVE-2024-40431,0,0,e23592fbcb9fa660acf205a0231389b077a5c59972c85ee664d839efe06b83e4,2024-10-25T12:56:07.750000 @@ -266355,8 +266355,8 @@ CVE-2024-4133,0,0,b3ef04d8b613050399a6f1883ffb08523c57dc187e5da232762cb73f9e4425 CVE-2024-41332,0,0,cc02f33b74ee2fc09a400d920f2e51c2c74d8736b4d9412bf001181512ef987f,2024-08-21T18:53:15.927000 CVE-2024-41333,0,0,66c3404ed9fde92a95b14a6fa3a4ef4f2a79fe01a45aa1f77c349897e4ca886b,2025-03-13T19:15:46.613000 CVE-2024-41334,0,0,3ae8a4ee8c88441e1eb5ab8927a9b6d515b9f8f5444d477547ec610083935fa2,2025-06-03T14:06:43.900000 -CVE-2024-41335,0,0,c8c1f90aa3d7a2b3364d2b6b3802ebf58472c838a6fe8b359715ce31f6ae5a06,2025-02-28T22:15:38.717000 -CVE-2024-41336,0,0,c5754e32e597dd06648e4c1bce1a6d8904ca7d235187f9c7249b8af45fc0e8c2,2025-02-28T17:15:15.283000 +CVE-2024-41335,0,1,6c568564866794adb8bbe4d3e97a7f5aaeff2332d84cda37ed7b1063af173b71,2025-02-28T22:15:38.717000 +CVE-2024-41336,0,1,e91279e1cc30b83e4c1ffc881ccc9c941ba02590610e967a1bcea2e30eff13aa,2025-02-28T17:15:15.283000 CVE-2024-41338,0,0,9a9b2e01ba5959d0a7cb4b88b1c998552219f4f0176a8a77c344dd9b10484cd4,2025-06-03T14:06:40.670000 CVE-2024-41339,0,0,83f55f10174f13ec8d1637a068734c7ad23defbd407fbca71e52f6b6f367a5e3,2025-06-03T13:52:39.957000 CVE-2024-41340,0,0,a23ca879f4b0d753c3c7ea37d7f92aad2ddbd6f00f96c7e4f8049055d9f1b397,2025-06-03T13:52:23.300000 @@ -267030,8 +267030,8 @@ CVE-2024-42187,0,0,1a7e90ec8fd6111568607e7fe4efa4740b10d0987e11092bcc048a6df4194 CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce136e,2024-11-15T13:58:08.913000 CVE-2024-42189,0,0,e7b7c7acb940f790abe786406958a41f711525d4b7b58b2364ea753522f57753,2025-04-15T18:39:27.967000 CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000 -CVE-2024-42190,0,0,10159244d05440e342e7c29a4bbee98d9f3d36228a41fe1deb998a9e3b7ed1f8,2025-05-30T16:31:03.107000 -CVE-2024-42191,0,0,8d28c5c11c87b18801f985b6d0bea12fabac84dd0303067300c9d3c4e8155aff,2025-05-30T16:31:03.107000 +CVE-2024-42190,0,1,69bf56bf943618d9e5acf97972b92eed4af49432b9def375a44ed1764e72d3ff,2025-05-30T16:31:03.107000 +CVE-2024-42191,0,1,9a98a93ef361e083160bf0979d207cbd4aa0a4d07194dd92600e57c996d5af44,2025-05-30T16:31:03.107000 CVE-2024-42193,0,0,d496336e10e290c03b4d9d1ca9b765852bf46abc8e173adc595ed636cba288c3,2025-04-16T13:25:59.640000 CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000 CVE-2024-42195,0,0,e6096f9dc2f9722c72b059c5d253725037975b1bafcc67e37418fa8cf4e4bea3,2025-04-21T16:50:52.820000 @@ -267368,7 +267368,7 @@ CVE-2024-42556,0,0,ac1b4152bf99bca20ae35623d62f61452a39fb306fbbee858a0a5374f0e4f CVE-2024-42557,0,0,b692a3b0466194a416876ee66549e1bd8b2c7e51a5c1228110019b0c078e3135,2025-06-05T20:18:43.920000 CVE-2024-42558,0,0,ddd5492e2b52bc68def78917541ff4f0fd5129fe9226419b3f94cbbe242b143c,2025-06-05T20:18:30.253000 CVE-2024-42559,0,0,f7187969dab6ad6558e1754351d11efdd6752164963d45cc6208ae6834946dcc,2024-08-20T19:35:10.850000 -CVE-2024-4256,0,0,a23c6e105363294cd609338a4321d65e7d564e20defdf7abe66d683de8d7eb32,2024-11-21T09:42:29.233000 +CVE-2024-4256,0,1,d49aec8fe15164ba0c34419bb728cd7f5d55e9099f83229ccad94ae2b4282df1,2024-11-21T09:42:29.233000 CVE-2024-42560,0,0,d8e63dfccffe358d8f5f12e10d5c3bdb3d80b3adec563f71c08b10512ad5a438,2025-06-05T20:18:17.887000 CVE-2024-42561,0,0,d70955b1d40eb54377d8e12e382907c01dc23b672669cb749222161095d7676d,2025-06-05T20:18:01.470000 CVE-2024-42562,0,0,4d5f095c6cbd840b865bd2919364e7e80c3562dd9684dd1b1a5a56be9c16cd36,2025-06-05T20:17:49.820000 @@ -269251,7 +269251,7 @@ CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad4366 CVE-2024-45089,0,0,542dfbf973be63b03ff718a4f3a8fab91d5b396d4bcab48b662c4f8c45834b4d,2025-03-05T18:26:20.030000 CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000 CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000 -CVE-2024-45094,0,0,0dbd3d54fbb989f6593751dd5d0f299b333fdf8720b3f63f9ae0295ffbfa3f62,2025-05-28T15:01:30.720000 +CVE-2024-45094,0,1,2b09b7fc771c4daa8478af37711f75c45800e30b39dbbc8d965289f4da44ca90,2025-05-28T15:01:30.720000 CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000 CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000 @@ -269353,7 +269353,7 @@ CVE-2024-45190,0,0,0f9f782c7151454e0d4128d12af9212beba44978a9aed3b521bd26751a906 CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344cd0d,2024-09-10T19:35:09.727000 CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000 CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000 -CVE-2024-45194,0,0,39e2c5f5618c81787bf696cee2375dcc2cb2276d4de328350b388d7b61cd41b4,2024-11-21T18:15:07.483000 +CVE-2024-45194,0,1,77254ca1b6587eb5e8e927e61ac00c230760a8a07d84f59977c03150f9f0d924,2024-11-21T18:15:07.483000 CVE-2024-45195,0,0,66d7d17610be0ce972b0de44bf228f2798ff0c35e717addb513b69a67e048bdf,2025-03-06T20:29:26.130000 CVE-2024-45198,0,0,134993cac349ebf82d298e5073984534c7242ddbcd9101d3655d2204b035998d,2025-04-07T14:18:34.453000 CVE-2024-45199,0,0,c6602917531b3a4a24fe09da269c6b74fc73422a338a1c1c0a7fd7dffcb01ea2,2025-04-07T14:18:34.453000 @@ -269632,13 +269632,13 @@ CVE-2024-45507,0,0,292f629c6a87641a94a56ae502069538a901915469619ed29fbca308aa38e CVE-2024-45508,0,0,282f14e0c6d5c1745edee6cef671461c0f4843963f9a8f92a866f7bdf7838587,2024-09-04T16:44:08.247000 CVE-2024-45509,0,0,736c8c139fd1608cb3be11235a5c5466d4d50c1b73aae37d19f7a9e4cbe0049f,2024-09-04T16:45:08.597000 CVE-2024-4551,0,0,ebfe824d47aa8b9a9c8be96b490be4f6d7dc3d6dc4cd6f3b24e9937381073d09,2024-11-21T09:43:05.280000 -CVE-2024-45510,0,0,2a06dbcfe7a1093965b0932c3cfd31b6c2af9495e32165add00fa11b934a1789,2024-11-21T13:57:24.187000 -CVE-2024-45511,0,0,b29e6e9c1ec4bf298a5b247efb6fb18997220c72b78bc767a723162cad51a3d9,2024-11-21T13:57:24.187000 -CVE-2024-45512,0,0,10a07aadbf5b4d2a6e5893cf2d2ebb8d22843440f89b8ad89cf2e294ee001586,2024-11-21T18:15:07.950000 -CVE-2024-45513,0,0,25383385e2481e17b58af0b6e8f56bf94670b2d8f40ad98216966f161261eb60,2024-11-21T18:15:08.610000 -CVE-2024-45514,0,0,7c4b7c6d70b14b13f42d6ce3c0114c4be691ac359315234fcdf5201ecc180838,2024-11-21T18:15:08.980000 -CVE-2024-45516,0,0,a2945caa2f10879aa06ae878506848a02bc4197690639ca8726ef04992091512,2025-05-19T15:15:22.270000 -CVE-2024-45517,0,0,9ae29652a251f6463a9327eae29d2e48904246c6a1726faacae2bdc1383f4e16,2024-11-21T18:15:09.360000 +CVE-2024-45510,0,1,04bd20caa2b336b99bb81a2788708cd6a4a247c33c3a2846a8a3b65a8d33a29b,2024-11-21T13:57:24.187000 +CVE-2024-45511,0,1,e475e616266ec564d549d6028a77d1957568eb01675acb333acfcddabccfbc02,2024-11-21T13:57:24.187000 +CVE-2024-45512,0,1,d42a48c2c8b17f5eb35f6e9d7d58c7e63edc858a28516cb52b76ec5dc1f00d11,2024-11-21T18:15:07.950000 +CVE-2024-45513,0,1,33f272d5b6a0063227d8fb4cc7cd95129f52987dfa450eb2afe2be21c3cd39d6,2024-11-21T18:15:08.610000 +CVE-2024-45514,0,1,1167ae1433e507f2a7f3d644dc89c214d279d1d1ee11704ff034f0708eedae00,2024-11-21T18:15:08.980000 +CVE-2024-45516,0,1,11620dd2815f49c211c8986fc96815cfe98b0f29e291c76c9503fc1f6551dc38,2025-05-19T15:15:22.270000 +CVE-2024-45517,0,1,4073d89cdbf046937b9e4b07c4378ebae49966e30218b0de07d0d4979e522c32,2024-11-21T18:15:09.360000 CVE-2024-45518,0,0,097e334ff5ea6e41f366599c72134c8651cb553e492c30874b146dfc7c023e19,2024-10-30T21:23:59.893000 CVE-2024-45519,0,0,094ccd6257d3617e5ee5eb108e56e5f8206c097c09ed366876abfc431763f55e,2025-02-25T02:00:02.097000 CVE-2024-4552,0,0,0ac013621f010657983b95b3c9656c63a7805aea50fe3c0c1148c97b70e80ccb,2024-11-21T09:43:05.410000 @@ -270264,7 +270264,7 @@ CVE-2024-4665,0,0,49140a45545984e474cb90830c7b9d9cd9cd552526a95fbdf91fffe21244f3 CVE-2024-46652,0,0,9d991062832040a51c98317f39646415912fd91ef88373c07e33763486519d6c,2025-03-17T15:00:28.117000 CVE-2024-46654,0,0,c74da1d3a3e2027fca87cd498f3ccd2a77f0ee0cd7043213e593ea7b1b755061,2025-04-28T17:51:42.197000 CVE-2024-46655,0,0,619756e28facd4dcca44a3c94ed931cf61b4408f1c51eeb5eca49c9e1ace2a15,2024-10-02T15:40:36.090000 -CVE-2024-46657,0,0,a5ced2fc9af0ce563815dae98d1fb612587af65b11df31ab1959075bb6481834,2024-12-11T16:15:11.770000 +CVE-2024-46657,0,1,b6ed71ecc357dcd8fd408cead275659df6ce08b435e9f2f8f2848ee99b6d7784,2024-12-11T16:15:11.770000 CVE-2024-46658,0,0,8759efef114d9b796a08c43f5fa85fe56a819964b257a73be81a7a6eec47c6d5,2024-10-07T19:37:30.467000 CVE-2024-4666,0,0,ab28193f6e198cadbef7b2e3bf1ae070cf9da24eb5094d7424cf193802850882,2025-03-21T18:58:50.513000 CVE-2024-46662,0,0,f6a44909ae8213588e87feadee5750f4ec24eb72651754a9de53333949170b2e,2025-03-14T15:15:43.200000 @@ -271515,7 +271515,7 @@ CVE-2024-48013,0,0,9133da671ec893e99c2e828463e6eaa00b3c3a1f07884f2f5cd121c15f8b8 CVE-2024-48015,0,0,112fad1c58e3fd6c17534bf2998668a0134bbd2a443bd0d0968fbc9e00100554,2025-03-17T18:15:19.383000 CVE-2024-48016,0,0,04cb598db2857d7944cce50bcf619a0dee145ba07ef43a0beebd957b9209e96f,2024-12-13T15:13:14.883000 CVE-2024-48017,0,0,45350bec87faa22f26571f591f0f77964f239ae6a785f5ffb61dcd32c5292f02,2025-03-17T18:15:19.543000 -CVE-2024-48019,0,0,bda8728269b6297881c31e465d3ca1c4d84e83ad589447c2af586de2bd65bc03,2025-02-07T22:15:12.300000 +CVE-2024-48019,0,1,90c1fd9ac55eec5cd1ddd1e35bfca46dcc3cdaa1fd0f2b1cad5b17d6f234f218,2025-02-07T22:15:12.300000 CVE-2024-4802,0,0,6b4195f170cf4837de8b8ba0dbc948c460d1f4945cc47040b6b6279b14b196bc,2025-02-11T18:30:08.557000 CVE-2024-48020,0,0,66d35d0e43259dac4ce8f67fa430164a93786f466a2ab3da417eb0d47f384ac7,2024-10-15T12:57:46.880000 CVE-2024-48021,0,0,bd1b80eca231c15d52a9386c09058579df399b553f2fdb9b275ce81686277fd2,2024-10-18T12:52:33.507000 @@ -271602,7 +271602,7 @@ CVE-2024-4817,0,0,0dcd699a58b3fa13f00e699c07879a8849bbc3d5b97bd9762b35657461b567 CVE-2024-48170,0,0,34fd20d51f74a2ecf2d8d3a06f0137fb8961ff5f329c5a6acaaa7ddfeee73779,2025-02-18T20:15:19.797000 CVE-2024-48176,0,0,8cb771d702cd09277abeddf2e7225393d633247d884aeea4273f944a8d1f66b2,2025-05-01T15:00:20.730000 CVE-2024-48177,0,0,90649086193e291835bdef2f7e6fa80e829ddcc4d99dbc3822e4f44d6589f188,2025-04-18T01:23:30.553000 -CVE-2024-48178,0,0,ee85880b14f6d7dc4a557e98498726e030c1ccf5636d6ad1b49925337896afae,2024-10-30T18:35:13.637000 +CVE-2024-48178,0,1,32a6258baa57a7d7746a683ba56f4157e67eea6cea1bb54c9e9d4414943289dd,2024-10-30T18:35:13.637000 CVE-2024-4818,0,0,7eb9f87453466a82567333ba5bc5e47b162cdd22e1273603be23f63fb83da218,2025-02-20T18:17:41.877000 CVE-2024-48180,0,0,fdcd0adbd6e000b70b86c96463685b3f8e06e9e3d993eb287a59410e3231c0c2,2025-04-28T17:34:22.620000 CVE-2024-4819,0,0,357db78a10d6a847667b9ca0f576e976c5fe2a876dcd6731bb57683aeb2a6700,2025-02-20T18:16:52.500000 @@ -271817,7 +271817,7 @@ CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba80 CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000 CVE-2024-48702,0,0,ba3f6c6bbe6ef3a4806734266bb65891fcc2897db0e2e54b24b1fcc51c133716,2025-05-29T16:15:38.883000 CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000 -CVE-2024-48704,0,0,f8db0c035e34eb8ba47f8b61d61efd8416d1f1bb6daff8aac8adbccd911789b4,2025-06-02T18:15:23.020000 +CVE-2024-48704,0,1,9a40ae6dd8f7a6420f8b0b77f7aaeb9558a492b75f3c18fc0179cf53074d3ac1,2025-06-02T18:15:23.020000 CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000 CVE-2024-48707,0,0,8c5783a4e9b64c0d59925994774447278a2e90a82fd2cd55ee2072a8b3d5b0c7,2024-10-25T19:11:54.310000 CVE-2024-48708,0,0,e061892415ada1b97948e5eaa0f479bd634d96d643152026ca3698c48e905eeb,2024-10-25T19:10:08.457000 @@ -271937,7 +271937,7 @@ CVE-2024-48873,0,0,cee95097906f778e3918c39df3defa2e6d02e9a00cca599ceaeb9dd37d6a5 CVE-2024-48874,0,0,eeaca873ea28c1f296f045cd53e89c3d879a147973586469db92bb65f5b360fd,2024-12-10T19:44:16.093000 CVE-2024-48875,0,0,bb50d02366cde2f1dbfc074cc80cb37e110ec9788344cb4eb4a5fdece8dacf62,2025-02-03T15:17:17.033000 CVE-2024-48876,0,0,22d2844af665c57f4c01ec7fd9c25097e59e54558a31a5014c9af9ca1de57285,2025-01-11T13:15:23.263000 -CVE-2024-48877,0,0,3a1bc8b6fd17aaec1579ef470c47c9a063f5f7fd92c4e5470c1bc491cefa5264,2025-06-02T17:32:17.397000 +CVE-2024-48877,0,1,694c0b5141f8a0898a937ca0dd341bd265a30ed2701ddab551940a96e32083a3,2025-06-02T17:32:17.397000 CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000 CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000 CVE-2024-48881,0,0,b23f95dff65a492953a695b231d4f9344fc7f54af69ded8ea700f43b3702364e,2025-01-31T15:54:29.633000 @@ -272336,7 +272336,7 @@ CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3 CVE-2024-49344,0,0,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000 CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000 CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000 -CVE-2024-49350,0,0,1dbad8bab0bec1bab43ae42b47b769e0309cdf8cc2a7fa8ce93eaa8fab8ea7ca,2025-05-30T16:31:03.107000 +CVE-2024-49350,0,1,f0bd29f3d088a1f3cef4aa16397298c6ef6425e68b0c93a3447bb767a5636482,2025-05-30T16:31:03.107000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000 CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000 @@ -273521,7 +273521,7 @@ CVE-2024-50594,0,0,6dbe79a3a6a50a6894d45384aecc4fb27a81de6f83e2ae6d2ec632656ac35 CVE-2024-50595,0,0,4eaf90809b961211c96ef8b5d025fd52173e939b70ed21593c1b64372689d1f3,2025-04-02T14:58:07.527000 CVE-2024-50596,0,0,47d15c730de656a9380a8bf9a04998558236318a8db036981b1487f27751ec7e,2025-04-02T14:58:07.527000 CVE-2024-50597,0,0,d8dbc554fc3ff5fb6396f190f0ab34c2b83fb6f943f9d89405dbd18a887324bb,2025-04-02T14:58:07.527000 -CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000 +CVE-2024-50599,0,1,d913a409231ba5e6817d392f3176ecc4cf1a5d803639e46978231179f2e29095,2024-11-08T19:01:03.880000 CVE-2024-5060,0,0,9259331461b85b218344bae9506c1ccc79a5eb7cd745e49fb425d4b8636feb8f,2025-04-04T18:07:39.117000 CVE-2024-50600,0,0,1f18a87c7801886bd3cde354ace808a7f14db6d1a9a3674ff94ef2cb61a86901,2025-03-07T15:15:13.750000 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 @@ -273540,10 +273540,10 @@ CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac772 CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000 CVE-2024-50623,0,0,689897be2bf1eff885c220c68e780397d6277f6ae7515a9445eacbcffea8a3fc,2025-03-10T20:25:14.940000 CVE-2024-50624,0,0,4dbef642aecd79431dea3a468f89320966176b8885a0f54cdc3c9f8045e371ec,2025-05-31T08:15:19.793000 -CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000 -CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000 -CVE-2024-50627,0,0,54f35ecd4423ba348ca66129853a9258eaef3460345ced0ea32309ba3face4cb,2024-12-11T17:15:17.200000 -CVE-2024-50628,0,0,0643f111de6b649c82d0d465a05ff1bea2d7a2ca8f3d6abb1fa505b9869b41b4,2024-12-11T17:15:17.350000 +CVE-2024-50625,0,1,e04716b58b85646e0047095f734370c4c20f25404834f8cd5d8b8ded178db678,2024-12-12T02:06:32.647000 +CVE-2024-50626,0,1,2f6bbbf1f6cbc2582724a838bd1830cf40db0c1234105b1e6f20e74933857ec7,2024-12-12T02:06:32.817000 +CVE-2024-50627,0,1,ff0b348c06797fe5e48e7d9d67e446eb1bc6295f54190d0f22bc9fb1af7d09bb,2024-12-11T17:15:17.200000 +CVE-2024-50628,0,1,4a553c5880c5f912e8807dcd32f61b35d93e6e26b90cd026128370309a80a103,2024-12-11T17:15:17.350000 CVE-2024-50629,0,0,3ab50aa19ebf689fe8d57d8f4de1f5774923cb743d9a1b552f7b21d6e2840ac2,2025-03-27T09:15:14.190000 CVE-2024-5063,0,0,c4410869e86851d742c625b6deef659a651b11dd076a037bf0676028b9f3f6c4,2025-03-03T16:05:23.833000 CVE-2024-50630,0,0,5c8281a1fa2d55a1383c52f2f4c6ed3a28e0d51d7e43af12525259f292ce7e7a,2025-03-19T06:15:15.620000 @@ -273554,10 +273554,10 @@ CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb CVE-2024-50637,0,0,d977347a448c3f65e92048b639a2e3e6ff98b542be1611660d9dca9c5510503b,2024-11-07T14:15:16.780000 CVE-2024-5064,0,0,f3128209b12028d04e6a7e837d64ac624476875032530ae637e0101f2bf4284a,2025-03-03T16:12:05.970000 CVE-2024-50647,0,0,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000 -CVE-2024-50648,0,0,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000 -CVE-2024-50649,0,0,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000 +CVE-2024-50648,0,1,53a8a43d69ed6169ef55cb4c645011c1c5b7dcb06b5e3a6d5df7dcccd130d50e,2024-12-03T17:15:11.357000 +CVE-2024-50649,0,1,7c01d304bd0075312f325657c22c3dee81dea165ef59fbdebed626d5f9b47885,2024-12-03T17:15:11.520000 CVE-2024-5065,0,0,4d389f7ffafe35ab051d5dfdd19eba073011744256c497277412a2dc4f6458b9,2025-03-03T16:12:28.940000 -CVE-2024-50650,0,0,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000 +CVE-2024-50650,0,1,0e168e638369ee06aa2ce73c16070ef49acc373a74af63e71180b64ca7adbf50,2024-12-03T17:15:11.683000 CVE-2024-50651,0,0,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000 CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e4e9,2024-11-22T00:00:27.760000 CVE-2024-50653,0,0,89bac720c13ed581e551243dcceec428dea469c5232302aa9e202134372a9622,2025-03-13T16:15:24.190000 @@ -273624,7 +273624,7 @@ CVE-2024-50804,0,0,21eef12522632cc6200c04fd0be5f19a3047fb28d5a76fe0dd4b691ab9b08 CVE-2024-50807,0,0,68d56b95fd35caa574eb5692372d3ec720636d13dc1d98ae4382a89d8f14ff52,2025-04-16T17:15:49.380000 CVE-2024-50808,0,0,db4904fc31570cef2bf1a29cc94612eb0324328a02747c0089b5db52a20d298c,2025-03-28T17:12:22.013000 CVE-2024-50809,0,0,914ce698b44822ab37f48cd0281a75805aae4ad7652024103c7e3c2ee2c0d112,2024-11-18T14:35:04.110000 -CVE-2024-5081,0,0,15c0bdf8294535879e508dfd26c86c4970d69b5008ecb1d47e8260494db448ad,2024-08-05T15:35:16.180000 +CVE-2024-5081,0,1,77ef1fbe0b0f3bea7d165d1f5f4f1c39a6db5837cace7b45c68561828b38a02d,2024-08-05T15:35:16.180000 CVE-2024-50810,0,0,40c5cba2a057a8a2f2f2ec5ecd43f20e6d64c81adfb5faa46ed885003c34f637,2024-11-21T09:44:56.153000 CVE-2024-50811,0,0,a0bf4ef27b4f928b18ec14151892d2f67ee4bf77ca0382bb97a101414a91d2bb,2024-11-21T17:15:21.193000 CVE-2024-5082,0,0,38a4e64df544acc384c41b20dd8c70ef79c627e7f5e38db41787fb84a80c9d2a,2024-11-21T17:15:24.710000 @@ -273651,8 +273651,8 @@ CVE-2024-50840,0,0,6cf96d8e3468dc229af8a367d7ae573ba440c9e1ce5868e76479a9dabc498 CVE-2024-50841,0,0,0c9f5d96c311feed151f0159836ea6d99ded7827df5ad4d8897d729392dc7667,2025-05-06T13:41:58.050000 CVE-2024-50842,0,0,4c735253ec1e8b86c3e85fb3a1ca258bea07d4915643f46399467486251fb604,2025-05-06T13:41:46.400000 CVE-2024-50843,0,0,6acc80c8b4614d2e59af8695a22de1b6450b94cce946869e20e2f46f841378a3,2025-03-27T17:49:33.550000 -CVE-2024-50848,0,0,2d8774fe1bc1287e41412d675d52f14ccc1f61bc18eab50d84beda65b3edb35b,2024-11-19T21:57:32.967000 -CVE-2024-50849,0,0,f70fb1101d10135b60ccc2c8418013639812924854d9823267d5601e8e5c6e4c,2024-11-21T21:15:22.790000 +CVE-2024-50848,0,1,029be70c6f0581fb2d1c733e95adef6b4abf98e8e75f3950fb323857590bcd24,2024-11-19T21:57:32.967000 +CVE-2024-50849,0,1,e67c5a6149d8b159c78ff28b73b71340785928f655a17cf30920dcd256664bf0,2024-11-21T21:15:22.790000 CVE-2024-5085,0,0,6d4282fe0a1ba0f862798def59da3a37fcde959484995ab67584cb690f171172,2025-03-01T02:39:18.967000 CVE-2024-50852,0,0,a554aacf991646da5b2721516004d1f4d3015c73785e9e42d26b1a8b27fd0d85,2024-11-21T17:15:21.473000 CVE-2024-50853,0,0,a2c16db2d9a48c6744a7c1a41fb13ec1d9457efe837db0d74474da40cef9ea9d,2024-11-21T17:15:21.783000 @@ -273669,14 +273669,14 @@ CVE-2024-5090,0,0,be9394a77b166a243259c0077ca7af2caca708f2842e943e56e3d030bdb15f CVE-2024-5091,0,0,393c014b4bb52a48a9d4b8937594c0dfb4193040ec7b84211155e6ea1ec0e366,2025-03-21T19:32:12.860000 CVE-2024-50919,0,0,fb052922a459f7b1dd8ee6fcbb4fbbdf9bcc2335a1dee025c3ccd9bb03d25f38,2025-05-21T18:06:38.037000 CVE-2024-5092,0,0,a6aa1eacad0ce06d5b2937e57090c83511924826ad271d66c972571f704e30fa,2025-03-21T17:56:42.750000 -CVE-2024-50920,0,0,0f6c59e900380c66d8bf5dcdfbbba3911f05fb242ca4e846968e6d3f6ebd770e,2024-12-11T16:15:12.907000 -CVE-2024-50921,0,0,6ce783b0fc4d89dae2a5fe04d69fadc8b98fa85aed19d73aa6b56684e6034371,2024-12-12T02:06:39 -CVE-2024-50924,0,0,6cb2fa31ab1ceb5b3ac94b7d5e3bd7bef49e9f8cbb433f140d2bf7455bc8527e,2024-12-12T02:06:39.167000 -CVE-2024-50928,0,0,c09fc0efbea4ec7210ee15c96b01e65d62b7b15c14d924353fc6d67916a8a972,2024-12-12T02:06:39.320000 -CVE-2024-50929,0,0,47f23928da83ad2c0c51cee17ae9328c5cacc7e7384629460b55b6f518b54aed,2024-12-11T16:15:13.113000 +CVE-2024-50920,0,1,f761b033f931c1ea5dbcff28f0217a156b5bc80fc79ac996275567284aeda4e8,2024-12-11T16:15:12.907000 +CVE-2024-50921,0,1,76bec817133d5b73fa11c76333760bc7e661713c32cc6b39ca483d0903c8d32c,2024-12-12T02:06:39 +CVE-2024-50924,0,1,f568ae92c3355a2c97ecf600ddbf67442c36bbc9a73317357893b27d7233f7cb,2024-12-12T02:06:39.167000 +CVE-2024-50928,0,1,ada67f2fe353aa1b7ced6a9deb8a0c7b6223eab28709c3283d81f0a7c20ec6f7,2024-12-12T02:06:39.320000 +CVE-2024-50929,0,1,834efd5e551720df1eaed9299c86c084dd2e69f9c40050772dafa31cc6ddac9b,2024-12-11T16:15:13.113000 CVE-2024-5093,0,0,3381b2d75db326726a4e09211cacf9703517f305d39e11cd5f4617ce5f18de83,2025-02-10T14:39:43.950000 -CVE-2024-50930,0,0,ab7e60d69bf9ecdfb091e1a39c70aa41981d95981db536c872725a5ff67717c5,2024-12-12T02:06:39.577000 -CVE-2024-50931,0,0,bfe4e69023fe06db8f71d2d6d60e3e4922b2fefb11f278f99af6208127c39938,2024-12-11T16:15:13.317000 +CVE-2024-50930,0,1,6d6b0bf05a5beb39024fe11b26d3f363e871c0c6f62f0c287cbea52175dc4b00,2024-12-12T02:06:39.577000 +CVE-2024-50931,0,1,accac0bf63d9b6afc51180aedd056f4d256fcaeb627d252f452c4f80178bd1de,2024-12-11T16:15:13.317000 CVE-2024-5094,0,0,c4bf8f3b10d77fb6e41e4a8adff10e5a5809b9d01a240dbe491d9e10a6476b88,2025-02-10T14:40:20.827000 CVE-2024-50942,0,0,74bb27dcec6f641721fef2704da713b75046095ccb8aeb2b392b8ef1abb8cd71,2024-12-04T17:15:15.020000 CVE-2024-50944,0,0,b076fd8f2f10d50911c6afe5f96c302ad9e2ba9d556044ae62121186adbd1b23,2024-12-28T19:15:06.197000 @@ -273930,7 +273930,7 @@ CVE-2024-51447,0,0,ca02c708235389eff2271ca9b5fe3cd732672cb521c9367184c5aa020d2fb CVE-2024-51448,0,0,f6ddbfd669769e805d7a6af10df6e6a89f4b4246041ab57849f0d0f903c18615,2025-03-25T14:06:48.877000 CVE-2024-5145,0,0,52db126efa8d68896c59b5edb3071e21d1f8ed443b2315a75a847fd83c525b2c,2025-02-10T13:57:18.723000 CVE-2024-51450,0,0,b24ea7b4369b0a65d966e21c7dc8a033d60cc44bff8cf30a91a024c498c7fa31,2025-02-06T01:15:09.420000 -CVE-2024-51453,0,0,d190cdab60aa4fd500ce7bd2aecc4a70ca00ff5b092157536682a1abfd79971f,2025-05-29T14:29:50.247000 +CVE-2024-51453,0,1,1452147ae14972a78b8d250dd6ae1ece8c45ce9388db2be04829e2e421e1114d,2025-05-29T14:29:50.247000 CVE-2024-51456,0,0,3719dc3b9538c2e6bef598db1a27814959e82ec148d71f3910afc75f2585f309,2025-03-28T19:19:43.600000 CVE-2024-51457,0,0,0ecbf506964ce26877e8439aa4a3160d1450f6ed502906387cfebb224c3433bb,2025-02-18T20:15:21.160000 CVE-2024-51459,0,0,f0a834f211baf1829800edc9ad0b05f685224da81796863597230eb3c918ece2,2025-03-19T19:15:42.180000 @@ -274436,7 +274436,7 @@ CVE-2024-51938,0,0,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000 CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000 CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000 -CVE-2024-51941,0,0,99e7c2ec210b1b461bcd0a5c19e2f109b9f77e87df47efb160f27ffa568291f1,2025-01-22T15:15:14.247000 +CVE-2024-51941,0,1,661c95377174d85887c7aeeab4a39401393b7299562f7bf09d56feffd8348eee,2025-01-22T15:15:14.247000 CVE-2024-51942,0,0,4c32e22882787a7e5f47b6626a776d4eb0ee8462badb9a5268969b94441ae7a6,2025-04-10T20:15:19.447000 CVE-2024-51944,0,0,947b8c8abdb18f9948c521a403fd28796a1963941ee7b30c036fa0d7f93b43b6,2025-04-10T20:15:19.567000 CVE-2024-51945,0,0,04998dc91ce544c57e23477b4db8a3159e3c9103b5fea5336cc77a9a6a6a492b,2025-04-10T20:15:19.690000 @@ -274510,7 +274510,7 @@ CVE-2024-52030,0,0,1c8c0fc19875fd13cb7d2c670514db2905b658fa65d7f02c2e79f836f774f CVE-2024-52032,0,0,ebce94fe2fa07c0a2426d75efa16d8e7877d250f9ee8dc2354264e2c39be86dc,2024-11-14T16:47:21.583000 CVE-2024-52033,0,0,0dfe20fd02897926b6d074909c30d74601a5c2c41f63e04fe1072b7b927bd8fe,2024-11-21T13:57:24.187000 CVE-2024-52034,0,0,c9473f84b9fc6d425259f88e7c5b60351f6ac73033e0eb23e91d0c305c1e3c69,2024-11-22T23:15:05.640000 -CVE-2024-52035,0,0,4b3fb3b965d43ec62e26d65354cd78027f6ce3f38cf98e0f6e37282b76d93a8d,2025-06-02T17:32:17.397000 +CVE-2024-52035,0,1,dbfe89eb8d3793876f7394bab81283c23e0b0d2f9902c08cd3a1f1ae3b810274,2025-06-02T17:32:17.397000 CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000 CVE-2024-52043,0,0,01817a93ef2b86eee46d11ea37ef3b14d11dd95a30b1201cefbf5183522c2a3f,2024-11-08T20:39:36.233000 CVE-2024-52046,0,0,2012afe94f0162668960f3b67f775d4001b7749fc2a22f4787a854837296713d,2025-02-12T10:15:13.573000 @@ -275550,7 +275550,7 @@ CVE-2024-53542,0,0,6e9c23f96ec3d5fd6bfac59677f096dfc6775a45a4ea9d157160d9f2250c5 CVE-2024-53543,0,0,a8ebd41f35a51bda8eb6ddefa5b93253790140c5dc00bad0e97ee1d8be8b1a1b,2025-02-25T21:15:15.787000 CVE-2024-53544,0,0,09495d46b75a40635beffbd9f5ca381f31e58e51162f9d7c92eda8e6222111f5,2025-02-25T15:15:21.900000 CVE-2024-5355,0,0,4811cb4ef1428213ba525fd17abd9ecd8ff4bfbab602627c6a21c8a4c0dfc10b,2025-03-01T01:56:45.997000 -CVE-2024-53552,0,0,4cbf8fbe1c1d8b81113efcd1116951d33bdd9cbf11887cfd2671d9f28438541a,2024-12-11T16:15:14.373000 +CVE-2024-53552,0,1,c1aca801cff9908986dc63539f45de9da875f15c8f420733633676b31af7be69,2024-12-11T16:15:14.373000 CVE-2024-53553,0,0,f76cd837b8044f3ae7bee9c286ff4b43a72406724cd6dd80c83638da1316919f,2025-02-03T21:15:13.667000 CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab5983b,2024-11-26T16:15:18.520000 CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000 @@ -275824,8 +275824,8 @@ CVE-2024-53899,0,0,6a1e5c5e75d5e15fff4f2ff3855d9c19b45498a7a802333e24ea4271ef180 CVE-2024-5390,0,0,db269bad6e5272cbdff2f7115b9dbe6589e39fa84b9f4a1a836944dde2d2816a,2025-02-10T16:24:52.030000 CVE-2024-53900,0,0,95225d3c54f7fca3986f37c564d6889f43b0205533d3aaa1e6f91f0f170093c6,2024-12-04T04:15:04.573000 CVE-2024-53901,0,0,c236c1fa173014ac1ed8c769c5d9d13838dfb9e2b2824818004850ee71e57323,2024-11-26T19:52:01.653000 -CVE-2024-53907,0,0,52e57914d95f80fd8fe25e97068b0be5f136c279e3b9eb0b2bed33f7c19b3523,2024-12-31T18:15:38.657000 -CVE-2024-53908,0,0,22c1318050bd40fa1560a34e0523a191b2319ab921ed06bac78859622d41e79c,2024-12-06T17:15:12.350000 +CVE-2024-53907,0,1,da3042698d8be91fb17c87766f70541cbc46d3f09abc0babab611085e40f6d6c,2024-12-31T18:15:38.657000 +CVE-2024-53908,0,1,8982ee088335b20aaa7e1d1123267b1c3a5662aa0dca429dbcf7ff1a5f1a823e,2024-12-06T17:15:12.350000 CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000 CVE-2024-5391,0,0,7117218d5daf21f80cd6321efaf36662a97edd58320dfcb7fce41cc4077dd87a,2025-02-10T16:24:29.467000 CVE-2024-53910,0,0,b42cc0f8352ffa3f12c2a867329f0f66efd78292ca02cc30bc8a41459e9297ac,2024-11-29T20:54:55.080000 @@ -275931,7 +275931,7 @@ CVE-2024-54024,0,0,b12992324e708add852aff73cc4680ab70c64cd77d627c575cda6c4714aff CVE-2024-54025,0,0,8aa32b233e56da713dddb0eb535be2617e97f8dd7601088b08118f98be13f739,2025-04-08T18:13:53.347000 CVE-2024-54026,0,0,723fec38eab4317b0780c9816dd56e900186889e5e56922795660677a81a6c2f,2025-03-11T15:15:43.307000 CVE-2024-54027,0,0,7544813701dc95fd0c5530c62bca74c9e14470944bfaab3455d456f59c4e66ad,2025-03-17T14:15:19.613000 -CVE-2024-54028,0,0,e1c5522bf80279e2045611fdbaee575d59f457b82c3f8a275b716a051ebaa350,2025-06-02T17:32:17.397000 +CVE-2024-54028,0,1,a2cf465b21cfb80f831b56c3ae0b9e2eabb71e981af03013147d84b6805115c6,2025-06-02T17:32:17.397000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000 CVE-2024-54031,0,0,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000 @@ -276440,7 +276440,7 @@ CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f675 CVE-2024-54660,0,0,8ecb328311227df4f4ba808c9aa5038fb826cdcbe9b14662d633f31264e20c88,2025-02-03T21:15:13.873000 CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000 CVE-2024-54662,0,0,40063869c5984ddcfcaf82116b2fa9ee6b8ef71c24c68deda4080eb1ea805f5c,2024-12-18T16:15:14.220000 -CVE-2024-54663,0,0,f5353753ee157eb79c3a456bcb90fa176ea7107dfe149747714f2e06d4f48033,2024-12-31T19:15:47.500000 +CVE-2024-54663,0,1,b19efbfe67ff8a4f6b0dbdaf2730036df034e9077ee4fc704cfd5e3614cde4c6,2024-12-31T19:15:47.500000 CVE-2024-54664,0,0,747321a87c6051262f67f5058084eecfa56ba7af72e69bdb1a4744b3c2b40fb2,2025-01-09T22:15:29.157000 CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000 CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000 @@ -277040,7 +277040,7 @@ CVE-2024-56114,0,0,80b97861862ba12f51aa4e46485551b632a0c2a52df86bcb564294ea58a1f CVE-2024-56115,0,0,17cd74ad25051a45f91521081be96f78ec43985fc62b9893fc5da74912ce6906,2025-04-23T21:33:33.170000 CVE-2024-56116,0,0,e8aea0c63708e7b9ae4ad86601eeb2e56348e008753c0c18fd2bb0a490431bf6,2025-04-23T21:34:38.623000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 -CVE-2024-56128,0,0,e2cb76efd64d63d4c386db8a1315b19e05cdb3bf57b90430767a6b815ae92cb5,2024-12-18T17:15:15.003000 +CVE-2024-56128,0,1,92cb4767b65064fb7f2b3f21d83e01a716307d8b2ffda60beebf1d0aa9f08d16,2024-12-18T17:15:15.003000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 CVE-2024-56131,0,0,e03c74e08a86e48652fdf2cc130c3b7c6baf01ca676e49d473d6c2824d8fd92b,2025-02-05T18:15:28.507000 CVE-2024-56132,0,0,085d6f51ed1ecabb93d11abd980290b8ba6d65ff9f708fdcc95b36fb4fd29b27,2025-02-05T18:15:28.700000 @@ -277760,7 +277760,7 @@ CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954 CVE-2024-57040,0,0,33933917891b5c81929460ab67ed0d7164ee900a0e5137644747b9fb793e41c5,2025-04-07T18:29:36.293000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 CVE-2024-57045,0,0,fb5ea4e4f7a4b9889a1febeaf0802625e04c77b289c8befbcdbc515a09b01b01,2025-05-21T13:08:12.557000 -CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000 +CVE-2024-57046,0,1,fe99d44204f56661f0679c5d1ecb0fd6df526b6f6fc17cfa20ea09ee55d671c5,2025-02-19T22:15:23.207000 CVE-2024-57049,0,0,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000 CVE-2024-5705,0,0,f3b79a5d6cb194f0bd96745c53b497323f2e376cb2b6ea3a0bd2883a13683047,2025-02-19T23:15:10.823000 CVE-2024-57050,0,0,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000 @@ -277929,7 +277929,7 @@ CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137d CVE-2024-57450,0,0,dca4876f05e9c619adb9a59b22dcaaa94ab25788656ded13536c3752d289859d,2025-05-13T19:40:51.173000 CVE-2024-57451,0,0,e8712741c53f94e08c6064dcde30faf3287d36a6d399ce65670c03a0937d1b99,2025-05-13T19:31:39.313000 CVE-2024-57452,0,0,8a20887d1f3d68429026240827826abb328116cf3af896137c2c5ffa4395c131,2025-05-13T19:39:27.263000 -CVE-2024-57459,0,0,d274f8b872aec03dd4e4387b9bce96f36b45d67d14818dda643876ed35e0ba61,2025-06-02T17:32:17.397000 +CVE-2024-57459,0,1,b2d0b28ca53dea35095ae17a417e682f9dcdd070f3ee5d2392715184f1fabf37,2025-06-02T17:32:17.397000 CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000 CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000 CVE-2024-57471,0,0,6c28f55d6ac6c23c45f2d45459061e089bd18c0bc4656c9d1b783fab10287cf0,2025-05-27T17:00:54.740000 @@ -277956,7 +277956,7 @@ CVE-2024-5752,0,0,4279b49c1e8f69df93439002f6af091c9949f569d62ed33209701a1ff6b32e CVE-2024-57520,0,0,b3f90fb26fb200b53ae4777fd3baed004f17dd559e6923e11bec593e0ff8203b,2025-02-06T16:15:40.833000 CVE-2024-57522,0,0,18e711bef02ec93aea7b480aff73784056d9c41ed01c1af04200010cd11c145d,2025-04-22T20:08:29.483000 CVE-2024-57523,0,0,9fd5b8b30d9788fd284244369559ac2fca5a537a05cecae34a4e95bce1786a29,2025-04-22T20:06:16.133000 -CVE-2024-57529,0,0,ea287b720620369833104feba15ea56ffc5f304408ab6f8ea03f5072842c6cf9,2025-05-22T19:15:42.677000 +CVE-2024-57529,0,1,a010e4d19da4816c22352bdb1be2244ab80b1c160e5c42821dc7de5be6308fc1,2025-05-22T19:15:42.677000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,691bbe45b6c8dec1b3fb6ba4e32723d879ed3feb0eb9208588f95b190d231a22,2025-04-22T14:11:56.087000 CVE-2024-57537,0,0,2907e2eda64c6ec8a608ebd4f389b1d60cc8d7e07d9c5be63960d897e0e4a121,2025-04-22T14:11:50.577000 @@ -278125,7 +278125,7 @@ CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece CVE-2024-57778,0,0,88cc3788386a43b9b29a906a8a7d919e762036b78785413c8cdb1209d44810a7,2025-02-18T15:15:17.207000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 CVE-2024-57782,0,0,022d7da96a22a84980eaea7d9eae565f929bfd801967ab630182f4317d7eb947,2025-03-17T19:15:24.683000 -CVE-2024-57783,0,0,c0abd7426a49dc5bfeacc92c09e85a6082a84c5afacda244b71fa7fded3e68ba,2025-06-02T17:32:17.397000 +CVE-2024-57783,0,1,a6beb4556a053c1f19e6178c90693b6b77c7afec7970615466f8bc002408f838,2025-06-02T17:32:17.397000 CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000 CVE-2024-57785,0,0,da53710abc0b38f1f9720d31a7383037ac10a091073d73f356e9f0e15e997042,2025-02-04T15:15:18.943000 CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000 @@ -279380,7 +279380,7 @@ CVE-2024-6794,0,0,44d681920c90084a2f5e0d2d932907dfd358d98b05a418b131b42df077eff9 CVE-2024-6795,0,0,d35e176f77439f51a013544b617124b6749f6a310cf6be8a49eae1caa9cb58c1,2024-09-20T14:53:15.217000 CVE-2024-6796,0,0,99d704bb233c77719f478c5196f7d60550cf71c9a592e60c5671884b98531e6b,2024-09-20T14:53:11.447000 CVE-2024-6797,0,0,0e07aca773cf1061bfb6ba6713de1991a469151134e364ca60d76261ec2bb7d3,2025-05-20T20:15:39.137000 -CVE-2024-6798,0,0,6d83d374b3c614576899772ae00f0a2763d4643ed0438c046bfec82d30d68904,2025-05-17T04:16:05.870000 +CVE-2024-6798,0,1,6f56fa01e55f68192229a6b61ed3d5341e2cc3511f72ae8c558d5a0844f30c3d,2025-05-17T04:16:05.870000 CVE-2024-6799,0,0,9a2552dcb51a5a5bd90298df77fc0c5595811526c4cbe51e5d0ea6f61f717056,2024-11-21T09:50:20.830000 CVE-2024-6800,0,0,20d6a8589b2d6e281e1fd752caba598d1e2f4c12033df1b6d87fe3271facb773,2024-09-30T19:14:50.430000 CVE-2024-6801,0,0,098890db9f953764470a5aa8e832bc9466f40365eeff6647a41048d723685eec,2024-11-21T09:50:21.107000 @@ -279580,7 +279580,7 @@ CVE-2024-7001,0,0,e4325fa8f92c78e4716d8d1b8f78877ae42596c56e743bf0dcec0cd3a41fde CVE-2024-7003,0,0,6c1a95d9d84f1cd83c9068a49df8ff0c8da1642960b6aede9aa10555554a1c2b,2024-08-07T19:52:18.500000 CVE-2024-7004,0,0,51a38e9a77c5f72350881af1c80e7523c13ed88aaf72f5d6b0b5830a971aeda7,2024-10-29T20:35:41.127000 CVE-2024-7005,0,0,1c0b6fd4a108897c5ae84f111b64335902c6e15666099c5b512d38cce85608b6,2024-08-07T19:56:48.777000 -CVE-2024-7006,0,0,74213b47332800146301afa5c44244f6439431ddd73679e277582cbd70c94a87,2024-11-21T09:50:44.560000 +CVE-2024-7006,0,1,e3eb4c911a9246da023d2f7cd94560ca0acfcd4a391fb3e61b9d2cf7d8ba050a,2024-11-21T09:50:44.560000 CVE-2024-7007,0,0,7ab0648bf64480eea870d5c04e8c62931dbf04d271789aeeb4b4cef67cf0924f,2024-11-21T09:50:44.713000 CVE-2024-7008,0,0,01821632de42f861f61e46172e8f46d902e7b9a9d4e49b492e5b5a6ef606b574,2024-08-19T17:19:25.390000 CVE-2024-7009,0,0,0bd3e070400b890979b17a6e3fd4a8938952a2dc2f9331a906ff3a4e8238dd0a,2024-08-19T17:18:50.290000 @@ -279642,8 +279642,8 @@ CVE-2024-7067,0,0,6ac1be39efd22a5c7fe091cc3378a97b4008d553917dd63543aeb0100df755 CVE-2024-7068,0,0,65cca7f90d12bfd4945ca7449aa3a9f4a58ea3bd10b5a1ef8d78354ea08b0109,2025-04-22T16:02:21.843000 CVE-2024-7069,0,0,bee42df9e291148ea5f0fb365bbba9d466e6a619bb7002054da3c7473ad6dc88,2024-11-21T09:50:49.990000 CVE-2024-7071,0,0,268f7d5107d8a1b047cb228eb6c0de92714e320b97fa52e44547827f689f9042,2024-08-30T13:56:33.083000 -CVE-2024-7073,0,0,244d85e1a4242bda0a76c9dcbe99477440ac934bf03c23bbb549e18f9f0f5dc1,2025-06-02T17:32:17.397000 -CVE-2024-7074,0,0,6eb87f484c770d75ce81e42a0988a83258fe087ba80df43a4795b5dbeba56ceb,2025-06-02T17:32:17.397000 +CVE-2024-7073,0,1,3f3257437b9be4a73a12f53c99b03464523d777765afb586df8059d01915c30b,2025-06-02T17:32:17.397000 +CVE-2024-7074,0,1,71bbfaf3ee25bc6e59153cfcc551b01e4fc47b7722fc4f0e0d23a4ce8ed5bc2e,2025-06-02T17:32:17.397000 CVE-2024-7076,0,0,c553fdc8a312647b14f86d2b55ae92396e4a80af19631c83f0b479d4660d4016,2024-09-05T14:39:32.487000 CVE-2024-7077,0,0,e9f54f985bd011dca1290cb18ae34a40296cff99ecc6cf4117ccb626f1c95d70,2024-09-05T14:39:17.510000 CVE-2024-7078,0,0,00652a9d36ed4870253c3b9662f00dfdd59c09344ab11323a76dffcf563e22f2,2024-09-05T14:38:46.947000 @@ -279659,8 +279659,8 @@ CVE-2024-7092,0,0,422abf4bd36177ce9961c0f919edf6c6f74cba62c54abe4f5e6a3dbdcfa520 CVE-2024-7093,0,0,67601957fefc739748f2bd0d3e707115807c6ad7cc988ec66a095365c56eeca2,2024-08-02T12:59:43.990000 CVE-2024-7094,0,0,b22ce77ffacf979339f568296208b1cc49b896d3f1ddb1fcde0ad4f63f12731e,2024-08-13T12:58:25.437000 CVE-2024-7095,0,0,8022420a39cbfcd3372a34a53680c91a4d262f7eb4cb2666208fca7996ad0343,2025-01-14T15:15:27.263000 -CVE-2024-7096,0,0,6e536dffd3171e67822e8560f386f560c558d6b587118e151f754a178a7e66e7,2025-05-30T16:31:03.107000 -CVE-2024-7097,0,0,fe895dccdc673142acab916469b4c92a830bc9da27fc1a81c273964444ac7491,2025-05-30T17:15:28.103000 +CVE-2024-7096,0,1,76afd5fb57d6a6f2a7960cd9ac5957b783e6f37cd73fe2d32d80b35ff27729f6,2025-05-30T16:31:03.107000 +CVE-2024-7097,0,1,65e70c4e15a8a93c94e39425b1f92c1090b592e3f3c410e9391a8446ae2cc007,2025-05-30T17:15:28.103000 CVE-2024-7098,0,0,36ff175214260eaceb7976e1ef6f36e1f1b66a19a8e7f05f9c65473710d19b24,2024-09-20T17:14:53.063000 CVE-2024-7099,0,0,bda544dd9e76b13f20607b0db9189f48ec9b784ebdc1cb4c7f2f85bee57631ea,2024-10-15T12:57:46.880000 CVE-2024-7100,0,0,99b418bd0fa2b35d671dd7874a6f6d5de7ddcdf351d66e487703289243d154d4,2025-02-06T17:45:05.493000 @@ -280095,7 +280095,7 @@ CVE-2024-7551,0,0,96168ff2564085f9c3223a8cfe7fd2db51bfd654b0ec2bbc71b8cc37233c03 CVE-2024-7552,0,0,e05c9047758b739e11966893feccc12a71ab9c492458fa6d834ad99350d26c77,2024-08-07T21:29:57.417000 CVE-2024-7553,0,0,51c76f89ad0f35162dc146930d14173942ac0baef362fda00eb08ea86e0c96c0,2024-09-19T20:46:04.103000 CVE-2024-7554,0,0,1df9b2230aab1032094083d8fb6fb42fa73877160c1bbdfc733d62b31133ecb3,2024-08-29T15:42:13.387000 -CVE-2024-7556,0,0,8450bbc77e42d322cba1ef775a39a281f0bae2ce4629ab4a3c41ad4dd6af48ac,2025-05-17T04:16:07.803000 +CVE-2024-7556,0,1,b62d412d86c167e4999920073ee025c4dca2897100ef2c27a06079312b854cb5,2025-05-17T04:16:07.803000 CVE-2024-7557,0,0,bac422d2dabdaa8c81c707ffed7c996ac4df061e4999eef6ba5a759824250d30,2024-09-18T07:15:04.293000 CVE-2024-7558,0,0,259bdf301858f4db668dd1acb451e2b7d5b30015660e19c8265bb194624378a1,2024-10-04T13:50:43.727000 CVE-2024-7559,0,0,9f7bcbd00653385c50a5467e933e4dc27e8b389aa64c8655fcd8e85410f3d2b9,2025-03-03T19:07:59.177000 @@ -281179,7 +281179,7 @@ CVE-2024-8698,0,0,ae5e77dd41f7e8a0e1d5da0296685a66ebadcc558baa0a057d1632b37d133c CVE-2024-8699,0,0,dc4e2824e064a016ffe1d64ff6635d6d76c32318d379cdefb0698875b7cdd764,2025-05-28T15:42:01.943000 CVE-2024-8700,0,0,6af919ffb86e245284deec8e4339d9408e465336b9de3ccb35311062616bdd05,2025-06-04T20:07:46.120000 CVE-2024-8701,0,0,2bfa5e6e24876db7c9ff95a4148194ed6931b9cb311c813461161849e5fb7850,2025-05-20T20:15:40.963000 -CVE-2024-8702,0,0,a0dda08f9316394774f9c40fb3c64928c8fb9633d402ff97fb6178ddcd9f9a76,2025-05-17T04:16:15.117000 +CVE-2024-8702,0,1,2165098c20c30a9bb020fa017c47c0f3c17286bca2f74c4211589878941cb4f2,2025-05-17T04:16:15.117000 CVE-2024-8703,0,0,9d3c9412aa5515bdd6bd835a3f284f2b4746ec55d916b4a9bc33b9bc776d233c,2025-05-28T15:41:51.927000 CVE-2024-8704,0,0,55e0e90af5adb785383ba9179e09df0289942892370ab3b862a91b99b1de4e07,2024-10-01T14:15:09.873000 CVE-2024-8705,0,0,d877b5943ec72d90ceb8369536d60a5da047fb6a2f527f0f2eab88a4d06a40ce,2024-09-12T12:35:54.013000 @@ -281234,7 +281234,7 @@ CVE-2024-8755,0,0,e9ad4abf489f27fcbb83a5e11e20ec1129386fd9e2ba1fb6c633d962cf7818 CVE-2024-8756,0,0,b565e5d749c2468f32520125906e7a5aa4773b495983076bfc55eacc8d9c89bd,2024-11-12T13:56:24.513000 CVE-2024-8757,0,0,2415f981163b37e1078d4ad9b6dbb73191ceeae093dda65d49d05c80b5075f97,2024-10-15T12:57:46.880000 CVE-2024-8758,0,0,e8fe57b4f9bf12ef7462f7e89cf3bc41d8e1247bc804af3da3a9e0380c122d6a,2024-10-07T21:35:03.193000 -CVE-2024-8759,0,0,dec94120882ec21e7aef45dd55a44ee7c39226244e8f47a71e27619cf4b00fb1,2025-05-17T04:16:15.413000 +CVE-2024-8759,0,1,1615cca7301c553d6d58439f86a892351fc909f50241133f79a4d1f00883d2d1,2025-05-17T04:16:15.413000 CVE-2024-8760,0,0,f43fa3e1b72e595062f394352cfb1e3caedac57a707088dc78ba85c7fa736094,2024-10-15T12:57:46.880000 CVE-2024-8761,0,0,950b3a9df3cc991d5c0bedc660970e758785bfc0f8e6d816aeaf43e66fff13f1,2024-09-27T18:41:43.043000 CVE-2024-8762,0,0,3b421bee27666c9e7bcdd06dc59315fa24346e5ae512b3889caf5a60eb7e32fc,2024-09-14T15:54:10.687000 @@ -281632,7 +281632,7 @@ CVE-2024-9177,0,0,ce77b4d0bcbf9966a0cb91de2ef7b9e3d62b88654cf0f42f98e921fd75d4d0 CVE-2024-9178,0,0,642845b431730b2b39f42cfe9bba564382251d774cc731cf45211d75cfc26a14,2024-11-08T16:03:26.157000 CVE-2024-9180,0,0,ddfbbc6ef10dedd28a9cb332a26718a84f91bc3934f39d4fe574235b72d9f3d9,2024-10-18T20:15:03.393000 CVE-2024-9181,0,0,671a8ec6333ce6f06d989e30f19860ea481f4fe999c8dde752ea1dbb87609f51,2025-02-11T02:15:36.700000 -CVE-2024-9182,0,0,44cbc1819b77add14624169bf176ca8b0fe9413da70b25da31d3d28d2b254736,2025-05-17T04:16:16.670000 +CVE-2024-9182,0,1,9caea4c67f2278252f5477f3de3d7a5f1db31c75ba4cb70034dad0d740766698,2025-05-17T04:16:16.670000 CVE-2024-9184,0,0,d3f74914a31d182c104b173f33f2b83a588abd882dcb2745d5dd36e91fc53fa7,2024-10-18T12:52:33.507000 CVE-2024-9185,0,0,5138f4dc2121784145ba5e95c381a421f06d1773db8b2790791b03ba26a9bdc9,2025-02-11T02:15:36.767000 CVE-2024-9186,0,0,8ced2c44e3855b3bc0ea71609e4a20ca23f74fd1049baeda14785d9ebdb2d8de,2025-05-15T16:28:08.107000 @@ -281684,7 +281684,7 @@ CVE-2024-9232,0,0,c437dd6828a2bb6c2fef4b80c8004716f23c3f046aa60d93e2c14ad1e09f2d CVE-2024-9233,0,0,6462a8788df7e8b47151f08d8b31e93d0369b3f87131bbec596694e746830535,2025-06-04T20:07:13.377000 CVE-2024-9234,0,0,c697ca46bb4a35f9e405ad10af95fb57a9d88346748e059f61a0140ee2b3f87b,2024-10-15T12:58:51.050000 CVE-2024-9235,0,0,812eb4adf89d42a09ba08a2fc4307058948d688385540b21888d041b29c2db51,2024-11-05T17:36:01.270000 -CVE-2024-9236,0,0,0e57071315564d1e022d95c22dad00aeb8604931c3d0e29bd013d186fc1d2a5f,2025-05-17T04:16:17.077000 +CVE-2024-9236,0,1,96e9439d716086eca32e4730deb3a184d288a7cf8a080595fc2bafe4925cfc0b,2025-05-17T04:16:17.077000 CVE-2024-9237,0,0,7b64fa2d2cf4ac73ae3a04275da2345e9338b4fd91ba5f8466b6d718c699d333,2024-10-16T15:10:08.390000 CVE-2024-9238,0,0,7f5839364833743b727903126e4921c7a16898bf9b9e61b95f7aeefa410d1ebe,2025-05-17T04:16:17.210000 CVE-2024-9239,0,0,eaab0ef363faede446affbe5826cd522f401247b4b0f341be3fef03a25097523,2025-02-05T16:41:42.517000 @@ -282234,13 +282234,13 @@ CVE-2024-9827,0,0,600df9af124e086aea2afbce71d76b05c405fd96a77c780f72076153ad3c44 CVE-2024-9828,0,0,0820d53a3fab08036aefc10c5bfaedfd163e8f22ef5dd876cea3a720f7ff1177,2025-05-15T15:58:06.897000 CVE-2024-9829,0,0,4ccffe4ead691d284a083cd6327f6d46a9112669f00caba4c8a80b8677bf16ab,2024-10-25T16:30:44.520000 CVE-2024-9830,0,0,2bf9d63ac599e477e658d2acd7a44245912b37b2ad1c0ca71b359c3037329792,2024-11-19T21:57:32.967000 -CVE-2024-9831,0,0,665b29e751f29471bbd28c7aacbe82f66ab40713da31f09dd00d901568a80dc0,2025-05-16T14:42:18.700000 +CVE-2024-9831,0,1,ee6f847bb1b8ffed24606e02a9f6709e03b67373ab5c8d163e275f19b0a6404d,2025-05-16T14:42:18.700000 CVE-2024-9832,0,0,d1a6bce8e8b72e1f373f444d7f984f9ebc9ea9bbda29a148e8e459321d3f1832,2024-11-15T13:58:08.913000 CVE-2024-9834,0,0,52b3357f3a3fa9ebee9b012ae6e1f6ed10fdcc163d09fc8db48ec80c2065b1ad,2024-11-15T13:58:08.913000 CVE-2024-9835,0,0,ff033dc9d4ae5af9ea1f604c6a4d54602578d3b2584b367aacfd9b9d21b4d90d,2025-05-15T16:35:15.160000 CVE-2024-9836,0,0,ce0087e1a4c261a4b87d38b1066c494680ff9f13b8922dfded64dd8a0a570bdf,2025-05-15T16:32:17.093000 CVE-2024-9837,0,0,afe4e527f22e06da82758e417087daa648749cf526ed58128828756f86ec8839,2024-10-15T12:57:46.880000 -CVE-2024-9838,0,0,a42bd7053a3d945ee214d2dd17ba469325cfcce2cef9dbadb09e250ffcef1e2e,2025-05-16T21:15:34.497000 +CVE-2024-9838,0,1,df8a72741599ba8949e2953a8411274d4770a94d17e5cae1c27abda483447eb4,2025-05-16T21:15:34.497000 CVE-2024-9839,0,0,57bea8403f5cc48dea698cfdd728b58122c5ab953b09fd7bbfa276adce1153b8,2024-11-18T17:11:17.393000 CVE-2024-9840,0,0,1871e924d8a9cad5c68256a87e9830aade109841497287bdfcdfe58e6e1f82f1,2025-04-15T16:15:47.603000 CVE-2024-9841,0,0,e0f4d3de7ec626d098401fdf0738f26a50085665fd5bc0d44d6ae87bb2c08b7f,2024-11-13T19:34:26.237000 @@ -282278,10 +282278,10 @@ CVE-2024-9875,0,0,0d12cf6e542f3fe5c82927880d694ad1ba206d070de3a68f2d6ba8e36128b6 CVE-2024-9876,0,0,e44e9d466fe06fb6fb37d46f2d0b058ead0922daf472362e13563848c0157130,2025-05-02T13:53:40.163000 CVE-2024-9877,0,0,a49fba43e01d962b676ef4258973f9bb008f53a6491c9bdb290afd6c61e9731e,2025-05-02T13:53:40.163000 CVE-2024-9878,0,0,98340da911df27b13f856f22a015d77b96b06b46a50c53940e24972212cabb03,2024-11-08T15:25:45.930000 -CVE-2024-9879,0,0,1d497d0afeac448e3e0c1a91587d7b29486063885f60b51001a3b5c9a1cdc6e1,2025-05-16T21:15:34.617000 +CVE-2024-9879,0,1,0bf55761259102b83082e462845cb07bf3b0b48a72ebb49f209924fd40d27dac,2025-05-16T21:15:34.617000 CVE-2024-9880,0,0,36c2423055ebd333bf95f1a67d4983784fa1f88361591ed578dda831a43f21cc,2025-03-26T17:15:25.453000 CVE-2024-9881,0,0,c4117f263b42a99dc7e43ccf9d3539d7436ce50643e89b496c0c898ffa0f05af,2025-05-07T12:45:39.203000 -CVE-2024-9882,0,0,190fd12ab1d5ceb99019a8b48aa9b5b35e7f5a6a3af23c94d71a722e1e650ee6,2025-05-17T04:16:17.613000 +CVE-2024-9882,0,1,b4d1acc6a8cb19595efd086eb2f6baaab930f6f3be4662c4faf3d84bb90133e0,2025-05-17T04:16:17.613000 CVE-2024-9883,0,0,623e4d2d5d1a9e12317f3c890beba2f4636813b40c55b41397d5f0274919c18c,2024-11-06T17:32:17.477000 CVE-2024-9884,0,0,4a0a77563fc4e06c8296a47a1c8635fcfa8e5f69be4a2d7e1096bd71ca362fcf,2024-11-01T12:57:03.417000 CVE-2024-9885,0,0,b21445718b93ae656c78bfcfeb3bf6e8a2777208198bab62cb8e54c1d6ea88a9,2024-11-01T12:57:03.417000 @@ -282423,7 +282423,7 @@ CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b0 CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000 CVE-2025-0071,0,0,a9f17b8587d9681508885fa05b5cb6e1fb480f5738675f612162a9b567f90271,2025-03-11T01:15:33.917000 CVE-2025-0072,0,0,7c68681d522f867cd278cffcb4470ef78b9648796a6206167a2247ec164299a1,2025-05-12T16:15:21.587000 -CVE-2025-0073,0,0,6f7c9022a68090da56f93d3738cf5f5dbaefa52016f4e616184a8031b7e134d2,2025-06-02T17:32:17.397000 +CVE-2025-0073,0,1,f6a29770af6bbc103680f6db7dbfc3d85fdf01358f971fa2c75114246009b84d,2025-06-02T17:32:17.397000 CVE-2025-0101,0,0,391653291dbc9e356bdd9f7cf48cb4ee16c22960b84cfac559c323183419fbd8,2025-04-16T13:25:37.340000 CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000 CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000 @@ -282595,11 +282595,11 @@ CVE-2025-0316,0,0,25fd7fe5edf79101ae2318703f4978f3c60d73f85c2ce3aafc07a98a04e1c5 CVE-2025-0317,0,0,1123791ff2d58b6f495de598eaa7b07d475197b92f1bcee30e0f8801714b425c,2025-04-02T16:07:20.300000 CVE-2025-0318,0,0,1adf5fbf909f385869a8e3e2c4143fad7dfe52742d5225eb605180883ed9373b,2025-02-25T22:09:05.680000 CVE-2025-0321,0,0,949a46e9b053903a4a5e7760dec47f1d94e986bd99c2cdf86cabc314ed2bfdb6,2025-01-30T17:39:45.447000 -CVE-2025-0324,0,0,1c4b6c6d974925447017bcc2c02967c7e19e8238cf4fcf58320046af4d58e6a3,2025-06-02T17:32:17.397000 -CVE-2025-0325,0,0,d4cb6b07fc1d8a3645fe78f430f3f99393b6d7b991f2ff8c884369f058df12e6,2025-06-02T17:32:17.397000 +CVE-2025-0324,0,1,d8583250aa5e3dd7ed8b49a9aec89d75b9eb22bea4e3f5aaedb046d143c4ae3b,2025-06-02T17:32:17.397000 +CVE-2025-0325,0,1,54eeea6f8ae32938f0c6f29e0878a276380af014b58afa7e3c77859033a70b91,2025-06-02T17:32:17.397000 CVE-2025-0327,0,0,b0d403ed029992537329b72e255db6654825e2f564637a9b3d86592d52f17a2b,2025-02-13T07:15:10.570000 CVE-2025-0328,0,0,25c0760d244498984cda91678b883cf89d3e8fcbb9c37fd0d45c67359c7184a7,2025-01-09T17:15:17.330000 -CVE-2025-0329,0,0,86e7446008ec6cc24ddbd8186a5b113231eae3c153e2ee31de61002da3a0e409,2025-05-20T20:15:41.090000 +CVE-2025-0329,0,1,89a658944867c667b65bfc3633830b37133cf53442768f6a47727f1acabc0603,2025-05-20T20:15:41.090000 CVE-2025-0330,0,0,79cf8fdee51afbda4105bc5823be00a341e7d6a4bdcc3c5735bb642d735615ae,2025-03-20T10:15:52.763000 CVE-2025-0331,0,0,afe60233c7b6cdef8297092a16561204e8a753655f7ac938d1ebdf4ff4457d4f,2025-01-09T17:15:17.933000 CVE-2025-0332,0,0,10e294c3bcb66386a9705e885fda97504f486a40642545ec52dba01d6b68bca7,2025-02-21T12:03:31.920000 @@ -282626,7 +282626,7 @@ CVE-2025-0354,0,0,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49 CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000 CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000 CVE-2025-0357,0,0,df5c0a6ac781af75cafd196fb09095118363aace417f54bcacf4fa1ca90a90ea,2025-05-28T20:40:49.010000 -CVE-2025-0358,0,0,f6fcefa64c64d68130eab3fc54915487742576bdae956e6c69fa3c85c7ead4db,2025-06-02T17:32:17.397000 +CVE-2025-0358,0,1,305848186611eb33fc8a2a77944ae0afe02cbc26f97a8925d344c70ad96a608e,2025-06-02T17:32:17.397000 CVE-2025-0359,0,0,5d195c4a796a9d61c5445ec078ba210735f7a70ba6be4fd93632b7b4f6027f55,2025-03-04T06:15:30.023000 CVE-2025-0360,0,0,6206f28ff4cea73a7524a4842bc2375d59423b5ee65bea65d99ad80bb9353d1b,2025-03-04T06:15:30.180000 CVE-2025-0361,0,0,38c5565d3d35e3d9ea55d49f3958a1fdae6a96a7127a923a7e096f4b7af3eefa,2025-04-08T18:13:53.347000 @@ -282835,7 +282835,7 @@ CVE-2025-0598,0,0,e2fa2b2c5363c40a3314623b9390a7cb466b2cd822405861f8b36cce32199b CVE-2025-0599,0,0,20166d4d3d700d7475effd1db4a9dd336959724c1690bbd5aaad3500efcde72a,2025-03-17T14:15:20.403000 CVE-2025-0600,0,0,d2c99e7791d9d99feb75dd49f959257784d3b8cd974f47ec8f18208b448d5cb2,2025-03-17T14:15:20.527000 CVE-2025-0601,0,0,32c2522dac0fc3c40980f77ac0d53c361d341012ea228c0ef5d2b020b8f8c45e,2025-03-17T14:15:20.650000 -CVE-2025-0602,0,0,e5a83571bfadaa062294ad372bb6bcbccb1f66543519c4dcdf92383a6caad433,2025-05-30T16:31:03.107000 +CVE-2025-0602,0,1,1fa0140a9b6aae924cd2283be04663c05ee0bd7d670e0dd5d2c682f6bda7214e,2025-05-30T16:31:03.107000 CVE-2025-0604,0,0,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000 CVE-2025-0605,0,0,ec4d0ea4464d0986453ff6a24dca3efc31f85f30787f9726ddfddd9e07656a5b,2025-05-29T15:58:07.703000 CVE-2025-0611,0,0,31b34b10e2a7a15f4e1b8a91fb1bf19c8a42a319b61cd7f21e60ba9dfaaa740a,2025-04-18T02:26:59.440000 @@ -282896,7 +282896,7 @@ CVE-2025-0687,0,0,3ca6a8e50da5d38ce162118b631361bb4e19446b6c4cb43b7d0513d8d3b09c CVE-2025-0688,0,0,53651d7f3edf3b362dfbc332dd00438e5009a969af61346b40954ca512428a47,2025-05-28T15:32:06.470000 CVE-2025-0689,0,0,f314d6c2840b37457f705a7bff5e9e063d6f291c45731360c8a19dc4638c4316,2025-03-05T21:15:19.503000 CVE-2025-0690,0,0,2f7ec7adb2d2956671d0fabbf6da442404fab641b182ed3a55d90f385779fc7d,2025-05-13T20:15:25.903000 -CVE-2025-0691,0,0,973245147d55ee8961e55bf7b575a56c3364a6b401e96874b29dee93a9e783ff,2025-06-05T20:12:23.777000 +CVE-2025-0691,0,1,0291175e963dc01df654560c35ff7736965061776cf9b8e8223d574a30f55cec,2025-06-05T20:12:23.777000 CVE-2025-0692,0,0,400b554d7655236659456a53c00d0951396be9e9948a8ee1cba09c28f93ea922,2025-05-26T01:11:15.170000 CVE-2025-0693,0,0,eb9b33dbce1f9879430fb8ae34fc689989eda5748b42d3c57f89b331c8c0f5eb,2025-01-23T22:15:15.397000 CVE-2025-0694,0,0,c69d7e0604b9fa552786d29eab1c4387b902c6ff5d72291ce2d4cc39c2d9d39d,2025-03-18T11:15:39.400000 @@ -282999,7 +282999,7 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000 CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000 CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000 -CVE-2025-0819,0,0,6f1f29c61c692a62748a33e3693963cb0f2e400d9fb3316fcf427118c995010d,2025-06-02T17:32:17.397000 +CVE-2025-0819,0,1,bdaf17bf70e25617b1e90a1272039a5410ce1c65c874d7bdd41c6cb02c05003e,2025-06-02T17:32:17.397000 CVE-2025-0820,0,0,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000 CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000 CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000 @@ -283162,7 +283162,7 @@ CVE-2025-1024,0,0,67bbebef2fa30031675179dcf60a8a817f8a62f715444050b7be48470066b3 CVE-2025-1025,0,0,1f41be4bbcb9f7670bda070849af8628097b75db1107b38db016db72f80a7bd7,2025-02-05T20:15:45.593000 CVE-2025-1026,0,0,d410d35a6aedcb834521ffa4bcd1a4033d4831a19e562f1f0395f14e9bb1d330,2025-02-05T05:15:10.687000 CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000 -CVE-2025-1033,0,0,a2164ede4f5067fbbb5234542d21bccebcd2765908b7be97afcd869b29a72119,2025-05-20T20:15:41.497000 +CVE-2025-1033,0,1,09ab69364f9948c52326a045ff7f84ad36a01237aa0e03ff881a0fb4dbc415de,2025-05-20T20:15:41.497000 CVE-2025-1035,0,0,72fea0a2d80ae07fdc30e5739a98c27b4b9464bbe1b4b8593a6bca9675ecb8a3,2025-02-18T12:15:16.087000 CVE-2025-1039,0,0,823bce39f61202d0e0460d0eb2eb27e197a6e485562d2d0216237f17cb8ad76b,2025-02-20T14:15:33.627000 CVE-2025-1040,0,0,f25cfb3c1b13ff20b39411a263a6cb29b50914a2189270974ec535f559ed5ac0,2025-04-01T20:19:55.317000 @@ -283229,7 +283229,7 @@ CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14 CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000 CVE-2025-1110,0,0,2291116d7cc409d0a664cfdf01ddc9cb56678f5a0b0c86cb731696a9bfe3e180,2025-05-29T15:58:34.830000 CVE-2025-1113,0,0,e1507e6d2bb810ac6657444d8f9429eef67e835f41d00085c329df7f95fe9d83,2025-02-07T23:15:14.727000 -CVE-2025-1114,0,0,d6fe14b49900214f008e65172387763242351c5c121492ebd41503cffef17ee0,2025-02-10T18:15:33.877000 +CVE-2025-1114,0,1,1f32e4eac86f7c0d775354be98f7e6fe40ed5105159cc61137ad9d7ff3ff73f7,2025-02-10T18:15:33.877000 CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d476,2025-02-16T09:15:08.897000 CVE-2025-1116,0,0,00a59e293e16dcad8521027625075db7b6762697e4bdc6e6648fad6aa5872375,2025-02-08T12:15:39.660000 CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4d3,2025-02-08T13:15:07.843000 @@ -283270,7 +283270,7 @@ CVE-2025-1162,0,0,878369ed5b81b79fe348922d75159a1b4747b45bc7f97da2088e438208da00 CVE-2025-1163,0,0,f4e2973443b51d1be68e56b9561f367f31a89b968872bf1f42dc737aed17c0e9,2025-04-10T20:25:15.893000 CVE-2025-1164,0,0,62ddb7b9fc10fb66796610a8e1844e4f7ab6f40df1e719e72ef4525c31add7b8,2025-04-11T18:33:09.940000 CVE-2025-1165,0,0,34dfe20c3add5e7f1a3c3253370e0b994562b1e78bd746b6a2ced4fa7e32b226,2025-02-18T18:15:30.530000 -CVE-2025-1166,0,0,ad2e2b366244a35c2d4e30038000edfbb7b11df79276c0755bd902faa501ca7c,2025-05-14T21:17:06.600000 +CVE-2025-1166,0,1,b8877668909ab7446adaf774aaffc30f36422e27fbc7835b7848f7da5b1f481f,2025-05-14T21:17:06.600000 CVE-2025-1167,0,0,b4cd49e910acd1233407dd8a320c3608a09afeaf7907b40d3d80c73ca6bcdd95,2025-05-26T01:08:11.313000 CVE-2025-1168,0,0,1ea1d5bc4e270d6254a19bce9b3bd16dbcb0aa6cfa50f52ef9530ed2236d40f5,2025-03-03T17:20:31.693000 CVE-2025-1169,0,0,ad57e3ebca9d9361258028a4f6880b5b420e9bfeb30e11c1ec67cc7b58af0c9a,2025-03-03T17:16:44.157000 @@ -283334,13 +283334,13 @@ CVE-2025-1230,0,0,dd0a3ca0e089c26c5259a45f938e8e64977c81ece19c03ae3b8594f4d83448 CVE-2025-1231,0,0,dcc7744995b7d6bb53bad0c3a17ccdace3cc9ce75803cc23b72d1ab8d116a265,2025-03-28T16:22:09.763000 CVE-2025-1232,0,0,fcd0ac59c3c7caf2407e342073ec1e90203a50961ca0b407b3ff0599be277293,2025-05-09T12:00:30.697000 CVE-2025-1233,0,0,248d157a3a9795ad7b5bacde63572ac501f8b78b0f5a37a6e1dc0eb248d4f5a1,2025-04-07T14:17:50.220000 -CVE-2025-1235,0,0,4d9996832ebe0b8b3970c2420172c4287af6980ae0cf913627c47a1a97335091,2025-06-02T17:32:17.397000 +CVE-2025-1235,0,1,bea419d96bb8f446339e953095880e02c68c486cbf1c2068e1b89b66560dc315,2025-06-02T17:32:17.397000 CVE-2025-1239,0,0,6187788ffe5fd6000cc24d081f477dcae5b0ef59871d160b3ff23ee25b818501,2025-02-14T14:15:32.687000 CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000 CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,ca7dde03c53f2f538c0b12fb599e84ae66a426ff6488b7e67f4989aba1f7a6f7,2025-03-13T14:15:34.977000 -CVE-2025-1245,0,0,1f44b48d866bcc8251435e1f8580e9a7c9edc0ad7da6e06f008dba048b954524,2025-05-16T14:42:18.700000 -CVE-2025-1246,0,0,2ad9ffc472115b3b056665ecf173426e531fb304b3c179591abf44f145ddf980,2025-06-02T17:32:17.397000 +CVE-2025-1245,0,1,02f6531ee412acf536871fa74be895340813b85f3805e0a3e6f8a053107da143,2025-05-16T14:42:18.700000 +CVE-2025-1246,0,1,266a95be5134ef4b55d24992997b7f1229c8a727bdfdfdf4f14f294d872f0d25,2025-06-02T17:32:17.397000 CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000 CVE-2025-1249,0,0,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000 CVE-2025-1252,0,0,eef150a4ad81125836b2e5c10bdfbfd08634b9526bf9de1f39407e70823ba714,2025-06-05T14:31:07.047000 @@ -283510,7 +283510,7 @@ CVE-2025-1450,0,0,f0a28cf37155f4c16fff9326b0ffe6a415c6c5c1475546052ba68718728afc CVE-2025-1451,0,0,ec6fe899fd888829fdb360d361245840f88ca8152b7a7e9839ef57ba5f996bb9,2025-03-27T15:40:03.640000 CVE-2025-1452,0,0,a12c967518620ecb46c4898ef8820c1d4f840eb8f34fdbae98d063c5d7e9e03f,2025-05-06T19:59:13.060000 CVE-2025-1453,0,0,85cdf34ca8e5999b2c75d082b0205888dc9c4a4f149fbeb816361fb8a0e26f97,2025-05-07T19:11:47.723000 -CVE-2025-1454,0,0,b1b2ef47bf360b55eb13d5bb4f0cc73fcb0fff2c7d78481395772af15bb7885a,2025-05-16T21:15:34.730000 +CVE-2025-1454,0,1,b8d36f72243ea7ab0f8adb148548bb33cfaec6bf2305cb3fc058b988b6f39a41,2025-05-16T21:15:34.730000 CVE-2025-1455,0,0,46a6d9d419b4419f96bc8b6c258423e9acd2c1f0395e883d289d7f812d9565fa,2025-04-15T18:39:27.967000 CVE-2025-1456,0,0,346ab480833591aafa4def0db688e39a034a34b0a2fc258a44bae62c0e34161a,2025-04-15T18:39:27.967000 CVE-2025-1457,0,0,f65c0f703e3b59c2deb97caabf85ed7b86c43fc3b7f6281ae8e2cb0ab0565b82,2025-04-21T14:23:45.950000 @@ -283529,11 +283529,11 @@ CVE-2025-1472,0,0,96686ef65b43137a15e8858cc63cdb01a03dbff174e3e84775b4964b41ffaf CVE-2025-1473,0,0,ee5f01f60fc344c714a9817bf6f91aa874bab2bd9f7be81c05c3735afa72fb9c,2025-03-20T10:15:53.903000 CVE-2025-1474,0,0,16ca85451a6c572acfb94ec027bf63fd66ee45faa5ceb1d08c8cd3a16e15e44e,2025-03-27T15:36:42.540000 CVE-2025-1475,0,0,dc71c83df2dea22fb2355bdce40ab12e4f98ce7aad24f8511146bb81157cc42d,2025-03-07T07:15:23.343000 -CVE-2025-1479,0,0,7cc88eee11838c9d80d609cf98820e3d992ca10c398fd7c80d69bcfd666ea6ce,2025-06-02T17:32:17.397000 +CVE-2025-1479,0,1,83f81b2652156726b8f25d2629c0c6b5a97fd98e6a4d16635aa5080023ed9ede,2025-06-02T17:32:17.397000 CVE-2025-1481,0,0,d10660ccfc75afffd9cc52715a6e9675c63c4f59ae92c95b59ff9bb03291f5a4,2025-03-12T16:40:25.783000 CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000 -CVE-2025-1484,0,0,6d217d721a5de7a9d860e4a9318f4944f3853e2f4fbfc2bfa097bc5a318410f8,2025-05-30T16:31:03.107000 -CVE-2025-1485,0,0,4b72f0aa7a910c835e720da26409849b509fa2134e0aa69ac1f76af6e5f91eda,2025-06-02T17:32:17.397000 +CVE-2025-1484,0,1,34af5f381c046f1c8937cfae12c5e3704b54003e349441669e71aa19af26aad2,2025-05-30T16:31:03.107000 +CVE-2025-1485,0,1,2a646fa736413160eb67e47e2431b53e6af2e6c715cd1d2b973cac008bccbe36,2025-06-02T17:32:17.397000 CVE-2025-1486,0,0,d9927d7d4d1384639bc8151ec9cdf5ac42c5c5ba19dec6e228e44ddcc54c667c,2025-04-09T13:10:08.783000 CVE-2025-1487,0,0,08095a6c47277e146f974b72230847c7e22adc360332813ad879609a240493bd,2025-04-09T13:07:45.937000 CVE-2025-1488,0,0,41db8f13bdc7bcc4795270a365123a77f5c2866e92341d8e17a3cfe430cb556b,2025-03-27T00:25:37.117000 @@ -283545,7 +283545,7 @@ CVE-2025-1493,0,0,eb1f9f084df1cb6f34514ca97e8d055f851e035cbf20d85a71bed174b09583 CVE-2025-1495,0,0,eb77f981cabe4efbe3dd172718fb9875f01d80ca92253d5063810e79b3d4459f,2025-05-05T20:54:19.760000 CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000 CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000 -CVE-2025-1499,0,0,5127619090405f9b0ca3124a8d7b0442979c22076d24dbf6174a31e2b0af73db,2025-06-02T17:32:17.397000 +CVE-2025-1499,0,1,82f941baea52f58a7fde23fa716ed4e1f3d8b525c97ab67cac23f5e7c2798112,2025-06-02T17:32:17.397000 CVE-2025-1500,0,0,9fba8c7345ac0b652c7325920a14000ed49f87273e0c5734dc50f1fa6cac69b4,2025-04-07T14:17:50.220000 CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000 @@ -283710,7 +283710,7 @@ CVE-2025-1693,0,0,7ebc617b821b94f1ea8c04b23cc41634822af607e5925c55616ab5694b115f CVE-2025-1695,0,0,6ea36d3166401596f7da6d63e10a3e0697b4bb41d475dd82848973a4738b8109,2025-04-10T18:55:19.100000 CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000 CVE-2025-1697,0,0,419964dd027623ddd628c29949c81bd3d5bf673e4cbac859628f2226ec230f6a,2025-04-21T14:23:45.950000 -CVE-2025-1701,0,0,bf9bd6003d4b9761e0cd2e2250b38f2a1428e71c4b724793309ad990e7d4b702,2025-06-04T14:54:33.783000 +CVE-2025-1701,0,1,e060152ee6d8455996b6830a20e4fabd51e904523490581475cc498257ff8bd5,2025-06-04T14:54:33.783000 CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000 CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000 CVE-2025-1704,0,0,45ed10bd85c28150ffd6d9e18a4e608ac36e439afa1d7fa6e04c31ca92cc52dc,2025-05-06T01:15:50.293000 @@ -283742,7 +283742,7 @@ CVE-2025-1746,0,0,2ad65a9dbdf0c4381f281d77fa741dce6ba1f1df02159548941e5a1db121f3 CVE-2025-1747,0,0,fe9fc1715d54827a665282361c4a912da2b8a4104647978512bc0ae9117ef282,2025-05-07T19:47:20.830000 CVE-2025-1748,0,0,27c7d2fcd6085847315aeadd07a684f6a91809737cbc365c466e57be1af34067,2025-05-07T19:47:43.517000 CVE-2025-1749,0,0,6db79c896d97ba53b839effabd14a076d6b2af29f854eac41ba251a1f2db4f18,2025-05-07T19:49:23.300000 -CVE-2025-1750,0,0,e438cf3d8b1b8bcbb330fc2951f94a2c013d156512cbe4eb17bc29df5ac74909,2025-06-02T17:32:17.397000 +CVE-2025-1750,0,1,f2b02c8ab47b127d99b9eebedd1676eb9a59c6b92f91a9280a5eb3beed62fedf,2025-06-02T17:32:17.397000 CVE-2025-1751,0,0,abfc84328e2199f31a54a26b50388e665ca54aab7fd0cce8bda2194b6d823604,2025-02-27T12:15:35.030000 CVE-2025-1752,0,0,67bdd52861cadb9ec44fc5e063c3f2c1275aef4202dd498970e70f4ea7d1426e,2025-05-12T18:15:43.960000 CVE-2025-1753,0,0,3593b6ba50ede630959d5ea37be4b1eda351a397f05e35b03d360630d3f61397,2025-05-28T15:01:30.720000 @@ -283751,7 +283751,7 @@ CVE-2025-1756,0,0,469a2e36bf9b0a53fa5f2a58ce7fdccfdf577f34edea6c0bcffa665f76adda CVE-2025-1757,0,0,c25e39602a825b6394df945ad4b24df4019eaaa8085cc7f11e82831fb6895cb4,2025-03-10T16:48:47.823000 CVE-2025-1758,0,0,0373ea84effa2e885cc20b107f682d5ddfeea043aa22d13e9c170486f7fa1885,2025-03-19T16:15:30.527000 CVE-2025-1762,0,0,5eb4f8eb32ff7e9dd5693d53ebf6ac723f3ad2b6278e75ae2680335a0f36992e,2025-04-17T13:48:32.093000 -CVE-2025-1763,0,0,d1b570fa29f492d05542f4963ad21c25f7b9ec85f0fbc6bd9eb212ec9fbee74c,2025-05-30T16:31:03.107000 +CVE-2025-1763,0,1,126e6aa5235bd12ae0adf5ec53efaceb865a43654b93a7ce25c71dad70afe84b,2025-05-30T16:31:03.107000 CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000 CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000 CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000 @@ -283773,7 +283773,7 @@ CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf1 CVE-2025-1786,0,0,ad5ad2cc482ea0e990ccfde4284bed8bd985e906e2b3d6d5c46c5b7aa325f660,2025-03-03T21:15:16.130000 CVE-2025-1788,0,0,eea96ff8d7571aa32dee65283e84ed9282f70445eccb027f53ff2ff5b53af011,2025-03-03T21:15:16.263000 CVE-2025-1791,0,0,b51ec6e3363933841ca9d89f35b1f043f0875f3be451d26be83ec61e44a02997,2025-03-03T21:15:16.433000 -CVE-2025-1792,0,0,052cf26c416513749ae6f2dfa6dbfb1aac320f022ebc69c1bdb7fe944b3ee240,2025-05-30T16:31:03.107000 +CVE-2025-1792,0,1,8dffadbc46dc2517b0780871f2cc39bbd5046a3c359d0352e1b7b00be463c6d6,2025-05-30T16:31:03.107000 CVE-2025-1793,0,0,e6d71cce36ae3af189c8d504e2e3ce13f55e0f59eed70385ece53b79ca2f9486,2025-06-05T20:12:23.777000 CVE-2025-1795,0,0,733c5474719ba514128cb1d7a904c28895ad9709317e8c3f67851a90e83a7a8e,2025-02-28T21:15:27.570000 CVE-2025-1796,0,0,b56442463abaa60ded322137d2a828b4bcb342d5b444159eb490456b451e3ff7,2025-03-20T10:15:54.157000 @@ -283901,7 +283901,7 @@ CVE-2025-1932,0,0,06875f8291d41f0669a4d6f88c95d5b79106646ee2db9ae9041af3355bd1ba CVE-2025-1933,0,0,991ae8f8122c11392ee1b899ec3e3f285080e08e18917cab29b52f51259016c6,2025-04-03T13:29:37.270000 CVE-2025-1934,0,0,99b04b167c1dcea7ed8415de2ce1752cf0a4ce2ee728536a397c8549e89d8b6a,2025-04-03T13:29:50.427000 CVE-2025-1935,0,0,e21ca1468a5c1eb0a8bfcf1c9d8dd60ecc55b7f06c791b7ba0fbde18881ba3b6,2025-04-03T13:30:01.180000 -CVE-2025-1936,0,0,7b2af893b25fc9afdcfa8c7e3b112c92a107e022133f5b760e0e8c89a8e575ed,2025-03-26T17:15:25.527000 +CVE-2025-1936,0,1,99a669d449a2294824d59216ae8da9e4e90f0b18208312aa183545f51c9d63ba,2025-03-26T17:15:25.527000 CVE-2025-1937,0,0,463e0507d3361f120f8d83e271291872cfaf3dcfd842eabe780e6f6cf47f2128,2025-04-03T13:30:07.160000 CVE-2025-1938,0,0,35afc6c2083dbc762b2825e141ccfce97482e9b0d6acf570ae5665fc4a445f0a,2025-04-03T13:30:13.343000 CVE-2025-1939,0,0,04ede41fe5050ddd691436ccd2fa93415ba85a4c401660ce4df1c63ad2fa9e26,2025-04-03T13:30:20.860000 @@ -283955,7 +283955,7 @@ CVE-2025-1993,0,0,cc38e952c65d052c82178ffa099a41c9554ba3ffc8216755b6ee79ded066b7 CVE-2025-1997,0,0,2320e8fae7a90840d951f0ca1bf029eb0495106dea7a57ba1224c981543ab87d,2025-03-27T16:45:12.210000 CVE-2025-1998,0,0,3538634182b2dcc45e8bb62709ffff36cc782093b83dd33c724b80bb29d5b1ec,2025-03-27T16:45:12.210000 CVE-2025-2000,0,0,c744a04801dcef754276dff40a4c1297d0ba396540500fda4355fbfeeb2bc0f3,2025-03-14T13:15:40.907000 -CVE-2025-20001,0,0,85e8a77b488d88530992aaf63b76ea9641b77f8eb5e34e510677fee1fb8e126c,2025-06-02T17:32:17.397000 +CVE-2025-20001,0,1,a6fb8cda999c4258817c1091335f856844487b599dd439046002e572ce1bdfcf,2025-06-02T17:32:17.397000 CVE-2025-20002,0,0,06f8b7b78b05d57d8766d2266c0a87b89836980b0a1b3eef34006bf4ebbae468,2025-03-05T00:15:37.910000 CVE-2025-20003,0,0,9aab26fae4688f2c5b24f48fd9367dc0a88c0b6a43467853ef0bf76f42f26649,2025-05-16T14:43:56.797000 CVE-2025-20004,0,0,b41fd66e5620d6ef99a6c291133df66a941b40000f945dc548e07a2ae7b9f6c6,2025-05-16T14:43:56.797000 @@ -284164,7 +284164,7 @@ CVE-2025-20275,0,0,58818d762b38e40fa30fee95a78a8d9af248b7fa65a8ed8b5fdfc08950c0e CVE-2025-20276,0,0,3ad655a776b884d16534791fc8b8166700a12ab633ba6b9360b6b8d626f56e32,2025-06-05T20:12:23.777000 CVE-2025-20277,0,0,a6caa835cd4bd714d00a035d3a0ba5eb2ff0771a85b71bbf06391308275c3c62,2025-06-05T20:12:23.777000 CVE-2025-20278,0,0,ffff167b2cd4793f0110d3a8f165d0e9b2fe4c1c1c871bf75446f31d3d040bcb,2025-06-05T20:12:23.777000 -CVE-2025-20279,0,0,aea95746e56985b83f0e8a24e1d5bbc27698b7c7be147de2c3fd05e9a7ce0141,2025-06-05T20:12:23.777000 +CVE-2025-20279,0,1,d5049ae803f9b11db1def0d83c15ac1f8857a6b4477662dfe080d7b3f1c3c618,2025-06-05T20:12:23.777000 CVE-2025-20286,0,0,23b7719b06d4bbe5498d25b92ee8826f7a22edaa40a9c95c06d7d21180e27a9a,2025-06-05T20:12:23.777000 CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000 CVE-2025-20297,0,0,fd036aef2926b86f71d7b735e8eace20d04567625f017b30a40eab31b1a018ed,2025-06-04T14:54:53.980000 @@ -284260,13 +284260,13 @@ CVE-2025-20668,0,0,4efde7cafee47bf30ca99edbe1e503aa47fb2d622289f8c7edb4b9fe9679e CVE-2025-2067,0,0,e5f1e57adc4edd42d03cb1428859c6d8f42f55a5cdb84315e745ffb2fc33dd73,2025-05-14T16:14:48.690000 CVE-2025-20670,0,0,0daec7733223332ecfca57b38ce85a4460ac74b45b4d452294bb01585317d8ea,2025-05-12T18:15:44.703000 CVE-2025-20671,0,0,d29b0be50e03d1be191b5842401236862e6d6c0fc14d06806db5030382f64d66,2025-05-07T15:15:56.947000 -CVE-2025-20672,0,0,f1a958dd5a9b63778844577e1dd90690273250d67982c4f32dca2883dd45bbed,2025-06-02T17:32:17.397000 -CVE-2025-20673,0,0,45ab5c7b4d06ea68701576ea7df9681ad377faad121e0f43f0d0343a2b829bce,2025-06-02T17:32:17.397000 -CVE-2025-20674,0,0,459acdff111622f60d258b1066670ac452c769b59cd1891918b5143044b367da,2025-06-02T17:32:17.397000 -CVE-2025-20675,0,0,177db56c70c3c506022fbe0af39b40c67c0074460a371ee039c8426f9b887742,2025-06-02T17:32:17.397000 +CVE-2025-20672,0,1,d4bb7e0178663ddf0d1ef86a3349d94fd9961a1a55b773cf5325b09d5762841b,2025-06-02T17:32:17.397000 +CVE-2025-20673,0,1,d7a1949e27b3e7598aee922a2cf457c487369b50bfe6ec047723ca22c4d4af67,2025-06-02T17:32:17.397000 +CVE-2025-20674,0,1,e220d25914af079a10d5adfc38dd8006cd927dcdb072c2f48c7e9c12220c6bc6,2025-06-02T17:32:17.397000 +CVE-2025-20675,0,1,6c4f1fe59bdfb4f3df863255a62380346e7c8d3834101e384c994cce245e2e34,2025-06-02T17:32:17.397000 CVE-2025-20676,0,0,57d2fd1c05e0e4464822f529a359c9a4de8a4d30161909abe895c22e7159245b,2025-06-03T18:15:24.470000 CVE-2025-20677,0,0,8f3a20bcdf825992ff3bacade55d0beebc2e363af52e69944ae0c96acfc69278,2025-06-03T18:15:24.633000 -CVE-2025-20678,0,0,ea3eef80a9bb664f8f8a5d4c390f41dc53b6ff0a10088a696afb0088c48a70c2,2025-06-02T17:32:17.397000 +CVE-2025-20678,0,1,04f10d5a1ec239cad2d85416a6e427fc2a766bd2af412842d30174d04da595ff,2025-06-02T17:32:17.397000 CVE-2025-2068,0,0,caea7b6972516a21e1fb4cb2f8db6e455533cd0aab201f39e697eeb619aa0bfd,2025-04-29T13:52:28.490000 CVE-2025-2069,0,0,3be67bf54f8ec61314fa1aeec7cad10107ab60b66fe6d57dfc7b2068092e5954,2025-04-29T13:52:28.490000 CVE-2025-2070,0,0,aa6c57d00653559715f3617271164e399083db51bc42952895ad83bcf08a7d15,2025-04-29T13:52:28.490000 @@ -285357,7 +285357,7 @@ CVE-2025-22026,0,0,a774ace20e4789ff640367f4efb7e3a87d8331c14061e80b36413c109b4b7 CVE-2025-22027,0,0,6a0a715ee7f648d3158492dd086850f696a4b184b735eb4e95b0887171ab367a,2025-05-06T16:45:53.407000 CVE-2025-22028,0,0,a131f1f27057b0414d743d256c28bb79a3307aa252527a8e5918237b635dbd3f,2025-05-02T07:15:59.497000 CVE-2025-22029,0,0,375b7d760e49f7f6e35afa2a053f915b8ee4873103a7b851d4c8f3aef1596ae2,2025-05-01T15:16:19.647000 -CVE-2025-2203,0,0,5ddb482ec88dc37796b2b75af668add13b5d380a00d862963a82a35be4cff158,2025-05-16T19:15:49.473000 +CVE-2025-2203,0,1,61c76d8b7f37e28e1c0a2ea01a3d1e4c828a294217617fdecd47418dca1348b7,2025-05-16T19:15:49.473000 CVE-2025-22030,0,0,539744ee8dba009b69b24272ee7df40ef10b03dd1a9de382b8cf7df5bed1ee38,2025-04-17T20:22:16.240000 CVE-2025-22031,0,0,8e6ab5a6dae87efdbaedd20d9d2f446f69b064d9e34ad67d574ead1b7fc6b416,2025-04-29T18:57:00.353000 CVE-2025-22032,0,0,b4de7d5e039832f8ad3d21ffeddab65d9e0fe823a70f076656b879d673fabddf,2025-04-29T18:57:24.340000 @@ -286346,8 +286346,8 @@ CVE-2025-23190,0,0,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3 CVE-2025-23191,0,0,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000 CVE-2025-23193,0,0,dd2b7306807ec40f9912fb49ee68934fd2efddf05fc31efb201a5ebd32befe04,2025-02-11T01:15:10.700000 CVE-2025-23194,0,0,2abdaa039bd60248a2d82f5999a9ed81ae8b9d9f0da1d221293e79525f619c35,2025-03-11T01:15:34.630000 -CVE-2025-23195,0,0,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000 -CVE-2025-23196,0,0,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000 +CVE-2025-23195,0,1,ee22c587682b0cda7a69f201e586a2b92d254e8abbe1337e77f0b479ce494ebd,2025-01-22T15:15:15.237000 +CVE-2025-23196,0,1,d3044e41b79218329d6fa5b9693b21ec030a66b6d8b023891e2ed1eab02cdfc9,2025-01-22T15:15:15.390000 CVE-2025-23197,0,0,099217d7c50fa4e567446b5ed24de5a49493412d57096b7a33e5ff39354836a3,2025-01-27T18:15:41.037000 CVE-2025-23198,0,0,3cf38d53bcb86db60d0a510e98ef988ad397e5444ec65982c4e8cda6c4b1ff95,2025-04-28T16:44:31.910000 CVE-2025-23199,0,0,7153e244f8d44a69fd924672e7b401321c173985aa80bf61d90c87a5cf1f874a,2025-03-25T15:13:40.957000 @@ -287089,7 +287089,7 @@ CVE-2025-24011,0,0,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7 CVE-2025-24012,0,0,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000 CVE-2025-24013,0,0,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000 CVE-2025-24014,0,0,d437dd0957e63e3c162ac9164e717ef0adc1c3484b51bbf8b0a74d7b98c6cf06,2025-03-14T10:15:16.240000 -CVE-2025-24015,0,0,3c1a7b3586a1ecb44b6c46afd3515b0205e7eb53a7d7639f744fa286dd75c39d,2025-06-04T20:15:22.543000 +CVE-2025-24015,0,1,988f89d7521096a0856e0bfef6c95faddf4212ceadd2ec661835a178989569ca,2025-06-04T20:15:22.543000 CVE-2025-24016,0,0,c090754f26d92875e7dde6ca613307138b21fce6005c542e3bd734afb516a0ac,2025-02-10T20:15:42.540000 CVE-2025-24017,0,0,dc52ecd4171e7929f65e0a4836da3afeb723a34df858befdd8eddd836222dac3,2025-05-09T14:05:15.500000 CVE-2025-24018,0,0,8bc6fec409107a40272cc09bd4cd4f020e3f477d554cda09bae3fbb5bf512a3d,2025-05-09T14:02:53.547000 @@ -287797,7 +287797,7 @@ CVE-2025-24855,0,0,3b83ed2e42d12574419e7a5d93b58d3d4fa5393073d22ec518ba075ff8bdf CVE-2025-24856,0,0,de81d5fa3871c8fea36d9f92d65c776b1ac74e3aaeeb12190f8f5c33a73c1a6a,2025-03-16T04:15:14.517000 CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000 CVE-2025-24859,0,0,7ae63268ed8f6061889ef3699ff8e2b0990fb5a54f1b9202dc6890fa70d06768,2025-06-03T21:32:18.940000 -CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000 +CVE-2025-24860,0,1,2716815cacba7c5cfe54858fc96771c8728f0c123ed6a5d7daffa45fe22369be,2025-02-15T01:15:11.327000 CVE-2025-24861,0,0,cda35c31a52f18b1ea661e5db3735fa3ea7e6195ecdfe91c4593ecf77fb63f96,2025-03-04T19:27:30.983000 CVE-2025-24864,0,0,03d90ee76247121aec5193d6e140b18b95834894f967758504c08d3025e47e84,2025-03-06T04:15:25.713000 CVE-2025-24865,0,0,a84aad4d5bdb225f0618ad62f2ff1ffe2c161de1be6dfd9acc81d2401125c5dd,2025-03-04T21:16:29.903000 @@ -287902,19 +287902,19 @@ CVE-2025-24995,0,0,5941a6bfacbb23c8364db7fae58b60ff3ceb520bc5c6aa455cb355669359e CVE-2025-24996,0,0,76d859fdbeca0832f33504130bbb93876c7c278e86d0f29396967ce06056d54e,2025-03-11T17:16:36.803000 CVE-2025-24997,0,0,518312c5725fe48f17f67f709c2db44e4ef3aec37deaac9bec9cd39823dbbe4c,2025-03-11T17:16:37.103000 CVE-2025-24998,0,0,97ff83c7f8c3dc3c86cf3e217ce8a9825fb5a93ab4895982732725d23057fced,2025-03-11T17:16:37.670000 -CVE-2025-2500,0,0,3dd224084b6fbed5ea1cf7347008be885882132ef5ca80876af1b58e698f8d12,2025-05-30T16:31:03.107000 +CVE-2025-2500,0,1,a6043607d8b546e4e3d11137f41d864bf5b90968dcbcaef444b85e9236b7d771,2025-05-30T16:31:03.107000 CVE-2025-25000,0,0,d5ec8035d195406518f39319cbcf905fba8c6f7fd5b0c53e90332d3f680df9f2,2025-04-07T14:18:34.453000 CVE-2025-25001,0,0,c45cc763a1547fefda7795f8d11522125ff7003c83cf07f197d3b95e585aaa2a,2025-04-07T14:18:34.453000 CVE-2025-25002,0,0,12f8033c4f78f1fc2a11a22d65139dde5cad0f892f0f27858d617011f4499917,2025-04-09T20:03:01.577000 CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000 CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000 -CVE-2025-2501,0,0,e9b37714d913afbecce96c52840b0b2e5bb64590af9431234ef913be1d4fcb71,2025-06-02T17:32:17.397000 +CVE-2025-2501,0,1,b88e6d23c5ab944162eb989f85baa8515946f4b0b4bb397d5de06dbaddedba6c,2025-06-02T17:32:17.397000 CVE-2025-25013,0,0,8b0fcb6890b87ced02ed7f1e0ef615815bf6fcf1ec3fd1005c85d59a010589fb,2025-04-09T20:02:41.860000 CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352e87,2025-05-07T14:13:20.483000 CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000 CVE-2025-25016,0,0,d83ceddcf1bcf084cd4544ad95cf9a19b953e3c151e0441bc0e4520196c8ad1f,2025-05-02T13:53:20.943000 CVE-2025-25019,0,0,2afc58431924021ca3bf42f394ec17aa34157f3c5c08443297c80740eb48786d,2025-06-04T14:54:33.783000 -CVE-2025-2502,0,0,6fd5d57633ca6bfb868bb538c58a070c30094fd2c097c4991df33aa80efbbb4d,2025-06-02T17:32:17.397000 +CVE-2025-2502,0,1,75354ef25cea464740e6295ba338d0f4594d98dd28810408b26b04a750617bec,2025-06-02T17:32:17.397000 CVE-2025-25020,0,0,d566b7cd7fd6361d66cffeca4ce560878441d81f95ce07909cf8483e0f5efc77,2025-06-04T14:54:33.783000 CVE-2025-25021,0,0,d60ecd5794b198d9ec69c2ba72a1a0ede514132c1180164c16ec5c076fe6351a,2025-06-04T14:54:33.783000 CVE-2025-25022,0,0,f3f9e6a4c683219a3fd870da8dbdc0b423345338053db43be9cf724b4dc0e822,2025-06-04T14:54:33.783000 @@ -287922,14 +287922,14 @@ CVE-2025-25023,0,0,074c065f09189eb031ac585458a2e1d09aaf15c120a072909abd4feb5fd42 CVE-2025-25025,0,0,baada1c6e11f4c466ae1f25ebcbd90c7a67d2ee75d626afed1c26f338fed81bc,2025-06-04T14:34:21.177000 CVE-2025-25026,0,0,9e10c45eeb1395709948c66baccf38a650cc7f25c87ff2170d95459f94f51251,2025-06-04T14:34:34.380000 CVE-2025-25029,0,0,71f96fba6a59ae9782743e404a789413bdcd621c572feacd01423bcf67b23aad,2025-06-04T14:34:42.130000 -CVE-2025-2503,0,0,ed4d8140856f517be1798ebd1d42e9ad5beeb39e147c4f2248508d466f42a88d,2025-06-02T17:32:17.397000 +CVE-2025-2503,0,1,d72eb617726e2f5b0060a29b1930dd818d384f4d97209ab61d04bbb4435c934a,2025-06-02T17:32:17.397000 CVE-2025-25035,0,0,4a2d0f672ce0e83b98c92e972e5b7eb6fa5e15f13c5c1cb0d71f8aaf6e12e24b,2025-03-21T19:15:45.437000 CVE-2025-25036,0,0,a8799abf886f32cf74fa3727668b9ee2d7cf5c4f840bf1724d07c64c2d8a39a5,2025-03-21T20:15:15.293000 CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8922,2025-03-28T17:37:36.690000 CVE-2025-25040,0,0,eef52afdc1e0cd691e9f8e58be6a79eb181268f995aedb195ab63cb8f64cab8c,2025-03-18T20:15:26.030000 CVE-2025-25041,0,0,38e8fa4df2cdb6a93ddc945573bdc68d8f211c9cdac3d09670f4b0b980fef07e,2025-04-03T18:15:44.960000 CVE-2025-25042,0,0,5f31505452d68a678450274075e145f35ddefef408cd0b3ed1e383cb5d57fac4,2025-03-18T20:15:26.177000 -CVE-2025-25044,0,0,786e6baa3ec8cffd67d3bcb67b98644dec9eb89b0c1c08b108871ba0cd42ab9f,2025-06-02T17:32:17.397000 +CVE-2025-25044,0,1,bd7bd8a39fb422638a8e50fe5d61319982a7231b9e1d394754abb91fa685d798,2025-06-02T17:32:17.397000 CVE-2025-25045,0,0,4332e3a8b71ea922a29f4a25a34e5a1ad4ca877c6226bfc3954996951ce40a0c,2025-04-29T13:52:47.470000 CVE-2025-25046,0,0,ef01fe62076c448c0a74cc0b470d93bb2ae59c519d0a10b5228ec1da6b3dedc6,2025-04-29T13:52:47.470000 CVE-2025-2505,0,0,1c5dbc559f463be147cb12740d372dacf2302c45c3ca19193c3edfdb65cecd96,2025-03-20T08:15:11.873000 @@ -287944,8 +287944,8 @@ CVE-2025-25060,0,0,8a64f3b5cfdbdb117dcf174c4cfa43f7826a569058296285ed9b2285a162d CVE-2025-25061,0,0,c6aafff32d7dd92169622d3756fd8e14fdd083a787d0cacea4fc235406d00f2c,2025-04-07T14:18:15.560000 CVE-2025-25062,0,0,4f28740547ebea3fcc6161fcc2a3214fce113f2e5f4334f69ba39b4ec473b21c,2025-05-06T18:15:38.007000 CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485dfea9,2025-02-03T04:15:09.760000 -CVE-2025-25064,0,0,9e84cd685c2899ba87d91b60e716dae82288b1f59c39c2c263fed050bcca5916,2025-03-14T18:15:31.637000 -CVE-2025-25065,0,0,671f71d66434f8717d0462c1f30a666ef5db46391fb66851d226f8e409f57117,2025-03-13T21:15:43.613000 +CVE-2025-25064,0,1,91bc7683376cd7ce68a60df5670a517f71fe62cd344aa7068bfca462894cf3ce,2025-03-14T18:15:31.637000 +CVE-2025-25065,0,1,3b09c2ceb1f340b29ddf49718118d82d0e2f237ef48d6909cd5653c53538921a,2025-03-13T21:15:43.613000 CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000 CVE-2025-25067,0,0,95bc2fa749f0b306177d87826c44e11e2908b50e87d2a2785a1d729114c456d2,2025-04-23T18:45:35.860000 CVE-2025-25068,0,0,c8a4ab8093e5452190afc86804a8c92cea760c78a2641b1b2a360c829f12284e,2025-03-27T14:03:38.970000 @@ -288060,8 +288060,8 @@ CVE-2025-2517,0,0,d5f18489614869649cdda48e18fead9184cb1c42970b5856b1c4b6d2f7bf53 CVE-2025-25170,0,0,10b2b5d5b1d8e09a883b23033bc8ac75abe37fde2151575888a21edb35483c78,2025-03-03T14:15:54.613000 CVE-2025-25175,0,0,57f52436a99f7fed27112577d2b540c306e155b82b661017f91c9191eec841c4,2025-03-13T09:15:14.123000 CVE-2025-25178,0,0,4d3495fd89869cab43d2d5601ae744320ec1fbb133f1b7ab10bcd79797aa78af,2025-04-15T15:16:07.543000 -CVE-2025-25179,0,0,1776f71920a8dd2a40bf861a72bae6058afef58cf9e9ec5ef5fde2151e911fa4,2025-06-02T17:32:17.397000 -CVE-2025-2518,0,0,a8f5c8872d95d859608c7cfe7c532bd063803d6f530f9a6abeebcf860d42a83b,2025-05-30T16:31:03.107000 +CVE-2025-25179,0,1,85fb447806670ebd1c5d1bfbca1f8c6323a5c7423a40bb05e292c30fd33891ee,2025-06-02T17:32:17.397000 +CVE-2025-2518,0,1,b59bc17e40a8ef98ce4dc332bffc082676274d53349daf06dd140fe4bf7fd51a,2025-05-30T16:31:03.107000 CVE-2025-25181,0,0,aebe0b9a6314ff7a9f4a4ab410e1c6b1bc48e96ec20a3daea50dbb87c370c597,2025-03-13T14:31:11.140000 CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000 CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000 @@ -288188,7 +288188,7 @@ CVE-2025-2539,0,0,d08575a7f1943ad408e267113207b31d934ab07db617ed66f8aa571dc440dc CVE-2025-25403,0,0,0d231ea68090ad249aec4fb809acb9214a05b5a8286dff9de6dea9c4c4a4b723,2025-05-06T16:15:27.753000 CVE-2025-2541,0,0,8b40d977637776f3c1ad0d2a3abc23dcbbe36312db577f03daa69ece2feadda8,2025-05-06T14:09:58.370000 CVE-2025-2542,0,0,051c9ac38dc3845e54472e78eedda96552f7a8993cf83d4a7f290489b845369f,2025-03-27T16:45:46.410000 -CVE-2025-25426,0,0,108c4b754e54717537bad215341cffab6a867457930f1858a7d85368cf0a6951,2025-03-05T17:15:15.320000 +CVE-2025-25426,0,1,721c919f0b2e2bb66797d98048212e48d03b7d3a5c53aa2aa34e0c177b194cd5,2025-03-05T17:15:15.320000 CVE-2025-25427,0,0,c82a0869650bfdcbf39a26ade0b4b78ba5fa257bdc63443106ba83833cfe00f5,2025-04-21T14:23:45.950000 CVE-2025-25428,0,0,79fb151efb97e130bbfa79b0bbcfc44da7193a41a5ce0a076bfa19c94c34d52c,2025-05-21T16:07:18.457000 CVE-2025-25429,0,0,b9afdc04989ab198365b781f4430c4c1a523a5c604d13253fb334819cc1b0cac,2025-05-21T16:07:37.823000 @@ -288314,7 +288314,7 @@ CVE-2025-25685,0,0,204deb7c4ce53f6e492fa281d6e8bf3f8c2d8728cd8c95a39540e1d64c356 CVE-2025-25686,0,0,4572059816c223b003dcfdffbac57f4eb8534757a2fb6cbc63605046c3c8e752,2025-04-11T17:34:10.580000 CVE-2025-2570,0,0,231123c781360a1cea58c394a85b0227a2dd8cca7f15976bf75f3f642de2bb3b,2025-05-16T14:43:26.160000 CVE-2025-25709,0,0,9d314f451c270f6d71f71b4acae3d9115f11fe64a66489ce5bdac5bbfa4be764,2025-03-12T14:15:16.077000 -CVE-2025-2571,0,0,87cf585bbea5457db59518b207f1ffb27e85a8f58564d3f991fd1a1163ee1f50,2025-05-30T16:31:03.107000 +CVE-2025-2571,0,1,35ca25196622c2ffb39af24e9f522dc2cc8709c94ddbbd1fdd75a8e835535687,2025-05-30T16:31:03.107000 CVE-2025-25711,0,0,687cbddc40bafa1aa553307129c536c978baa7c3ff70ab2a66988ede6a6f0e53,2025-03-12T16:15:23.023000 CVE-2025-2572,0,0,031d444c67ae0946e078dd7689fec8375a9c2817f0fdfd65532cd6250cdaf8e2,2025-04-15T18:39:27.967000 CVE-2025-25723,0,0,e8c9c3b7ce8a94391f1e2d0696694643f2079bf2d5039cbd8233d30f1078ac40,2025-04-03T19:15:39.403000 @@ -288468,13 +288468,13 @@ CVE-2025-26009,0,0,8f7f210f0d6391dc793746a507475487d34df96ad5f97137cea8c79aa3fd6 CVE-2025-2601,0,0,b2f2bc957bad364409e842d81b3bbb7a2d8ffe3aa3bf35cd41e278f677537515,2025-05-14T21:18:48.637000 CVE-2025-26010,0,0,cf5a04d9860ec5e77e2e34e26dd6be3079064fe7b613efd3b5c093d4f0e21516,2025-04-01T16:33:40.410000 CVE-2025-26011,0,0,7d295bbc36362f782172277753f7e055d256a1db3b7bed76509ca8e09eca8473,2025-04-01T15:42:54.437000 -CVE-2025-26013,0,0,724f265adcd738220ed4a776fa09e1541bc1e63c38f068763e12781ff127fa8e,2025-02-21T21:15:24.470000 -CVE-2025-26014,0,0,3fd6cd6dd917138a861694a718ed3751b21b87121bf787ef1fcabe642792a021,2025-04-17T16:15:34.477000 +CVE-2025-26013,0,1,40734f6d8ee5bc23e3bb6d3f316f5ff417211c76e3bd05950ea58ed84cc035a5,2025-02-21T21:15:24.470000 +CVE-2025-26014,0,1,f214b17d5a22324a838383615ccbc65f42d977244cb293df71aa8e2b4b792ab3,2025-04-17T16:15:34.477000 CVE-2025-2602,0,0,55184d4444cf6fcb654297213a71fd82f15a6409f468fa51c940547b67d87704,2025-05-14T21:18:56.027000 CVE-2025-2603,0,0,625b00c9525209b5099994d377f6407402ebb3e82c4e2dce028f1396925733cd,2025-04-01T20:28:42.917000 CVE-2025-2604,0,0,209dc94fc4ece561b20c49ebedaf1fa67845d362ce425198a9d48be9814fba65,2025-04-01T20:26:24.393000 CVE-2025-26042,0,0,85a28b259be921f0181d0669d9f2dc35f0096c1bd80ef77e40d4ac92a2f60a88,2025-03-19T19:15:46.587000 -CVE-2025-26047,0,0,e5f969b85e25d20e576d529c079698dda076726cc7fa9835a0c501d496a29bb3,2025-03-06T21:15:15.623000 +CVE-2025-26047,0,1,230899c41c526b9bac27150c7614c22ca2a5819ccf566cb48a020905efcf7f76,2025-03-06T21:15:15.623000 CVE-2025-2605,0,0,6f360b4675700e17a3c34a10d190011b0da673ff70661152c79982d87d6df8bc,2025-05-17T06:15:18.303000 CVE-2025-26054,0,0,7af97027ebd841f2944a0f16c23d07f8150f5fc7449aca0f5ece9086fab14196,2025-04-02T15:15:58.170000 CVE-2025-26055,0,0,7517d1d36429deae562bd8473305c366d152cbf30a37d4cc36a8d0384717f03b,2025-04-14T18:15:28.427000 @@ -288604,7 +288604,7 @@ CVE-2025-26389,0,0,69c0b4482301cbdf7810c0d66dde175a8a55879ae4b001f43aded2e047b17 CVE-2025-2639,0,0,eeccd7e86f1a8e6550900d4406a77fd9c06a6948c701e759827649fddf007255,2025-03-28T19:33:14.553000 CVE-2025-26390,0,0,d486511ec0cd7e022494115d025bafe0774221a17a1b54e8ff55467ae4483ee1,2025-05-13T19:35:18.080000 CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000 -CVE-2025-26396,0,0,bf8180e55353ac85fb0dfc49d7d8ff66212c5b9d75058378ec06bad6d104c5fc,2025-06-02T17:32:17.397000 +CVE-2025-26396,0,1,3a6e4823811f7c53f918af9e5601b8b92ea760d35b58b90fdbdace05eb9a40f8,2025-06-02T17:32:17.397000 CVE-2025-2640,0,0,cb1c6d71f05715e40a599d54b3e503bcebd1109fe2ad2ac7ebfd5568ea675609,2025-04-02T14:26:23.040000 CVE-2025-26401,0,0,8a8a5edf8458e0cd9c5461b93aa3dd8d7a38c5486b82730ab0a36983d22db1ca,2025-04-07T14:18:15.560000 CVE-2025-26408,0,0,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000 @@ -288902,7 +288902,7 @@ CVE-2025-2679,0,0,cafe0cb961640352f6700d1f4f9c72cc0c9f8d69b76916ff519f9c4a67eb35 CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000 CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 -CVE-2025-26795,0,0,a918e173b11977413f0b59d322df4584deb42a821659e1377a79a8d11ee044df,2025-05-19T19:15:47.950000 +CVE-2025-26795,0,1,2fcf23701babee17d806114fe85da38ee4cf217e545370f2139dca9b34538b7c,2025-05-19T19:15:47.950000 CVE-2025-26796,0,0,68ab74fb372251311859b8e434d48ae111cce4d9cb690323b59ceca29e2126f1,2025-04-01T20:27:46.867000 CVE-2025-2680,0,0,934be0066d2f2c151ff263e21e7acbd87991eb5817b720319e92f8127f51bdc5,2025-06-04T15:16:46.930000 CVE-2025-26803,0,0,f34b060535881535036774e78c94752baf5db5d8ee7ebda53997889e53c0646c,2025-02-28T17:21:55.827000 @@ -289223,7 +289223,7 @@ CVE-2025-2724,0,0,4610ac8ad922ea624cd2d35c755551566dc6e12e181c5f6d5e7e865b18b820 CVE-2025-27241,0,0,5f3f6499b682ea2df4f525925370f561106f8235867d4ad8fc9ab0cd76693210,2025-05-09T19:14:21.627000 CVE-2025-27244,0,0,86fab9c76c6855c3f65d6fe655fad17ea7f4d78587bc5a57db26b5cf4b92bc76,2025-04-02T14:58:07.527000 CVE-2025-27248,0,0,fecd2c1f71e975d5a7a66828a8b8c63d27847b5ba5cdc677ce3ae8da25e6ebf8,2025-05-09T19:14:06.030000 -CVE-2025-2725,0,0,fb18dc0db0fb3055ea22e3f0f01072b68bb38adda03e0426261ccb1a680d900b,2025-04-11T20:15:22.937000 +CVE-2025-2725,0,1,4c49041f815970a2f0962172abde8e9b997e751be7cfde55bbadd432ffae1641,2025-04-11T20:15:22.937000 CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000 CVE-2025-27254,0,0,1326449cb688d3d742c54aa7c26671bc1a30e863cdbd3bd942083e3395c678b9,2025-03-12T12:15:14.767000 CVE-2025-27255,0,0,e778f08cf23683afc5d4a9e46aba9493b6f8173a4bc86a191d0135a1893c7fc7,2025-03-12T12:15:14.907000 @@ -289281,7 +289281,7 @@ CVE-2025-27306,0,0,80702ad22c275e37a0cbac8c8257049e2cc59528c7889d8099c083916777e CVE-2025-27307,0,0,51f2191ce96fb79adb3f67c48699c360eaca5adb32f81b1526864b04b25e65bf,2025-02-24T15:15:16.653000 CVE-2025-27308,0,0,6d5fe19be470f91d4160de41be49c314b9c3c325bf2a238259d8d0ab3a430a20,2025-04-17T20:21:48.243000 CVE-2025-27309,0,0,ee90fc891e4d7992fdd4197032c9b3a8cfff3107398a8519161d2c08982f71c6,2025-04-17T20:21:48.243000 -CVE-2025-2731,0,0,39a888105adabc67b20b84ceedb2583f7864e808c57f6ad9c427eb1b978676b5,2025-04-11T20:15:23.677000 +CVE-2025-2731,0,1,febe4920dde8cc8d5dd78bbc47bfecf52e8fafaf30d7b64cf83ef4c45b0dcf79,2025-04-11T20:15:23.677000 CVE-2025-27310,0,0,a4c8579f4ff6d004b4f9f955f8b076ac67662031d76a56d875d385fb8114961c,2025-04-17T20:21:48.243000 CVE-2025-27311,0,0,887daf3ca5e659c3544c21201f804fbc1bf8b2cd8c00da7ecaf2899ee756ead7,2025-02-24T15:15:16.783000 CVE-2025-27312,0,0,b581bf2145bb64186de8cfc506dddf34a2209eb697269956dc9c4e9722d7a127,2025-02-24T15:15:16.917000 @@ -289292,7 +289292,7 @@ CVE-2025-27316,0,0,78a664ed18e2a3f09c84cff8eafbb3e667c271b347b6c49cb4057c71b6fb2 CVE-2025-27317,0,0,6890f6ed99867285ecccef44abce2bb31cd702302b365d74843fb1b631d8a7e0,2025-02-24T15:15:17.353000 CVE-2025-27318,0,0,01062c1cc7b69a94a4b00c3bba687232094c6f37680977c56572c43c965cbcbe,2025-02-24T15:15:17.487000 CVE-2025-27319,0,0,f6d9643329059133f44873c4a3317a2befa61f05de326a7c1bc858bc9ee4d52c,2025-04-17T20:21:05.203000 -CVE-2025-2732,0,0,0157e63cbd21e586b361f449525208047b05afffc54f3b08ae4e1d75541098b6,2025-04-11T20:15:23.793000 +CVE-2025-2732,0,1,91eb64f3a8bcc02556b497e701ba65aee1eded4ed4ab5df1bac85e8bed0cb9b0,2025-04-11T20:15:23.793000 CVE-2025-27320,0,0,8ddde046a5073fb57db51ac32c278ea72fd103a7b6698e137a1a5af8558b1579,2025-02-24T15:15:17.620000 CVE-2025-27321,0,0,57e789f06d16f73e5a359b61adef9f6f0ec207245e4ca47b20a61f61292b4b5b,2025-02-24T15:15:17.753000 CVE-2025-27322,0,0,db12c06a727330268000c00c2bbfad285b50b188e497a32257bdc6bd9bd31bae,2025-04-17T20:21:05.203000 @@ -289401,8 +289401,8 @@ CVE-2025-27440,0,0,86277272131892140b431c748dacaa4d43e60fedf1d6315607fc09340bd3b CVE-2025-27441,0,0,79018b3b06a9e1f169848e8cfe5684a88b8ec611e0eecb9ae49cfed5e1cd7b23,2025-04-08T18:13:53.347000 CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501ed9,2025-04-08T18:13:53.347000 CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000 -CVE-2025-27444,0,0,3b2f034c29e35998a58eab4edebe91f0523b223327d4b3bcbe6698882dba3b7f,2025-06-04T14:54:33.783000 -CVE-2025-27445,0,0,488c21fd7295c3dd7b17ff3ac3efae4e8d3ccd10055899fb07d0b588a2d97297,2025-06-05T20:12:23.777000 +CVE-2025-27444,0,1,c7b1a97547a91679baa9ad517720f31f460fcf4a26fa9d80c6ebd4985eb7ff96,2025-06-04T14:54:33.783000 +CVE-2025-27445,0,1,21ffaa0121ffbab2a93e77289864e83ad4718b0ea6117cc262cfc372dcb31267,2025-06-05T20:12:23.777000 CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000 CVE-2025-27467,0,0,e305051e1a7dcf4291e11b8cd6f3091788c2ddeaf29bee2cf92ba70db3a6a044,2025-04-09T20:03:01.577000 CVE-2025-27468,0,0,dcaeee6f5e39787f02f391b688449bc9e36259b88e853d225eb70b8e9394d505,2025-05-19T18:22:00.040000 @@ -289641,8 +289641,8 @@ CVE-2025-2775,0,0,d5f9b3837bd119727ad366eb5457ece8400d34743a14eacef1e0d8e95723a9 CVE-2025-27750,0,0,c49e7838a047c70074ca1fd708fbe03cea7fd5443c4589c2bf5448b768717bb8,2025-04-09T20:03:01.577000 CVE-2025-27751,0,0,36c5cc9e4d832930e3d2ea6604a87330c3d6ffd9449d78c43c541281cbb4c7f9,2025-04-09T20:03:01.577000 CVE-2025-27752,0,0,54cced6b2e69e45f557903f0bba541e39850c9499c8c472acdeb4ca42171d046,2025-04-09T20:03:01.577000 -CVE-2025-27753,0,0,25a5a7f3724bbda371401a0fa35712c1269e2a6f9444dd9fa8059026aeb90bd5,2025-06-05T20:12:23.777000 -CVE-2025-27754,0,0,3f9f7ba260b541f02b93eb6bd20470056d4399996b0f34c93edebcf27a1e2a84,2025-06-05T20:12:23.777000 +CVE-2025-27753,0,1,b2f6963630e62c6cd919b037b3f638d8fcd0876c00bf41e5fd7fe9841e2ff960,2025-06-05T20:12:23.777000 +CVE-2025-27754,0,1,0587f603fdcfaa0945af3ad22dcd82f969c35870e942d12d906686810572569b,2025-06-05T20:12:23.777000 CVE-2025-2776,0,0,311fc4dd3d3afb54d9f169ab5ee5a53c819535a8d6163040b8c5dcace7256648,2025-05-08T14:39:18.800000 CVE-2025-27760,0,0,0fe214e27ee00978be2b2db20453752d3c587e2a097907bcd7b6f52eec4fd67b,2025-03-17T23:15:17.740000 CVE-2025-27761,0,0,ccacd385546f9e849c6762c7104b07eacb4ee137232b68db7722ae4c039dd182,2025-03-17T23:15:17.807000 @@ -289686,7 +289686,7 @@ CVE-2025-27804,0,0,0f20e5d895be2127038637881ffdfd5e6829ee1b3cd5ff6e111614642a15e CVE-2025-27809,0,0,acf17088263ac0454f3c19e9b5b69eee2adc10f0e02e48930b8a575ccd37ca6c,2025-03-27T16:45:46.410000 CVE-2025-2781,0,0,f71242cf9553514cc2ec12a96aa1195882b54360169109a0233e1040d7956dda,2025-04-01T20:26:30.593000 CVE-2025-27810,0,0,d1482541c832943462d5d5141f3260f826675da05c4de1d17a8d8000d1e76d18,2025-03-27T16:45:46.410000 -CVE-2025-27811,0,0,931ee7d0bc9697b3d17499354c371e43af933670b0f8fbda54d4b2326d3595ad,2025-06-04T19:15:25.043000 +CVE-2025-27811,0,1,7e1e1a6abdd8fbd7c66871216fae4c9475dc8ad145c105fcfef7dfa7631fd675,2025-06-04T19:15:25.043000 CVE-2025-27812,0,0,490eea28d11bf4042efca85e606a63ea8705fbb9895bc0e4fb69498d1dff9f35,2025-04-11T15:39:52.920000 CVE-2025-27813,0,0,810e9a9403b82aebefac61476a9e0011d443081011347b72d18ecc06e7e5914d,2025-04-11T15:39:52.920000 CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000 @@ -289829,7 +289829,7 @@ CVE-2025-2815,0,0,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c0 CVE-2025-2816,0,0,a8ded0ab2e19cf63ea62d3b02a3f6575ee232c3a778f97857dbd64a1da80c4f8,2025-05-12T19:38:14.733000 CVE-2025-28168,0,0,947472c9a1dac2f8935bb8175ab19ab611e3727ddaa88c2407ecc31a977147b6,2025-05-08T18:15:42.197000 CVE-2025-28169,0,0,daded7404590ead49179714046cf4550734ad214e781473e5f10c5129c2c88e7,2025-04-29T13:52:47.470000 -CVE-2025-2817,0,0,f2c71b94e67aca9d965323c14cd9650af88f4e7480e24b1b7222a49bf56e1bb1,2025-05-02T13:53:49.480000 +CVE-2025-2817,0,1,1b650340f5af03756d518689e119aa2ff7e35e93b2c1ac16e075bf7cf0bd922d,2025-05-02T13:53:49.480000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 CVE-2025-28197,0,0,6014e266f4224c57ab1bd75f113da4696d8d67e68cf26ea7681631f15433ac64,2025-04-22T14:15:25.370000 CVE-2025-28198,0,0,73ff852cc2b9fbbbd6178c29b242eef1218bd0b40968701e88342b96e8ec1dbe,2025-04-22T18:24:06.670000 @@ -289859,7 +289859,7 @@ CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08 CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000 CVE-2025-2826,0,0,73d45c19b2e4c3bc4d80772bd5509ff4acb0a98a2510975df320963b1c203a94,2025-05-28T15:01:30.720000 CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000 -CVE-2025-2830,0,0,18f5acbcc1908730340a8cc830c427c3344653036d2c90e6b125301c8343cff5,2025-04-15T19:16:07.927000 +CVE-2025-2830,0,1,7cc03d0924947b1139be771811da4f2d228d77ff356f5bc61f37d598a9ddbb12,2025-04-15T19:16:07.927000 CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000 CVE-2025-2832,0,0,cb7d7ad79effe9b806885a95f2ec7289cdd7a0d7d71df2be39be5f751b3cbeb5,2025-04-11T16:25:55.093000 CVE-2025-2833,0,0,9a52ee089c5cfe9509a1e8871d17816b70a7313c16002967d895358fd72885f7,2025-04-01T15:43:23.657000 @@ -290031,7 +290031,7 @@ CVE-2025-28950,0,0,6f71dd863d8ddc4065dcbba1cc370ff17aa5c89ed8392ffbfa9b51c302404 CVE-2025-28952,0,0,321701defa7b536165d70afff6f53aace0a564a0503a31371810856fcabd66bb,2025-06-06T14:06:58.193000 CVE-2025-28954,0,0,0e33bb88ce5d60e77cdeddd397365985cb550cf77b70cf6964d92b189ca109ce,2025-06-06T14:06:58.193000 CVE-2025-28958,0,0,3d600a5017d17470cd8fe90749f2a43cdd193ef23a7d81d461bc4fc7e97b11b2,2025-06-06T14:06:58.193000 -CVE-2025-2896,0,0,1c81baecffdec30ec6f24a7f4ca4014f76ca012e530abac3a1e12a1d762a1221,2025-06-02T17:32:17.397000 +CVE-2025-2896,0,1,79b6e283e3bc8548a93abdf3b54cf26275828328910251146409e6de805f9790,2025-06-02T17:32:17.397000 CVE-2025-28964,0,0,485e667ca4ab74e616040a1196a78321a36f62126bd16f17a2500147cf0be448,2025-06-06T14:06:58.193000 CVE-2025-28966,0,0,f1d92b3997cf600b02481e05750c9165b060edf5b34aa6d285c9f38d6ecf563f,2025-06-06T14:06:58.193000 CVE-2025-28974,0,0,16efdc13ae17a88a917f453d4a5bacb2b9653de889fdba302867ab87b0bf29f3,2025-06-06T14:06:58.193000 @@ -290283,7 +290283,7 @@ CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4 CVE-2025-29710,0,0,76acf70ed4fc771fcfeeb312ff4a43cdd85fe89eca87a8ee8dc65974175a9ffd,2025-04-23T16:34:04.967000 CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000 CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000 -CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000 +CVE-2025-29720,0,1,732fe2826ef6fdedac9faf03d9167da89ca85df46b8cbb80ab8a8117fe2fd5cf,2025-04-15T18:39:27.967000 CVE-2025-29722,0,0,ca2877891fb5b9bd3510371a0bd9d38fa50473b0a31dcb3ab5591fd6a04068ac,2025-04-23T18:49:16.977000 CVE-2025-2973,0,0,f988078874627143c2def1ab30019bab3c4d13be44205338de0c50c2330cd94b,2025-04-10T14:34:24.567000 CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000 @@ -290311,7 +290311,7 @@ CVE-2025-29781,0,0,9602edcc5b5c6ecdfd105a84695ee56cace470c55953ae06faefbf1153141 CVE-2025-29782,0,0,642561341fd441d3b75649151bd8fd2cc9789f9959ceab4d0a40abb896c0a19e,2025-03-25T20:12:23.047000 CVE-2025-29783,0,0,45d2b00d8a588bece93df8bfaa38fd733283ba2670cda9e32612d412a0ff1e78,2025-03-22T01:15:30.443000 CVE-2025-29784,0,0,9f5fac5d056c47dae0ae6358dac107544bc727213e81bb0b162611aa4d061032,2025-05-13T15:41:25.090000 -CVE-2025-29785,0,0,81fc5fdcb20120834dd4b56d984267cca5b90b091a12bf179fc4101d2b9d1a87,2025-06-02T17:32:17.397000 +CVE-2025-29785,0,1,2cbe485be23ee814c53626be0e7e3be97d8ad1aa5967aef8df2c0e83edf7c61f,2025-06-02T17:32:17.397000 CVE-2025-29786,0,0,451b93240c4543f3def3ea2c9521ecc2be3354f0b552d41bf2a019283f00a79d,2025-03-17T14:15:22.237000 CVE-2025-29787,0,0,2fd3435cc0f680f18716d607bc13a6c7a954d55969aae7d30fd344637489ec1d,2025-03-17T14:15:22.447000 CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5bc67,2025-03-17T14:15:22.653000 @@ -290505,8 +290505,8 @@ CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 CVE-2025-3008,0,0,4fa12c242f5a8201f6c22d962975bdb56f1fb8d6331510acdd26a20f396a03fb,2025-04-01T20:26:22.890000 CVE-2025-30080,0,0,6601767310f6b7ebc1eb1888b6410ba2af316c611e92066d1287334c8340e695,2025-04-07T14:18:34.453000 -CVE-2025-30084,0,0,42bd8c6e4e5bb881c955e03243b815786e0321e3ed8b391870bd06ac20456384,2025-06-05T20:12:23.777000 -CVE-2025-30087,0,0,b97561667214afaaeead7d3a580d17d6635cd635fbae35f55f56712c11f7b80b,2025-05-29T14:29:50.247000 +CVE-2025-30084,0,1,b9e689d27ca09c5a1f75c3365dcd68a752b64ffd47c4b0bf25efadba713f083d,2025-06-05T20:12:23.777000 +CVE-2025-30087,0,1,ca22edb24d2fd6491d96197fe665e0481cd595e8a008b9f74c9f3930100c34f5,2025-05-29T14:29:50.247000 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 CVE-2025-3009,0,0,2ece19ca671196966292028f4305ecb7262e6ccef463f1ac76d0f4bb8322457d,2025-04-01T20:26:22.890000 CVE-2025-30090,0,0,bfa905d9aa408c1f2585d10b532f402f67ab61becc7dc968d47593329efb248a,2025-04-02T14:58:07.527000 @@ -290658,7 +290658,7 @@ CVE-2025-30309,0,0,9f9cf0cdd20ae1c66398c9aa3e331adc1c37648db304a8a0df1f734799450 CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000 CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2c37,2025-05-14T14:28:01.833000 CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000 -CVE-2025-30315,0,0,6ebf7d367516b48927cf5b68b43cf958b5f419c32d8154d31c7d6cb07dfd2109,2025-05-19T20:29:33.717000 +CVE-2025-30315,0,1,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000 CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000 CVE-2025-30318,0,0,e9585c50b60ffa8b64da830b96992e12585dd9971124ba2c8ec2d12aa9784ca0,2025-05-14T14:28:36.363000 CVE-2025-30319,0,0,eb12dac8472fdfe9992ec3368e7c4232ecf79a9fba5a19c43d0577fbd40d843d,2025-05-14T14:28:51.907000 @@ -290739,7 +290739,7 @@ CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e829094 CVE-2025-30408,0,0,c46f2a921717ac22e3b71d54e7d86c5873aa6444534e1d413014b6e91fe9524f,2025-06-04T14:15:28.420000 CVE-2025-30409,0,0,ffcec7ca8527166f636901bf55b40476a7045f7049fdff6f862152cd4a0c855e,2025-04-29T13:52:47.470000 CVE-2025-3041,0,0,d5b21b6b78f2a401c9e8e108885b1916a2f3aafca95b7fffa55c4525e86b27e1,2025-04-01T20:26:11.547000 -CVE-2025-30415,0,0,af0520bb0a4effe647597c05565509c95b80b615348ac3dd921e3bfa860ba5d7,2025-06-04T14:54:33.783000 +CVE-2025-30415,0,1,0dda05c81624c9e4852b1e34ffe1c81b4f20f383ea2d938987f3a8415d08ffb7,2025-06-04T14:54:33.783000 CVE-2025-30417,0,0,fc12b9a39bd4ea35089b458c7e35708d689f039d406a8ac724d2823069bc5d0d,2025-05-20T15:52:33.193000 CVE-2025-30418,0,0,c869c34b60256dd02b3302e7e1152866851bf6fea18ac0f8f935e7bec98ade6e,2025-05-20T15:51:04.833000 CVE-2025-30419,0,0,9f19aa64262f2b9ac9049cf86acaaf123bfdbd1b1bb2dd1fac4010e65cfb2dcd,2025-05-20T15:49:39.510000 @@ -290802,7 +290802,7 @@ CVE-2025-30475,0,0,a2c9011dbe7567697878de65e8dfb3c5d584d7a7635471f469e7e4f9c6a3b CVE-2025-30476,0,0,1b83fd85bea0d8069f29b8d374be29abf968282bb62616dfb04a4e47265c3a85,2025-05-16T14:43:26.160000 CVE-2025-3048,0,0,5eb6156d35bbaa6ace17e28077befe8dbbf8441f38642f57d7841d345fe9515f,2025-04-01T20:26:22.890000 CVE-2025-30485,0,0,f2856ee96c6d55a594aa71df88615bdd59c4c1a0f52dcb79297759def1147103,2025-04-07T14:18:34.453000 -CVE-2025-3050,0,0,02179213c0367bc718433b6277a4179cb0095060deea3dc351b44c0cd55807dd,2025-05-30T16:31:03.107000 +CVE-2025-3050,0,1,e357d869d192e9acb80b6d92b6bb05a8b5cbebe3f28fe0c952e3a5c9216dd59b,2025-05-30T16:31:03.107000 CVE-2025-3051,0,0,03f9e07d76193917b8de9d74f13ff070438d20cd42142f9b8ee6c497180d4b37,2025-04-01T20:26:11.547000 CVE-2025-30510,0,0,65385fbb77c3413b4dbd5af09bd8095b856fda193f49543e9bce544dff1a2627,2025-04-16T13:25:37.340000 CVE-2025-30511,0,0,8563c461353588100bf079ab1328ff6e11ab2f047bd1165d78f20b19233b493f,2025-04-16T13:25:59.640000 @@ -291494,7 +291494,7 @@ CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db1 CVE-2025-31324,0,0,f022551eb03f972b51d5adf3fa8b8bd88e48c383f69788d6260b2cb6e8237e8d,2025-05-06T20:59:33.773000 CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000 CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000 -CVE-2025-31329,0,0,2caced93fe271ff02f61b4a5c24292fbfe976864d9c37ad7be5caa07cb313d46,2025-05-13T19:35:25.503000 +CVE-2025-31329,0,1,1fc101be6dd06c49bba529860427b1b9723c1206bb0b29e1d558e09c6f01e194,2025-05-13T19:35:25.503000 CVE-2025-31330,0,0,9b648c9ab2cbfab0d4ac3a100d1bd1b8fecdcaefd29ce618613bbd2f9e42ddfd,2025-04-08T18:13:53.347000 CVE-2025-31331,0,0,48d6dcadbd283a08a1842391c0c9e47ce4c05f71de3f97bfd6b5e3101a4dda56,2025-04-08T18:13:53.347000 CVE-2025-31332,0,0,3f108a9ac0319835d7c708da67bba48806ba6d1b5dc051eae9a5717ffd8b5266,2025-04-08T18:13:53.347000 @@ -291656,8 +291656,8 @@ CVE-2025-31497,0,0,1b82a56d9177bb215369f5c660b01f4df1461ec4d11c3d6455af08d6d37b9 CVE-2025-31498,0,0,f84cf018b9a7f2d3baed2463f19bf6204e206ba0c9a21e4ea32e21746b404d29,2025-04-08T18:13:53.347000 CVE-2025-31499,0,0,100e06aff4f77dc4647d3005d0769091b549a8bd3abfda5543fb54d262913d30,2025-04-16T13:25:37.340000 CVE-2025-3150,0,0,a30a7688ae10248ab6f92b08d529b33559f00224524ffa44e9f5b1d925f39cc6,2025-04-07T14:18:34.453000 -CVE-2025-31500,0,0,cacf47537f3fa514be8face7951ebb1446de5ffab9265a6e8e2a64d4843459d1,2025-05-29T14:29:50.247000 -CVE-2025-31501,0,0,a2d83610627f88bb4f0173bba2aed97c77037c54a19c8a8f8f2727036efffcc9,2025-05-29T14:29:50.247000 +CVE-2025-31500,0,1,f1b93fcba08807f7d86bf43444625c83c795c28b8400f7105730c19660bd5b7d,2025-05-29T14:29:50.247000 +CVE-2025-31501,0,1,f3bc44f213b8a69c1325f7a53c45ee0950e9479f5b2350b5e9907865471576ee,2025-05-29T14:29:50.247000 CVE-2025-3151,0,0,56b8a0f0ef4b0af3ff44306cbc0c9546f0d3ad7bbc930d44d34ad72e997301a2,2025-05-14T21:06:41.040000 CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000 CVE-2025-31516,0,0,523a9f1a981866b0e2c8b8f2bf03776b6eb23f7f0c09f8442b9e17379be69af4,2025-04-01T03:15:18.140000 @@ -292139,8 +292139,8 @@ CVE-2025-32093,0,0,0be67561f687e419f366910e8dba9fd229d2f66cc865d230a0136e401d9d9 CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000 CVE-2025-32102,0,0,04ddcda8c051f3c91aa036de5ac0a4f40a69ceb05a05dff993e29e6ac8d5767c,2025-04-21T18:15:23.430000 CVE-2025-32103,0,0,6fe14085be008d3a16f5d06a169dc84db347b342206ef966b317449d4c4ce065,2025-04-16T15:16:12.310000 -CVE-2025-32105,0,0,9b51936ae2dd09b96114e35e8dee30bc7dbd5ead83902169b338553d082ea45d,2025-06-04T14:54:33.783000 -CVE-2025-32106,0,0,51ced130fc20ee2b6b78ea8cbba575ec565dde298b612131fdaa683b41a8d69a,2025-06-04T14:54:33.783000 +CVE-2025-32105,0,1,476ebfbe4cc969e8e86c354bc4a35076f9ef64ba2d0a722c72be1e43e6692288,2025-06-04T14:54:33.783000 +CVE-2025-32106,0,1,d0564ec2d4fced62409b1d4e019c986f45a7a3a9304170e927de36b6e37fceca,2025-06-04T14:54:33.783000 CVE-2025-32107,0,0,a689a2435b39d5968d7bf2a8f1256f4c1ffc589945169a8a583af99a6981cea6,2025-04-11T15:39:52.920000 CVE-2025-3211,0,0,76a1b978e4d14ad416db291eb9ea785aa516c18018efd6d48ff333b290ad4968,2025-05-28T19:31:10.140000 CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000 @@ -292334,7 +292334,7 @@ CVE-2025-32294,0,0,9398a189e417d8f1d02011e09df57d4ffe10a67d2827545633f1e29d8a0f8 CVE-2025-32295,0,0,53c433306ea7dc97c36184a382b23df1b7d58def930436bb6fff2c7acee5a45e,2025-05-19T13:35:50.497000 CVE-2025-32296,0,0,55e4b32b240a3fefbe017324691d07e50cbce68d67ba40dfedaf61401ab7943b,2025-05-19T13:35:50.497000 CVE-2025-32299,0,0,49c4147c6d2449192d55c98739bc9eec8c1be87420b29ae76c69f17ee126a9c1,2025-05-19T13:35:50.497000 -CVE-2025-3230,0,0,8d7c9501df4adc1b2b2b87bf2d8889d85141cdfc7f1ece2d27410dca76b73b04,2025-05-30T16:31:03.107000 +CVE-2025-3230,0,1,d3629a3e2161163bd15af1432474f4fcf2513cb10a5452b9803677814dc453de,2025-05-30T16:31:03.107000 CVE-2025-32301,0,0,52135e6aca642aca8fa3971eadef3fc4c2f67fc19715effb0157897b8f5f6d1c,2025-05-19T13:35:50.497000 CVE-2025-32302,0,0,2efcb7e95fdb3fade31cae3ee8ddc064ac4fe27d73d1b8e48b58173c690ec4ef,2025-05-23T15:54:42.643000 CVE-2025-32306,0,0,0076f54feb6c98bae8c2148e126a770f8952e35f714caf29e3a0e5e2cbff7390,2025-05-19T13:35:50.497000 @@ -292344,7 +292344,7 @@ CVE-2025-3231,0,0,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b1 CVE-2025-32310,0,0,c3b2568a49d7a011e3cbc9748557e58f0519995b3a6735845f843c0d6b6482d9,2025-05-19T13:35:50.497000 CVE-2025-3235,0,0,bf02e56a9b2acdd9197c016e355d3cdfc496d77110cbd9f5fcadcef4a0003d66,2025-05-16T15:43:09.640000 CVE-2025-32352,0,0,14a2251916c9246fc3d185746736b75fd36a375e4aafcddd19d832e612b92a9a,2025-04-07T17:15:37.147000 -CVE-2025-32354,0,0,d29cb57759e48aaa211edce5df74c11039b7304b958effdab3f3a4d87f10b9c2,2025-05-06T16:15:28.150000 +CVE-2025-32354,0,1,79581725efc1511fc95030eab175dc0dc96d763437f699408010c1aaddcc619a,2025-05-06T16:15:28.150000 CVE-2025-32357,0,0,40a7f1d5c6b84f284e89452f93123e33fcf709d542192697901a2fb84d3fea3e,2025-04-15T16:37:00.857000 CVE-2025-32358,0,0,35ddf5d60f01f12924c71130d21e356ed29ef81b38985bea1a5740abef3cce29,2025-04-15T16:36:06.817000 CVE-2025-32359,0,0,691ae0a78a9f09e570651bfa1c97d8241e2da245cbb7cc39b5c3244e77534bc8,2025-04-15T15:31:20.960000 @@ -292562,7 +292562,7 @@ CVE-2025-32596,0,0,f1872f78910abd93ca6bc44a668b64d9a217aba1c01ee357a12dfaef6efc9 CVE-2025-32597,0,0,55ab5ca6ed3d8b6cf0931426c8147ebabb322fbbc0aae4fae4f5b3289fb12ce9,2025-04-09T20:02:41.860000 CVE-2025-32598,0,0,9aa1e262fedefa32d68a358cc7965fb92135026e124c97ce6f09a09dd1cca3ed,2025-06-04T14:25:34.160000 CVE-2025-32599,0,0,2831ce4b5b42e6325ce283503c26f9c21788129405d17dc22b338c3d4b2bbf42,2025-04-11T15:39:52.920000 -CVE-2025-3260,0,0,2622f79018d11ad99457f9734c22f67fff4766852e4b18c6f2f091c561d9cd1d,2025-06-02T17:32:17.397000 +CVE-2025-3260,0,1,830dcae46902d514febc51b9d211030fcd2769a35686ed4d5016a31fb1586c6a,2025-06-02T17:32:17.397000 CVE-2025-32600,0,0,083cfb813b0e4faf3c70b5e5f02105068f0caedfb180899d4577e64e9ef1444f,2025-04-11T15:39:52.920000 CVE-2025-32601,0,0,684526a644a2d5bc9b83c4eb6c253fb64f18b24d4f5112267400e5345b8fc15c,2025-04-11T15:39:52.920000 CVE-2025-32602,0,0,148b28f7e108599f04bd783492c1327b9adeb61a0cf6bda137e87e19db0937c2,2025-04-17T20:21:05.203000 @@ -292717,12 +292717,12 @@ CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd CVE-2025-32787,0,0,8a246667f42b8c93bdf6ea46fc5b0e98103cc9f313dbb1cf2d73b44e0183e974,2025-04-17T20:21:48.243000 CVE-2025-32788,0,0,cebc5cd0039e46d666bc72b974aa2129ecda5527e4c21f72222322773942a165,2025-04-23T14:08:13.383000 CVE-2025-32789,0,0,633cbc7fc9b4bbaee727fe9969a9c0e0f66a19d90060ed0204013d02d1a7b711,2025-04-17T20:21:48.243000 -CVE-2025-32790,0,0,a7e63264834a3853c1987532325d2457a2700a4286bcfbd7ac0efde133a816ca,2025-04-21T14:23:45.950000 +CVE-2025-32790,0,1,990684714275a758b4cf34a8ac7b4f82fc1b2c4e46163c9e33e822bd80e8f1a8,2025-04-21T14:23:45.950000 CVE-2025-32791,0,0,7bfb43a10b9eb50667be3773a3b4fe4844fac126ca4c8485005211a087def8c1,2025-04-17T20:21:48.243000 CVE-2025-32792,0,0,5617465372754753e6f838bd9a5e8e1789ad8b344ec076ba7e3dadb68ae93bcb,2025-04-21T14:23:45.950000 CVE-2025-32793,0,0,53c512d5ca796aaa2074213fb6811f42fd2ddcbb1551cf07ba87dac176a68735,2025-04-23T14:08:13.383000 CVE-2025-32794,0,0,e5c75374c7acd23f4b7bf6398c0b16e7126deed02aabe7e5caf26f8df1848b02,2025-05-28T14:58:52.920000 -CVE-2025-32795,0,0,ada1e048127459bcd3b5b8388d73b0903e52152ee697b61012cd44ac43593444,2025-04-21T14:23:45.950000 +CVE-2025-32795,0,1,9b91f12206c53caef7f7087deba98182feb5bc18c57224b5893c030b3a403c24,2025-04-21T14:23:45.950000 CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000 CVE-2025-3280,0,0,bbfa48dab65dd8e30d4af992e1eee1a23f41dd90ea1a7ea7a1775416dce3500e,2025-04-29T13:52:47.470000 CVE-2025-32801,0,0,6146013012d0cc266cf2a68a1cfcd1c7bf0ca9e930c722235f6d34464ee53a2b,2025-05-29T14:29:50.247000 @@ -292893,8 +292893,8 @@ CVE-2025-32996,0,0,66cdefdd4ac5ef2c3d78ef7b0a3a801233b441eea948b7804c8316fb0d163 CVE-2025-32997,0,0,585b29f934052489f32ea07f36835b226451d0492c02f05a8ece6f7bdf5daba5,2025-04-15T18:39:27.967000 CVE-2025-32999,0,0,021f92785fb481c58ddc71d38612ee5432057a074c3e9802f4824b4ea1fbbc84,2025-05-19T13:35:20.460000 CVE-2025-3300,0,0,71838a45e38cfd4f9033706465f5d20314584bcf58aabb1bb7ca5cab40d52129,2025-04-29T13:52:47.470000 -CVE-2025-33004,0,0,afc18edfc209840fbb317b4f0cfafd024b214f607adae13cbf598557d5d6024e,2025-06-02T17:32:17.397000 -CVE-2025-33005,0,0,32719d54df42a5c521b851ba065bec37cbee6e7c89b9b415c57479a8ce19be54,2025-06-02T17:32:17.397000 +CVE-2025-33004,0,1,65e558a78cdc6bf42a3f584de6111ff8fdd672612ebb3b04018d38c50b818099,2025-06-02T17:32:17.397000 +CVE-2025-33005,0,1,e835ced6fa127725a4adca848762f1c6305df3d4abddf02f892d2f178848c042,2025-06-02T17:32:17.397000 CVE-2025-3301,0,0,b2cbbbf942710dc17dd30bf45e19011afe7becbc724cdeebd3bb45dd2691a5aa,2025-05-02T13:53:49.480000 CVE-2025-33024,0,0,a929691d5533595a80202115459e86f84fc81996ba9c41d2a68880f3e6fcf59f,2025-05-13T19:35:18.080000 CVE-2025-33025,0,0,4b295e88dd02f429bce7f4aed7e0b1b7ea585aae960bbc6de9d4364036c40d6c,2025-05-13T19:35:18.080000 @@ -292905,13 +292905,13 @@ CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cdde CVE-2025-33031,0,0,2d969a774af5ceaf66dd278f74553fa7ce9d1ba27a89b3a16d68fba80ac09e53,2025-06-06T16:15:28.203000 CVE-2025-33035,0,0,db3cb0da6488f5b3a0815770af4b96e6b94c6f22fc359a699e9183c8dbff6539,2025-06-06T16:15:28.353000 CVE-2025-3304,0,0,cd001e23659b91ac09e62e7f84c563c50c19190543e934899e672b5c50fb7073,2025-05-28T21:10:23.573000 -CVE-2025-33043,0,0,ef36d411d5cc19c9905c2483de7e4477e0680a0d20b28599d7397884fc4af7de,2025-05-29T14:29:50.247000 +CVE-2025-33043,0,1,044f6c7834f7eed1d82fb6b8377e155f5c1ae51cb36f952b6bba03be184e28e8,2025-05-29T14:29:50.247000 CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000 CVE-2025-3306,0,0,116c94def1d4a2e814002f4948b93b65daa72c17537f71098e725bdf140a908b,2025-04-08T14:54:03.220000 CVE-2025-3307,0,0,764533eb55c36b857743124d26869569dc2e30546eb2b26c9f7f85b2c9a577e7,2025-04-08T14:59:43.193000 CVE-2025-33072,0,0,da8dbb3f32bc92a4fea66cbf1913465f4b8680e98b695ceda185e1985ccda963,2025-05-21T14:52:32.977000 CVE-2025-33074,0,0,18fcd41dcb3c6273c73253eac7fa48f9c3a067330384af16f609b96399dd2bb1,2025-05-12T19:42:26.413000 -CVE-2025-33079,0,0,4f59e9b2dfdcca5eab9bbffabec791f95a626590647262be73ba9397d655c1f6,2025-05-28T15:01:30.720000 +CVE-2025-33079,0,1,e03c1351d64ea3aa788b2740137daaac872cba9fc7e00cdfa47dcec834e8fc70,2025-05-28T15:01:30.720000 CVE-2025-3308,0,0,4b8d71911211f133728a91e073b25c990ecfbff65585df599965a7e80c999bcc,2025-04-08T17:38:09.607000 CVE-2025-3309,0,0,7325978445055221f9794565a82ef91ec3f38daa8638a7cf620dd6aa80f6a64b,2025-05-28T17:31:33.590000 CVE-2025-33093,0,0,ec1d02a559a830298071de2ada0cf3077c9399b6473555574f182d332f6616fd,2025-05-07T14:13:20.483000 @@ -292962,7 +292962,7 @@ CVE-2025-3350,0,0,ab8122662f4d35d345f437a9cb53fa8784081eec5b58ffdb41ee081fe8abc5 CVE-2025-3351,0,0,f78731ed9bc79ecf34406e602c631bd37d7ffbceafdfd8d1641d577a5e53ee79,2025-05-07T16:46:20.723000 CVE-2025-3352,0,0,92e71c762ef2a27a8a86dd7d6c085dc5966c19c03a67249c1282a518c8e95d63,2025-05-07T16:14:33.733000 CVE-2025-3353,0,0,2e2d0ee2cbbf29b1630195a5cd8ddbb4a183360dadd06f1e66416306ad21708f,2025-04-11T12:55:09.550000 -CVE-2025-3357,0,0,2b86a84f2730d9c01a4851c1b647866677c2d0517abff87c7432b1b07ffdd07a,2025-05-29T14:29:50.247000 +CVE-2025-3357,0,1,ed24a7fd0f08273c89f3582228e36fdac4a36ba734af254eb57a0a8ccb4373b0,2025-05-29T14:29:50.247000 CVE-2025-3358,0,0,350939b89539bfd7e19350173d727fecac27b026cbc4d081349ebce4bbcdf83d,2025-04-29T23:16:04.703000 CVE-2025-3359,0,0,457c717d6225e93930247459d4c6b38449728b0baecdfd548152990c0256a0a8,2025-04-07T14:17:50.220000 CVE-2025-3360,0,0,ba2e275701dcb3901d34802acb858c60ad53b7a788bf246a267d6619963301a5,2025-04-14T12:15:16.087000 @@ -293053,7 +293053,7 @@ CVE-2025-34490,0,0,ff6ccf68d08b2145b1b0c3fd30524d8f343b67a475d00c1c0efae114546b6 CVE-2025-34491,0,0,faad48875b9db7a8e22a3e33d04e2680f19102abb22a8bb70d5a70d93b5c1ed5,2025-05-10T00:58:12.427000 CVE-2025-3452,0,0,a0af240b89728ab4c39e75e741754c068d979812f93583676566bf2c295ab7ec,2025-05-06T15:35:58.647000 CVE-2025-3453,0,0,6d4c3756403d2c169f24bd9cd170cc74dc819f8c072954929ebcb8b579bf19de,2025-04-17T20:21:48.243000 -CVE-2025-3454,0,0,7b68c8aa9a98cb3661457634fa454aa6bee061fbba06ef66d41add92e2c85a8e,2025-06-02T17:32:17.397000 +CVE-2025-3454,0,1,4237309546c7f67c43ed4306317e4be2d74b3a324e1d901b3aa918c9e8066030,2025-06-02T17:32:17.397000 CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000 CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000 CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000 @@ -293100,8 +293100,8 @@ CVE-2025-3518,0,0,7497563947f75b629887a4413d991889fb74f762947f73f77cc72069a35bed CVE-2025-3519,0,0,7a1e772e7e1a4f83fd384db353598690580e540b87458701710d69fa7ae08b1c,2025-04-23T14:08:13.383000 CVE-2025-3520,0,0,7c7eeccf15cf970d93a11f89bdf4e7c6995461b0f04fc2e4a054f485b85dec3a,2025-04-21T14:23:45.950000 CVE-2025-3521,0,0,e68124b0492ef5fa2a78368f148f94ca1e15d9034aaa0b33274a6a0698484881,2025-05-02T13:53:40.163000 -CVE-2025-3522,0,0,d7b10d589112af206a2a97a80b31b8312cbafe8f15fc0b775a5c292039712cf3,2025-04-15T19:16:08.057000 -CVE-2025-3523,0,0,9e0b214a1ab217ceac11021882f71acf6e83d545f10dd5d4b8cac5015db5f14f,2025-04-15T18:39:27.967000 +CVE-2025-3522,0,1,4d74bebee3d64f8b26210f75657cd27f7983066a883fef60dfd5658fa61355e5,2025-04-15T19:16:08.057000 +CVE-2025-3523,0,1,f129b450989c4043646f52e61345eff3b7379ad31df6485d92d4775f66efdef9,2025-04-15T18:39:27.967000 CVE-2025-3527,0,0,05deae287ffcef21351ef18cde41e4a9979d8d697532bc7167589a17ec18c6ee,2025-06-04T20:10:33.153000 CVE-2025-3528,0,0,7fc06d9e22fe034153acc196e6a094bc79ea372e7575b66f5507d6771a68b368,2025-05-12T17:32:32.760000 CVE-2025-3529,0,0,6644439b76d19892b1d8bc457a3082e6b3f827c749b34bc0f6fc88082e3eb922,2025-04-23T14:08:13.383000 @@ -293184,7 +293184,7 @@ CVE-2025-3607,0,0,00a61937e6c72150e849325aa06a18ed35736c13546aa89382694e35fbdc72 CVE-2025-3608,0,0,9a5b2a685e23ed54a5b4d9074656a8f2a2ccacace07a3f4ed149936d1bf208f0,2025-05-21T19:48:33.080000 CVE-2025-3609,0,0,70aca4a435588edac6811092b960a9852b2ca7d0874089032dd75bd132c774d9,2025-05-07T14:13:35.980000 CVE-2025-3610,0,0,61c3f9e10cb5c67e4aacd07ec451ffafa8175978740a3ca7853e9c21ac959413,2025-05-07T14:13:35.980000 -CVE-2025-3611,0,0,cb73df36c1bb455091c18f9a0644ce89f8bee788f5f0e59e6bc8700f52ffb9d3,2025-05-30T16:31:03.107000 +CVE-2025-3611,0,1,092fa987fc0f735dc95f8c1eacacb942e9345b7adb8645715f7bce67e4a5378d,2025-05-30T16:31:03.107000 CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000 CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000 CVE-2025-3615,0,0,8fdf4606cb6a0284ee0e09827c413ea146851550983dc6357a6b31a17ed36258,2025-04-17T20:21:48.243000 @@ -293225,7 +293225,7 @@ CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1 CVE-2025-36558,0,0,f7ba1efb73da33ba35418104474d3de926b1549af2f93d6130fc139c04b0fc60,2025-05-02T13:52:51.693000 CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf79d8,2025-05-19T13:35:20.460000 CVE-2025-36564,0,0,f446e566baff1cdb9604912d945d5cdc052f4905557c8c5952132ba86a364f20,2025-06-04T14:54:33.783000 -CVE-2025-36572,0,0,058b67de5ee82f1e6220c3754353a9e125a12fbf0176dd2f3a1d9ddfb79707a8,2025-05-29T14:29:50.247000 +CVE-2025-36572,0,1,ffb00d81ec666342944e749ef07f48bce94089e948388a389f040a9b964f243e,2025-05-29T14:29:50.247000 CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000 CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000 CVE-2025-3662,0,0,3e1dd0745f4aafb27713ee2b3d9daccf1be19770e4b95d3787e2f2ca8d2c3c07,2025-06-05T14:09:58.017000 @@ -293268,15 +293268,15 @@ CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06 CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493c7,2025-05-07T16:50:44.930000 CVE-2025-37087,0,0,20c409449e046fc0b07333a7d65b24c67907255590b88923cb6e09a524d20ee6,2025-05-01T22:15:17.647000 CVE-2025-37088,0,0,64ae2a894e2b0014068f1cc908ac2a8b164865977a9c111fb0dac895c15630cc,2025-04-25T15:15:36.593000 -CVE-2025-37089,0,0,e43cdb1916779df205f9b6045a0a9d8f69b73a7919066688fdcc041dafcd5eea,2025-06-02T17:32:17.397000 +CVE-2025-37089,0,1,638bfac43a2d23428910cf08aca2b6606ecf6c46bc23fb9478c11807e73919b7,2025-06-02T17:32:17.397000 CVE-2025-3709,0,0,bd15d31f777243540548b544e8985e8a31e62890f7bf4ae13fef85062e09984a,2025-05-07T16:50:52.680000 -CVE-2025-37090,0,0,89b675d5faf491bd0a4ee66de0d96a6eace8f09fd99a232375b82a956617f867,2025-06-02T17:32:17.397000 -CVE-2025-37091,0,0,56b8ef2226e84ccab5cfbd63bd01ca4162b7785b5812b9132061cfe5f83829c6,2025-06-02T17:32:17.397000 -CVE-2025-37092,0,0,361fd5c637ac000cdd66be3e8d8b1e56074f6fcbf1da401a27b55d7c0e524709,2025-06-02T17:32:17.397000 -CVE-2025-37093,0,0,c3d5c7c966c70944599fbadcb10e83d0e6e0fbfdb7b679b836fc1dbb85f30a89,2025-06-02T17:32:17.397000 -CVE-2025-37094,0,0,d211f8e76e9a0910cda48e267f06775a152178ec7807bb7133f2d6641136f31d,2025-06-02T17:32:17.397000 -CVE-2025-37095,0,0,e3e206bb3690a59118243da95ae7094459b710ea8b658befd0d5d26476e8a831,2025-06-02T17:32:17.397000 -CVE-2025-37096,0,0,a8692ccb035adaec3fb15a75bca6adae7cc507736d472c3c2ee815c51d98bbe4,2025-06-02T17:32:17.397000 +CVE-2025-37090,0,1,e377e11b8312e41fb8343e5c4862ae1bc33831abc454bd666bd5dffdd89cc347,2025-06-02T17:32:17.397000 +CVE-2025-37091,0,1,86a2a75b1cd983461b55ca757f5ab196729bfd2631a8713c03063be3e2485fb1,2025-06-02T17:32:17.397000 +CVE-2025-37092,0,1,6ef3de8151f2c9a35f6b680bd1c67aa64aee82028c31cf4af2c5c5212c1d61fd,2025-06-02T17:32:17.397000 +CVE-2025-37093,0,1,04439990dea4b23b12c5a8e578acef87859a5a98e35af9771ebed8787b33b59d,2025-06-02T17:32:17.397000 +CVE-2025-37094,0,1,80139cc2d7d5befc05f51667ec682f5c962f80ed8c480fa2b154914d7c800401,2025-06-02T17:32:17.397000 +CVE-2025-37095,0,1,548306b50795731dc5b60cc61287457cda97af8c1838c1288092ea043e39871d,2025-06-02T17:32:17.397000 +CVE-2025-37096,0,1,78aa33aa6c14b79fab9fdbbfe82eac38fd3ab2a2406b66867916373e1f7d70de,2025-06-02T17:32:17.397000 CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000 CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000 CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000 @@ -293319,7 +293319,7 @@ CVE-2025-3764,0,0,f95da3f044ab15fb7b854f79f9c9ea7fc44657ee3365a10d562886a5328ef8 CVE-2025-3765,0,0,f46bfe30f7ea5174f5ef5b6ea1e7c303a0041334a7cab070133d8e9b9af73d2b,2025-05-14T21:00:34.450000 CVE-2025-3766,0,0,4ab1f8c3347dd4d857f6ed47618688e65322f18fd502bb56163206717ca51aef,2025-05-07T14:13:20.483000 CVE-2025-3767,0,0,292444054f64728a26421e1d4abd19f40fd20bae5ef25e71c0fda7db865359ae,2025-04-23T14:08:13.383000 -CVE-2025-3768,0,0,79a3fa3ec8980844808f0ae7ff83b403a18ece173cfb7abb4495f61cb2331fcb,2025-06-05T20:12:23.777000 +CVE-2025-3768,0,1,bc353dd6d519bf091c1975f4b269d3c3a4ac208a15aea53b50d1ffe54ed1e121,2025-06-05T20:12:23.777000 CVE-2025-3769,0,0,3f7372036ea22709a172464e7fa400f2a2b90380b5ac20ab94f3bbb2664582da,2025-05-16T14:43:56.797000 CVE-2025-37730,0,0,67e6e3825da3f11311501c243f4ff0e5cfb6a91fd935a3fdef62ae25a64429d2,2025-05-07T14:13:20.483000 CVE-2025-37738,0,0,ba1e253afea970e2d6cbcac0df377f410e996b34b809210266fb935a59d8f3ae,2025-05-02T13:53:20.943000 @@ -293623,7 +293623,7 @@ CVE-2025-3810,0,0,969f6ac87070c4164f54ddbb008c2e0ea10a92995f12f2bba35fa71773ee21 CVE-2025-38104,0,0,95fa066b9b297f0f71658bda9667ee4683e7719a8295e0ac6102597f6b2d67e5,2025-04-21T14:23:45.950000 CVE-2025-3811,0,0,d8e5c197c987fa9a87399054dc44bee083db8a738da2ad57d0bfbdc6a9a31512,2025-05-21T14:08:03.370000 CVE-2025-3812,0,0,0f66093f84eb06bf3e1833106e7d524992fb03c23cda567c6a3d9deec629a713,2025-05-19T13:35:20.460000 -CVE-2025-3813,0,0,eb1f1217285a1770aec62d074588f730af57b432476b6d0a241c6de22a664e0f,2025-06-02T17:32:17.397000 +CVE-2025-3813,0,1,2f034211403c409cde138743e01d616b9e22ce2520c6c56d6e239cc129f30c6d,2025-06-02T17:32:17.397000 CVE-2025-3814,0,0,11c279efbeec4fa23a54b22cf013841136b5f0f0ea6d94e898bb584de2240f97,2025-04-23T14:08:13.383000 CVE-2025-3815,0,0,e6d6eafdf99072b79b824cef8fe42ba5009e89200a72e7566988b88e2d1ef899,2025-05-05T20:54:19.760000 CVE-2025-38152,0,0,6554c7473f6b6179493ded078859c0bfbf9661e041b4dcbfff31e86520619528,2025-04-29T14:39:46.800000 @@ -293685,7 +293685,7 @@ CVE-2025-3874,0,0,48404b5920dfb8e9d0e9a6f6c853dfae3dfd8be20985f098e8a46e30a37014 CVE-2025-3875,0,0,1b7ebae355c4f48c8dddf4fcdd6fc15c745cdda51dd1f8022d95692c7a83a312,2025-06-05T14:27:05.837000 CVE-2025-3876,0,0,98fa4965cd0fb5896f08763a0582c93ea252014e67d6fd79d41bdf5071b00a40,2025-05-21T13:35:09.450000 CVE-2025-3877,0,0,171808fa8225deb7d71109a8aae6e5d930f890ae885f799a5dc3c8c157cdf177,2025-06-05T14:26:54.100000 -CVE-2025-3878,0,0,5d0ea49e265f118a3a830204c906368e4ab75640c7d76d121d2e4f7feb7a8abf,2025-05-21T13:36:16.070000 +CVE-2025-3878,0,1,6edc0413060b870ca8db342e4d416bc7330af04d97c4384be96b3d4817bff1e1,2025-05-21T13:36:16.070000 CVE-2025-3879,0,0,d832e10f3f5a35fa6f778cb83701763ba1ca0a6464dece4429751c1aa0bef5fb,2025-05-05T20:54:19.760000 CVE-2025-3881,0,0,24b54933e846a45dd97d5a9a438a485d3ead998ef41689a70b444bb5ab176e29,2025-05-23T15:55:02.040000 CVE-2025-3882,0,0,c9ae33678e4df5b1046892b754c3ed5475864c05c1f0abd762dbc5e3ccf7733b,2025-05-23T15:55:02.040000 @@ -293883,7 +293883,7 @@ CVE-2025-39505,0,0,0677fac6beec77521e6cb7a2462dcfabf24b73771e71144370fe1fac1a5cd CVE-2025-39506,0,0,c041a0372538698a8f9d605ef133903ae98a32f47f46be4c5902cd3007028990,2025-05-23T15:54:42.643000 CVE-2025-39507,0,0,f4092fa6938581d2fec34f603e8d9da1ff63ce2168f9d8d79950973af21fb914,2025-06-06T22:09:50.510000 CVE-2025-39509,0,0,4cda2ae66fff6b98719931220bbe9865bb1af095a0727aa2e0da55520a402d90,2025-06-06T22:17:25.023000 -CVE-2025-3951,0,0,b819f4a743182055b64efa38e516552bfed579e15e32ded33254ce84d5404e6c,2025-06-02T17:32:17.397000 +CVE-2025-3951,0,1,36416bd499c83ab98a1ff980cb0e0a290e3050534d2b29bb63320e3de78aaf35,2025-06-02T17:32:17.397000 CVE-2025-39511,0,0,a36b3376d554b5146c42c1b1398688f2aa1974a059829a1cc40eb1eaa00a9ff1,2025-05-19T13:35:50.497000 CVE-2025-39512,0,0,126985d0ea09fa4c3bb0f5148fddbfff2eeceb61c37d743a298410e0bf5c015f,2025-04-16T13:25:37.340000 CVE-2025-39513,0,0,1ce19e3c2a9b234563847c1f7c6fcae3a029b809bb52b6108c9c455bb7201527,2025-04-16T13:25:37.340000 @@ -294036,7 +294036,7 @@ CVE-2025-4006,0,0,b4863f9bca9c45c782eac4e0a8df6c153136ca75006dde5bfd67dbac13da0e CVE-2025-4007,0,0,9777df4491741671ed8bb32daaef6bd13e88a3bc80a38f81c67c7e3aae15aace,2025-04-29T13:52:10.697000 CVE-2025-4008,0,0,f0130f878a53471d3fb1549dc09ccb4cbdfcbe18d257d761f05f6b646d258a62,2025-05-23T08:15:18.633000 CVE-2025-4009,0,0,0370307f1749db0bcf82f9fb8d3b9e4085526846709cddc4bd8a8d824343e156,2025-05-28T15:01:30.720000 -CVE-2025-4010,0,0,28d3e458f4d2c7a1170ed6d6247c260940bcbfd3cfcefd229c0c96853390f654,2025-06-02T17:32:17.397000 +CVE-2025-4010,0,1,354d0c0d927aecaa5b334414d4e1b159e202f366441ce232ffd55df74e26ab53,2025-06-02T17:32:17.397000 CVE-2025-4011,0,0,3819550e074b2f97f25ec51252193290e9c87c0a28a7aedb206338328c0e7b76,2025-04-29T13:52:10.697000 CVE-2025-40114,0,0,18b151536edb74ce6ae0abb057cdaf2f657d28b31cc048efaafef211823a9957,2025-04-29T13:46:29.167000 CVE-2025-4012,0,0,36dc3f78b0e7e3ac1f05487215ef307e4a3550924eb6d25961b0b1557c98be91,2025-05-12T19:30:30.873000 @@ -294166,7 +294166,7 @@ CVE-2025-4089,0,0,505a4df56497bc3e08f2e58439684c838786761a96bd4da3f2b0e37b4fa97e CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b02,2025-05-09T19:32:34.333000 CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000 CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000 -CVE-2025-40908,0,0,722712dc5b770bb0a13e0d20171378b8e4b0cbd179a3c72e1857a82c7cd5d920,2025-06-02T17:32:17.397000 +CVE-2025-40908,0,1,91c9c68cf03ca27da56ba2aec4b379519e7063cfa4c8bc0832dfb5079fdf60af,2025-06-02T17:32:17.397000 CVE-2025-40909,0,0,0168f158a69247acbaffa8dbdbed8b439b77a336030b06418e5511e5db476ff8,2025-06-03T04:15:40.470000 CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000 CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000 @@ -294179,7 +294179,7 @@ CVE-2025-4098,0,0,c3d876ba0075045c7b4d4f0cde2463861d6f50b3f862fa37275045a58fd42c CVE-2025-4099,0,0,c24d719d1b6efaf6dca2a20eacc9c261b731d2019f4de35e18539c4a75aa9e38,2025-05-19T11:49:08.097000 CVE-2025-4100,0,0,f77bad4e79dd995e69fb9df2c2feed5b3f15d25f3ec0714aaa9ab5523a58223e,2025-05-02T13:53:40.163000 CVE-2025-4101,0,0,481e3ee81d9ced511d86706ddbf21e16ba7244b1e206df435d80c8013121d01e,2025-05-28T13:28:20.060000 -CVE-2025-4103,0,0,ca5054811a888910374a537d9fdaa5ee89d46bfad44936ce47b1bf266f61b8d0,2025-06-02T17:32:17.397000 +CVE-2025-4103,0,1,95ffd1bbbd8b91948da068554f13130bbdb49af71cd7a23c1f27918b987446dc,2025-06-02T17:32:17.397000 CVE-2025-4104,0,0,9db1e5ec3f96560cc3897212bafef6028f8660c26f74adb7629202cb67ed1418,2025-05-07T14:13:20.483000 CVE-2025-4105,0,0,d83c883af821015dcb99b208032280c6927f7d2df054e268c6ed4d5c2ae83140,2025-05-21T20:24:58.133000 CVE-2025-4107,0,0,80bb7abdec5d37800b07ca68e7dfa10215abe5d87f8e994a47512d482e70dee5,2025-05-08T23:15:53.240000 @@ -294345,7 +294345,7 @@ CVE-2025-4242,0,0,b7390834d2d6a660bc9eb9cd681eaaf1004243b0d7d83e53c443fc539cd59f CVE-2025-4243,0,0,09ec6ace36d89e531c0124d082fffa25eb15f64acf38cbf58cbab065c979df8b,2025-05-16T17:31:19.657000 CVE-2025-4244,0,0,c973734b7f4fd5ba1d04cad1731420cafa9fb0cba7ec4d750d96a4e3409602b9,2025-05-16T18:09:12.207000 CVE-2025-4247,0,0,ac1b6ed746894458b387b662de0819d52d4b234d3ad6bb507c62b4179bb07915,2025-05-13T15:06:12.813000 -CVE-2025-4248,0,0,3fbf587f4fa500814f89aabfa31e33e52267e7d1bbee0e2d23272e2538c94c65,2025-05-13T15:06:14.810000 +CVE-2025-4248,0,1,4bf53f30bbda3c8124ab4195a54dac60b40045fa8eccc86850af4e2f7dda3529,2025-05-13T15:06:14.810000 CVE-2025-4249,0,0,cfdb5b56b1013ba041045ed53dacc52fc7c686095937112f44ae83fb2cacf82e,2025-05-07T16:32:37.720000 CVE-2025-4250,0,0,f3c424933497a6ad5b2ff7f5271afefba79b5bf78eeac51c7458374e157d56a9,2025-05-28T15:54:58.937000 CVE-2025-4251,0,0,22d59e4cc65feaa1b96e07541615e247a3d83457965b7d0ac309ca75b24ba6ef,2025-05-16T17:41:34.023000 @@ -294353,7 +294353,7 @@ CVE-2025-4252,0,0,6c4333341898b97b53b2eb28528f90a939709d6737fb212b532254dbc1b3fe CVE-2025-4253,0,0,0fead3b30aab8de4b29f10cb7499493086864bf73d04bc3106a2a796ff95cd4e,2025-05-16T17:42:30.067000 CVE-2025-4254,0,0,cfb4635f5e188b217d4816390712837ef409bee25d92e13903d8e896d7e5b914,2025-05-16T17:42:49.653000 CVE-2025-4255,0,0,20a5b55493d4a4c3e7459adfc9eeb0556fb1182f1bda992b4b64459878feff5d,2025-05-16T17:43:08.997000 -CVE-2025-4256,0,0,ff41dd59b60bfacb8351499d595556128060c8e4da11c4021efa6e877d51478b,2025-05-05T20:54:19.760000 +CVE-2025-4256,0,1,2d60a3dbf2e4e8a544b2c6684d801e42a43c61b063a0557f364816b38cfd0683,2025-05-05T20:54:19.760000 CVE-2025-4257,0,0,ca1eeaed71bd944e5e3f6240684101c830f646d300a64c7a94f5dd1df1554dd2,2025-05-05T20:54:19.760000 CVE-2025-4258,0,0,796ce2adcc4d180e362e2a202a13a4dd18c262fbe611e96372c314a17120612f,2025-05-05T20:54:19.760000 CVE-2025-4259,0,0,6a1459a33b8e0aca76b75ac4e5c9a7a2f1e4c994986e9f8a451f9b8990219b25,2025-05-05T20:54:19.760000 @@ -294573,8 +294573,8 @@ CVE-2025-4392,0,0,ad8765de95d96f5f3ecd2241de3d94570cd4dddcf644fe825479abad5b84f4 CVE-2025-43920,0,0,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 CVE-2025-43921,0,0,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 -CVE-2025-43923,0,0,e89760c21a9f5ecd72a7ea5097849e1e1cd56bda40a4d1dd573cadf9a762e101,2025-06-04T21:15:39.053000 -CVE-2025-43924,0,0,a9e4538916cdaf1749178e2263ea9c13c09408ad199369b7bc081ffced41273a,2025-06-04T21:15:39.213000 +CVE-2025-43923,0,1,566f147696157eaa8c17904e24f0edd7666ecc568948d68a18caff49f62e97fd,2025-06-04T21:15:39.053000 +CVE-2025-43924,0,1,8dd46f150f4ca082eff2d2aa1425c79ca1c4ab1917d889f0fe467b04b2433f5c,2025-06-04T21:15:39.213000 CVE-2025-43925,0,0,cb6260eff16c989f0f3892d6f36d7e2887b1529655ecf02afa4a17366917c277,2025-06-04T14:54:33.783000 CVE-2025-43926,0,0,2f3d1ec98578fa56e3654b3927ae44c5545787a634e6f39282c1fc647bb3404c,2025-05-12T19:15:49.287000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 @@ -294606,21 +294606,21 @@ CVE-2025-44023,0,0,dd8462de68aec0eefae4f74877d4a0096c0b0b7c788a64dabe51a09973639 CVE-2025-44024,0,0,9a6e90ca8c9fd22a614240a93227346aae4f630541c9ceee0dede71783be3310,2025-05-16T14:43:26.160000 CVE-2025-4403,0,0,a597524215bcc55cf95efb619760b46f4cfae80b1fccf565ab77d2156ec46259,2025-05-12T17:32:32.760000 CVE-2025-44039,0,0,e526d2ea964b8df9e1d271dd8836298e821a1312ecb07527aee6d82ed8db4da5,2025-05-13T19:35:18.080000 -CVE-2025-44040,0,0,cdd0c25422b1d46518651fa52e21aab75d9031ae7c582251a1c2ddc61f0d3571,2025-05-23T15:55:02.040000 +CVE-2025-44040,0,1,077e2736578228f8d9129a0307a7ea1d76372d9810860dfb02a889576bfb682e,2025-05-23T15:55:02.040000 CVE-2025-4405,0,0,a4c8d39da5071a2f65ae4b241bc012dd3778a87eb537de1f84f3ff1327d39e13,2025-05-23T15:55:02.040000 CVE-2025-44071,0,0,2772db9d2d7dc3a2f1886d3495d15be2a65239054354b12c18090ea5927d54cb,2025-05-13T20:03:39.143000 CVE-2025-44072,0,0,66cb314272334a06d99ce1609f65344916890c52ec9c458ff627cd7071565ba0,2025-05-13T20:05:16.493000 -CVE-2025-44073,0,0,bbfcd71568565582165c8104d1cd8b3658d2eb1d27beb6ace6f7708030ebca5f,2025-05-07T14:15:44.040000 +CVE-2025-44073,0,1,20fb7eba8d50558a64d1d4ccbb6b5f4e64598faf9786a1c1462a24e4ca1cd318,2025-05-07T14:15:44.040000 CVE-2025-44074,0,0,a07abf1517695aa7f067711dbd8501cec1c1dac19368b70ce83f8cc0a4c96967,2025-05-13T20:05:29.563000 CVE-2025-44083,0,0,9046793f34bd6f929b6235055941a80a823b0cd56db66235de77c34aa9f0f37d,2025-06-03T13:52:39.333000 CVE-2025-44084,0,0,9e514baa1a1b4ecd455bdc468a519f4662e489440f358688b169a12eb8124052,2025-05-30T16:19:21.193000 CVE-2025-44108,0,0,e6c69187ec79a73187c11fc6f0b558211f29323e42fdaf803e3406ad9e85069c,2025-05-21T20:25:33.823000 CVE-2025-44110,0,0,5163d7a49439bc569f2ec884f7cd894f40697aa11ba471170347f7df11cdac30,2025-05-16T14:43:26.160000 -CVE-2025-44115,0,0,e194432c2a2036df7d0b31d6e2d69e2975f046b3a7abf8ba3214d5e1e234d751,2025-06-02T20:15:22.637000 +CVE-2025-44115,0,1,d990fe7228f0dbe35841148aa572f913a3a82f4880f65057c40ef3edd4ebd7bc,2025-06-02T20:15:22.637000 CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc19,2025-05-28T15:01:30.720000 CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000 CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000 -CVE-2025-44148,0,0,1651fccdbd5410d0e5da65453bd38e6424c23df6ed296570ac340e2703b11b24,2025-06-04T14:54:33.783000 +CVE-2025-44148,0,1,306118ea38f3901cf74aeb0347a966df9a49b32cede3062c08c6588f9c021fa6,2025-06-04T14:54:33.783000 CVE-2025-4415,0,0,842147d08c13efcbee3eee94c9e6b73fdc7bd886265d0112fafca4c76640377e,2025-05-21T20:24:58.133000 CVE-2025-4416,0,0,947e34b55b1f3a049a504a042d77855f4bb594e5af127c8b711744c73ee871aa,2025-05-21T20:24:58.133000 CVE-2025-44172,0,0,c78f9d9932a5093f6fd2dd92edb0ece1c73f28734d84b3772f8246b249ade2e9,2025-06-03T15:55:33.757000 @@ -294643,8 +294643,8 @@ CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3 CVE-2025-4429,0,0,fe6071399e142802408b914c5bdedf40a11e5b9791557c888b05a6344723a056,2025-05-30T16:31:03.107000 CVE-2025-4430,0,0,9407bbff74dafc85b3536cdd9f5ebdd9f076e8c0d07f50c61a7b35510b1eb336,2025-05-16T14:43:56.797000 CVE-2025-4431,0,0,df058055165be1cbed29e10a43df8c3ffd6ce5023ec34c41d62d199b503e8515,2025-06-04T18:30:52.393000 -CVE-2025-4432,0,0,813cec0cb180e837181e2d39de9b9b934de385ad08a799d2cf0711f93bd8b820,2025-05-12T17:32:32.760000 -CVE-2025-4433,0,0,21bfa3b45038dc83bff46fd300c483ce25e6e5c5938f9f5483c2a41e15b72262,2025-05-30T16:31:03.107000 +CVE-2025-4432,0,1,91fc783aa25b3af836fdeadaa66e64cb4be058ce85149717eb1a298b9e966f19,2025-05-12T17:32:32.760000 +CVE-2025-4433,0,1,f1ddf7e1aa23391858b104a2caa0ba8a8043bf7a5adfee3c71eee7d58ffe19ef,2025-05-30T16:31:03.107000 CVE-2025-4434,0,0,680d6f1c8416e0c44eb562c208640fb3f26973e13f6fa443eed77fbf8e133505,2025-05-30T21:15:20.920000 CVE-2025-4435,0,0,330345f9ef9ca0539c81f86c17ed81e88f80e212a120bfee9f50aae80581e9f5,2025-06-04T14:54:33.783000 CVE-2025-4436,0,0,85a8f0318ccedc4ef4ef6314b458049fc833acf857a8e235d2ecff13798cf4d4,2025-05-20T23:15:19.440000 @@ -294794,10 +294794,10 @@ CVE-2025-4517,0,0,8f51c46af888510dd73bb462bbca2c104af9d3c9f1d6809b8679167122b8ad CVE-2025-4520,0,0,2649cd1b163a0622d5bf29e4b3dee5950ca643285f952a7b68fc954427092ffd,2025-05-16T14:43:56.797000 CVE-2025-45236,0,0,4ca5831e33dd66784c123f97c0a9d8265ca1feabbffaf4dc2d39d3c2f66d4ff5,2025-05-06T04:16:13.253000 CVE-2025-45237,0,0,414c6d4926aa8e975f1ceb6a1391c6c89ae9a0f19f49206e4657b3ab23d52111,2025-05-06T04:16:14.413000 -CVE-2025-45238,0,0,a6f473d2bd6d6f6e07ce82d8d58a5df97305f0e54ddef68ecc758cad7fac1452,2025-05-06T14:15:37.490000 -CVE-2025-45239,0,0,438ea4470bca4ade7e14a70b53543f4fbc61ad19aa95dd198e606d85a136745c,2025-05-13T20:15:29.720000 +CVE-2025-45238,0,1,3b5a920ed170e00909b45a313613cc0b5c34193e2bc32f7863accc883106bd69,2025-05-06T14:15:37.490000 +CVE-2025-45239,0,1,c7a0aa7996f3fddecbeb7de8a69f8f4a812f6c1900d74c7b61b81230e324b747,2025-05-13T20:15:29.720000 CVE-2025-4524,0,0,9f2ebfa9f8ca01d98c78b645fd8edee7f81ea49ceedcaa7d6aa7658167675b4b,2025-05-21T20:24:58.133000 -CVE-2025-45240,0,0,b3fa4732cd3fe0410ba0cb0ea322edc8d17fe51adae8c6c59441a10d82835964,2025-05-05T20:54:19.760000 +CVE-2025-45240,0,1,fabd386692d37369af580e9a07739c513130c7325a7d379c1b1f1a13e1454798,2025-05-05T20:54:19.760000 CVE-2025-45242,0,0,36f934926e07ba7e9332b5541f124f03a9edff59fec5fdafed956a62eb096932,2025-05-05T20:54:19.760000 CVE-2025-4525,0,0,e5068efff3345b6299bf1d3b4c556a2d330551e5529391b80301dc64e770c372,2025-05-12T17:32:32.760000 CVE-2025-45250,0,0,1295737dd945a4b775ec304e443102ab54877a6f262027aa1c35545a3ea136c4,2025-05-07T14:13:20.483000 @@ -294876,15 +294876,15 @@ CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51 CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000 CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000 CVE-2025-4567,0,0,a5c879fa190e64c457804cb929009e4d3ed79771da2179c3388d5be1060c5622,2025-06-05T14:09:17.020000 -CVE-2025-4568,0,0,bac6044568c4b9e457ec316381994211b3bb7689f41ca3abde0417c0f0e14ba9,2025-06-05T20:12:23.777000 +CVE-2025-4568,0,1,a7dc4015dc0dc8a1d051ca0a0c8659f2aa00a001767db9893b5b3f88ebbd1af5,2025-06-05T20:12:23.777000 CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcfb5,2025-05-16T14:43:56.797000 CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000 CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000 CVE-2025-45751,0,0,de89d7eb563ced8140d03e3271409a0c1ca243ce5972ff6bb5c7d466a89cb054,2025-05-07T19:16:08.903000 -CVE-2025-45752,0,0,55036db7757f0d3bccee41c41895f0c20d557b7d822b5dbfe63a17720a776600,2025-05-22T19:15:51.100000 -CVE-2025-45753,0,0,bd8859423a7b6be70ae6e0c0e7986212e85d9a790b182801d5c120cdc8ff4c81,2025-05-23T15:55:02.040000 +CVE-2025-45752,0,1,bb720a75a25153c4b67014caa45a3f9b58d2b0bec0c849f14f25b8ea2041a38a,2025-05-22T19:15:51.100000 +CVE-2025-45753,0,1,214d28714b713bde0d2189fb494c4cf3b7e4c41bc036574809186d613ce4c8d3,2025-05-23T15:55:02.040000 CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000 -CVE-2025-45755,0,0,3aff4885389fbce13fd812aa87a221389577cfe9b3d3275c80864cb5a5e7a902,2025-05-21T20:24:58.133000 +CVE-2025-45755,0,1,caf4a0a5971f4cf5680b0cad2b710bbea10da89f97ba8578c52219a358cfcd66,2025-05-21T20:24:58.133000 CVE-2025-45779,0,0,c093a7d91bfb997294cab32f2ebe8a712075ae66c80f7c18bdd9520e3509f542,2025-05-12T22:15:26.173000 CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000 CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000 @@ -294908,7 +294908,7 @@ CVE-2025-45844,0,0,170e4458f6e69c5733a6ca0576787120453cf06374da04006dfb1f43b2021 CVE-2025-45845,0,0,93cb9b992f3083f016f98f51918ecbc05e2ba26a62766c25f0e76aaacb981d93,2025-05-16T15:39:26.913000 CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b231,2025-06-02T17:27:55.547000 CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000 -CVE-2025-45854,0,0,ca7a3534daf825607fd5c0281c7ca129af19550635f92029e41c985cdddbb8dd,2025-06-04T14:54:33.783000 +CVE-2025-45854,0,1,a38ae56562082ad432e76747673dcce48b8008930a895666177a8e596485ebb6,2025-06-04T14:54:33.783000 CVE-2025-45855,0,0,93e6e50c29da0330b6825dbc4712cfa68cc989f69981bc9eb7685e5938173fae,2025-06-04T14:54:33.783000 CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000 CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000 @@ -294923,29 +294923,29 @@ CVE-2025-45867,0,0,d8bbcd355b169e35d17636246ef9f1637f574a9a708b290a10b8a9fd3f79f CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000 CVE-2025-45887,0,0,f2287740c795312103be3d275e66c0387a51f112072d92f244b8924b02ff24fa,2025-05-12T23:15:25.043000 CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000 -CVE-2025-4590,0,0,da4a451701d6de561e1d5ce1ed113156f6b2748ef61020e31c9a58a6753b9483,2025-06-02T17:32:17.397000 +CVE-2025-4590,0,1,1338bc68ec3d6917d4ad238b5739bcbca3832b2475d3a347918656638fb549e4,2025-06-02T17:32:17.397000 CVE-2025-4591,0,0,09b633064167908f2267d3dc13a3052b782cbd19249bba4734b3313b4950008b,2025-05-16T14:43:26.160000 CVE-2025-4594,0,0,c0d148a004f59cf53abe31af001741cb43bc8a881d1fbd6674a881b7467848f2,2025-05-23T15:54:42.643000 CVE-2025-45947,0,0,359c9dbf14e503988017d67aa788a499a7ac3bca9ffc4dc379e7011548317f85,2025-04-30T18:59:47.113000 CVE-2025-45949,0,0,2cec517c1301a76b89b8ccefb135dc95210f8464628904a6679478252432eda9,2025-04-30T18:03:41.357000 -CVE-2025-4595,0,0,8c9eae3fccd68f9f83bf2fd987d9af2bca72931783e3baab23483f1a584b3582,2025-06-02T17:32:17.397000 +CVE-2025-4595,0,1,b633bebf29fd7263830d6a88461b75ee36ce76da82f38ab627b05d152a8f57c5,2025-06-02T17:32:17.397000 CVE-2025-45953,0,0,4ae22ace1fa79622bebb714ee3a1b2bc44139600b15fc188f0269a639daf29ec,2025-04-30T18:03:25.497000 CVE-2025-45956,0,0,5c4c4370cebea5362e52ff80785ad75271a9ace1cfcc698a1fc7b6e2a3193f1f,2025-05-14T21:01:22.690000 -CVE-2025-4597,0,0,187dad561f92b725f4e94f11621cd8f7fb4eea5ade3c9c9e2bde9c8ced3f4e7e,2025-05-30T16:31:03.107000 +CVE-2025-4597,0,1,dcada8bd747b5d8fe51a3029b8ca767324f59d50104363211751e3771511674b,2025-05-30T16:31:03.107000 CVE-2025-4598,0,0,0afb48f5d4beb8ba717edab0a2c1dbaaa02bcad15f4563ef46c0692744ec8051,2025-06-05T07:15:23.047000 -CVE-2025-45997,0,0,f11c8f31166b54035e7fdaa05978523638c1ab90c8a70d2cb9a802aeed8dc136,2025-05-28T15:15:24.900000 +CVE-2025-45997,0,1,1bf67bd9bd35437547dd366f47ff27718e895950edc0e6c1f69586dcedf42b57,2025-05-28T15:15:24.900000 CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000 CVE-2025-46011,0,0,f1711dd7ab66f4f734746526ee0ca6c2ae09b8382d5cbdd02ec8fdea852911f2,2025-06-05T20:12:23.777000 CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000 CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000 CVE-2025-46052,0,0,ab7d3250787ede688cd6b355d8aec0cc3dda171eb18d9b03fdd032c02ce8c40d,2025-05-16T14:43:26.160000 CVE-2025-46053,0,0,a812a9fd2122f294cfbb7de5fd43b870987b1f7127ab686b037255809ebad4e4,2025-05-19T19:15:51.580000 -CVE-2025-4607,0,0,c18f4646dc5188542cefc222a6954e2242be5e37c4bf6ce32f9189081f0aa3df,2025-06-02T17:32:17.397000 +CVE-2025-4607,0,1,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000 CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000 CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 -CVE-2025-46154,0,0,cc2c84cb6e7f168c6e95a099aa414c9be2907f723633807dee885847f32ca0d9,2025-06-04T14:54:33.783000 +CVE-2025-46154,0,1,2149989f0e30a90b9e4bab390ea1601d30319c89b3c6960725a973f2b454fc27,2025-06-04T14:54:33.783000 CVE-2025-46173,0,0,f1e36ec33a02fee01307659dfca8b67a706a6ca070153a7459464089a027cd3e,2025-05-28T15:01:30.720000 CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000 CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000 @@ -294995,8 +294995,8 @@ CVE-2025-46251,0,0,d17dbf4e8e21c626e2d5432aff3bc0ed6b69b0ab0b53ad1b17cc7c8b8336e CVE-2025-46252,0,0,c50b6d0ac2ae9d7ce943a5ed8ef2fd6da152fdf4666412ab5a89649c7df0b743,2025-04-30T15:10:04.440000 CVE-2025-46253,0,0,b25f3cee4a5e94813fb7283f6e435befe966b21315e8df614c830de7a55808b6,2025-04-30T15:08:45.127000 CVE-2025-46254,0,0,5e703cc2f27dee605c5157342c085d9f1bee15259d5841a98b801a9b78337a6f,2025-04-30T14:59:42.390000 -CVE-2025-46257,0,0,0b1eea60b94cdb0c95c3e319d94375e833d8f7e7ccef865ebf6cb0e8a684ecf0,2025-06-05T20:12:23.777000 -CVE-2025-46258,0,0,bdf97d51b49cbd52f67921bacb88f8a5d3e2d968527060283e15e7debe604e5d,2025-06-05T20:12:23.777000 +CVE-2025-46257,0,1,102a2bce34ccefb008234ba4c3190038bdc8bdd330652d74979f44140909868c,2025-06-05T20:12:23.777000 +CVE-2025-46258,0,1,388cb9d09f26009208d2977b70cfa942acd81286338987f98926c7d27c7411b1,2025-06-05T20:12:23.777000 CVE-2025-46260,0,0,de05a0a1a6df47faa889a46f36513cb0a0e28fdfce45e20918b1c808a2fd7912,2025-04-29T13:52:28.490000 CVE-2025-46261,0,0,f73cf724c402394b3913a420df099a6b766492bce3124de0e7d9c6a51320fc7a,2025-04-29T13:52:28.490000 CVE-2025-46262,0,0,3a9f12ab6eb5cdcf6fa62ad6d3121c10d8abb7bcf9a3b5a5fed9a42bb0613e1c,2025-05-21T20:25:16.407000 @@ -295008,7 +295008,7 @@ CVE-2025-46272,0,0,c6ffe9644ec4eb0be70d82c185542d0db0bfea8ac65dd16a9cc6ae5530156 CVE-2025-46273,0,0,7a6c7a289211f4e1320ac7e06ac0b475968c95518e5f597fa802fe471db8a1b1,2025-04-29T13:52:28.490000 CVE-2025-46274,0,0,fc02771cda5a704b40d30849404b9e53cf758ecdd7a78de0da7004a0854086f9,2025-04-29T13:52:28.490000 CVE-2025-46275,0,0,e9c97b8dd27b620035f55476701f545428879d0dfbf3f0a6d8a46fd87fe049ea,2025-04-29T13:52:28.490000 -CVE-2025-4631,0,0,daf3afadae45e4fab08915e7e19ff82ba870d8fcd564cb47e583e31712223b1a,2025-06-02T17:32:17.397000 +CVE-2025-4631,0,1,5ea88d59c559e44bfd439c691219ceca816b06ec7da99988789f364247b523d6,2025-06-02T17:32:17.397000 CVE-2025-4632,0,0,d50832a7cf0b6c01fdcfe2e001cea8f5ff0774954824971b15716f5a8a9e67f1,2025-05-27T21:23:11.107000 CVE-2025-46326,0,0,2a53a999a336cacd0c0bc6321b3560335cc38643dddfb7113811864c643b59cc,2025-05-10T01:03:57.010000 CVE-2025-46327,0,0,afe09dee92283a2d379e1e7051eabe585acdf9c49e7e8b6e0789f6724f91cc84,2025-05-09T19:38:11.410000 @@ -295274,7 +295274,7 @@ CVE-2025-46716,0,0,fe0b7300ab0eee9b5c30a2bdc4d0a682596d3fe1d9fc6f3679e986edaddf4 CVE-2025-46717,0,0,ddfe80bec4f5063d8e4c0f121e84f8065768a8a31aad0eafc5cecc4516eff821,2025-05-12T22:15:26.957000 CVE-2025-46718,0,0,885c34e4ac34f705a4ef1825ec33431373f2ba5032bb9657c9e7312381094a9b,2025-05-12T22:15:27.057000 CVE-2025-46719,0,0,002188c02f6d49da0f27519f6b93c5cdd8e21a4c28ce5e0a20fa03a0d0ce8b05,2025-05-05T20:54:19.760000 -CVE-2025-4672,0,0,23147da9fb04ba84db4af56109f2c2d0d1dbc8d9a05206e6d5644669fbd36935,2025-06-02T17:32:17.397000 +CVE-2025-4672,0,1,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000 CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000 CVE-2025-46721,0,0,5e50b3dbcf6470803d075fa512b6ebc1828bcf6f2f10959b66c310bc472274ee,2025-05-13T20:15:30.217000 CVE-2025-46722,0,0,cf46ef2e6249b8935c48334672e28d50cf3343c6c1aff5e7300e5238080dc235,2025-05-30T16:31:03.107000 @@ -295328,8 +295328,8 @@ CVE-2025-46802,0,0,e0845e0a2badfb8351bf85ec4dfd1c99c7e29caf4bb332a81fa1375afc25e CVE-2025-46803,0,0,0a5de4a7042abfff99e6c11ab58d1e1483a67b11f4bef7e11f8857a336030c12,2025-05-28T15:01:30.720000 CVE-2025-46804,0,0,33150bb68c13eed9accf4cb312a19408b88b9f75691eb7f11163f9cad134f711,2025-05-28T15:01:30.720000 CVE-2025-46805,0,0,b1097088aa0dbd2e4b45c8b3983be6a33e94edc138942af1ff1720f9da99ad58,2025-05-28T15:01:30.720000 -CVE-2025-46806,0,0,5bb481e50421d0fe3c023b373443942fac926e23e1771bf11b924f9c3d00e5cd,2025-06-02T17:32:17.397000 -CVE-2025-46807,0,0,d745ace0f05cf44b0c09ed00dcd258091395c2c25dd435808be78a7971b3b53f,2025-06-02T17:32:17.397000 +CVE-2025-46806,0,1,a0ddbfd719345d086b34b9d7a2c69bfbfaed6eb3a3eaf75605585e97e87f5fcb,2025-06-02T17:32:17.397000 +CVE-2025-46807,0,1,363492342a9bdfb1d61e6eaa455191488139e20c169340caf4edce4ef34cbca1,2025-06-02T17:32:17.397000 CVE-2025-46812,0,0,efbba45e18cc8937b9f87a0e29f466265a1e1be9d804a38357596ef0f2987dda,2025-05-12T17:32:52.810000 CVE-2025-46813,0,0,01deee0db3f748e6f8e958a47d5a96825a2f5d578da6e58d6d8c34dd9ef7b2a5,2025-05-05T20:54:19.760000 CVE-2025-46814,0,0,a39c61eb85c9c40f8b1a1b3b957ff5b21067cc488cde122058f10a18468e916d,2025-05-07T14:13:20.483000 @@ -295350,7 +295350,7 @@ CVE-2025-46833,0,0,c80dd4df89ed1d9904a340fdabec8ad2db7d55e381346ed4e99c9bf921e12 CVE-2025-46834,0,0,eb9d8380a75c8996d4d833628ec9b8597e1a106d35c070448419534197001bee,2025-05-16T14:42:18.700000 CVE-2025-46836,0,0,634901c54fe4e9e284ebde4bed08aa69fbb4913cece33372bea06dbd6a8c3913,2025-05-31T23:15:20.400000 CVE-2025-4687,0,0,1640607bc7fe5794fbf2fa14f9879451ac745ec329229aee355cca70f8ae7d84,2025-05-29T14:29:50.247000 -CVE-2025-4691,0,0,083ed8350a09bb36584a393f0bafb56c66e0bf68ceeb64aade909a168c7898a1,2025-06-02T17:32:17.397000 +CVE-2025-4691,0,1,b02baf04a7dd36e1a54efc1a282abf13a5a0c5c5e16bda7b9e49ae577dd413d6,2025-06-02T17:32:17.397000 CVE-2025-4692,0,0,6b3541c77076c4057b96e95cd4d05354ec769644d2ab1b6cb8b6a2615ff8f8d7,2025-05-23T15:54:42.643000 CVE-2025-4695,0,0,0a0f54d4c59f025a44c7f56cf61d2ee6bfa8db27b80bd2484bf98e0dfa12f657,2025-05-30T09:15:25.950000 CVE-2025-4696,0,0,3c1d80c21a5ec0ac6ab835b04972aa87d384361ad09ac9685636f2795bbaa348,2025-06-03T13:15:20.963000 @@ -295403,7 +295403,7 @@ CVE-2025-47269,0,0,b9d52d64e2c0cec1ecdcd2f4d7408887dda629b4e369e1e7b2409608db43d CVE-2025-4727,0,0,170e11f6923ca5cbfd0f6244eaf161be67d9ce2c6a5c3f835565b0bb279da21f,2025-05-16T14:42:18.700000 CVE-2025-47270,0,0,f7de4b1bbad67df8d0ed8562ed81ad54a4a617d8e905a95b0012c5c493a9cba4,2025-05-12T17:32:32.760000 CVE-2025-47271,0,0,b4dba60dfb0342c7663df3f21e36f0d1e4cac1426ea6dff373e34c92771a1236,2025-05-12T17:32:32.760000 -CVE-2025-47272,0,0,406a3a2be3d2ae0682fbf0de910eea178b797f8669ff8c59179d2496e4cd1003,2025-06-02T17:32:17.397000 +CVE-2025-47272,0,1,1bb2a09d129fd4f2d7c6b93b95b1a828935f3db642060df71fcd1da62c721565,2025-06-02T17:32:17.397000 CVE-2025-47273,0,0,8a015bdd65fd76310e1f3acdca4cc1889577f5d468ae1e2f275ffca260b8e7ee,2025-05-28T15:15:25.080000 CVE-2025-47274,0,0,fad3fb606ae045fd813c37388dd60dff1a0ba71c69c4422b81f53361cf7f503f,2025-05-12T17:32:32.760000 CVE-2025-47275,0,0,c08b4ed4e8318278685cc65ac12c1f286376fdd04ac329814f0f17ec3e430d14,2025-05-16T14:42:18.700000 @@ -295418,8 +295418,8 @@ CVE-2025-47283,0,0,034268d2843b5a929843aba689d7471bec2ec3f6b1037041e76725572f77c CVE-2025-47284,0,0,927b09b86a7bb19dbf3e9d0808f921b2d28747e702e8d9ec13ede5b5a7267efb,2025-05-21T20:25:16.407000 CVE-2025-47285,0,0,a4b322cfa16ac0198aad5626c2233334a81e0c8124806adefa631e6ad6b3d8e6,2025-05-16T14:43:26.160000 CVE-2025-47287,0,0,4a03b7a85e9f4f1ae469c2f4edaad7e40d35a7308b2c4cacf7afd6a1813a45c3,2025-05-29T06:15:23.090000 -CVE-2025-47288,0,0,4f46812765e170d3e0663ea32f05e904834e57f589f5c764ae983ba008d7452b,2025-05-30T16:31:03.107000 -CVE-2025-47289,0,0,f5d0a0bad4dd1eeab4407c09c07c23fe92025d47bc22e473ac530455098062fd,2025-06-02T17:32:17.397000 +CVE-2025-47288,0,1,6240d445f51e80c803629b9dc8b3ffd9c4606efb6ef121520c5379fe5f8a49d8,2025-05-30T16:31:03.107000 +CVE-2025-47289,0,1,368365e761454b6fc024c4aa9383022d6cdb483bd1c50b79fe5c2228f83301e6,2025-06-02T17:32:17.397000 CVE-2025-4729,0,0,073b70e77ba60376073b6bf036503b0e9d4ab1ba93aced39541912843c902c9b,2025-05-16T14:42:18.700000 CVE-2025-47290,0,0,fef9205d946b23690e870377651d8631936053bea9e3a05a823cfda120b52c00,2025-05-21T20:24:58.133000 CVE-2025-47291,0,0,77c2613c093f23da4845bc4516f16594af2697fccb6f4c62fbf6122c314ea551,2025-05-21T20:24:58.133000 @@ -295758,19 +295758,19 @@ CVE-2025-47787,0,0,0a2581ff70fc7e5521e4a9d9ce78a890c8b67c89a91ce0d94fcc4900f99a2 CVE-2025-47788,0,0,6b5e38cbcfc946bfd59d42d46514cb0def4592e040d374abdc709005316d2f44,2025-05-19T15:15:25.200000 CVE-2025-47789,0,0,45dc770bb0c94c5e8c48030b8884b90c652471ebe6c8c411f93ca31ef83185f9,2025-05-16T14:42:18.700000 CVE-2025-47790,0,0,a6351ab24f93f0d386dbb08791d6aca496319ae8a2ceb95e2ce6b8ad46d620c7,2025-05-16T14:42:18.700000 -CVE-2025-47791,0,0,bb13ba0274d81a1986d65f7103abdff4aea9a73bf23faae8bda9c5552391f364,2025-05-19T13:35:50.497000 +CVE-2025-47791,0,1,ca1f70ef41d3a1ed585c10f4aaea46f0cbe8cd3b5251cfe28c38668da573721f,2025-05-19T13:35:50.497000 CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000 CVE-2025-47793,0,0,a0dce33b5060bd7d152dca8ab7d8795e92e866ec8730dcbdb31b478b4b4a4aa6,2025-05-19T13:35:50.497000 CVE-2025-47794,0,0,fe7227e3d0226dcb896a577c64f1cd15be4a2124b27c33b886b791a4f94db856,2025-05-19T13:35:50.497000 CVE-2025-4780,0,0,50836fef64e4f508a2f70175fce08dae54861b0690bfd6af3a0acab7a4fbf285,2025-06-05T19:36:06.897000 CVE-2025-47809,0,0,7378247eba6fac39102e733903012e4738ae1399f25f08cdedbbe88c7b8a3bad,2025-05-16T14:42:18.700000 CVE-2025-4781,0,0,9dabcc14836b43733524131bd4b7d81a20b179417e93f112f8e4e0e5eedf8fdb,2025-05-21T20:59:18.993000 -CVE-2025-47814,0,0,91d01c94bb9a2d6cbf1f2ce3b51913f5401bb5d496a9da26d55db4bea09f6271,2025-05-13T15:15:59.160000 -CVE-2025-47815,0,0,9592c3e4f771ae3f4778fd1417b837c60cd946494bcc69b16ff5a835676654f7,2025-05-12T19:15:51.627000 -CVE-2025-47816,0,0,f2039bef5f35896f6323dde541ac2699fd60fa6f47c1d018e4464af2af438bb3,2025-05-12T19:15:51.733000 +CVE-2025-47814,0,1,852607e28b34763920643c32daa1b3b931377bd16797f0e3e0b602895018d6aa,2025-05-13T15:15:59.160000 +CVE-2025-47815,0,1,8632f47d917ef5d0fa860991936749fefdd362e688d75c65c324061519adf185,2025-05-12T19:15:51.627000 +CVE-2025-47816,0,1,dfc656b734ddc613569bffc853fd450ab3517aaf74cbf8b07d633a1866015974,2025-05-12T19:15:51.733000 CVE-2025-47817,0,0,a9608fe19de2055ccc53db5d916ab7446a11a0159ceb8cb3f751e656accab718,2025-05-12T17:32:32.760000 CVE-2025-4782,0,0,7ad1545eb9e016317ccf1371b442ca29cb62e72aa504ad708f7f276790913468,2025-05-23T13:04:40.253000 -CVE-2025-47827,0,0,f6d692045e1f3203102de5d44d0437e8d1527c75148c2b996ac6eb2379f3b4f0,2025-06-05T20:12:23.777000 +CVE-2025-47827,0,1,5e2f84bcb49ed4206de9cb88e83317953c756f84a7e161a3aa35e3d2c8c1fdef,2025-06-05T20:12:23.777000 CVE-2025-47828,0,0,164436fe84b8d833a71f3fa8e7f3f39b64e2df889f4579512ca4cd1f99b4e769,2025-05-12T17:32:32.760000 CVE-2025-4783,0,0,bd5695c741cd6c06c07a958617e5fade1eea7d7c38bb9f2f382e0e33491cd176,2025-05-28T15:01:30.720000 CVE-2025-4785,0,0,11af03bace6c1c04331c5dddb8e99f128f61109ba1a035e35492e3dbcae57560,2025-05-21T21:00:19.110000 @@ -295815,7 +295815,7 @@ CVE-2025-47929,0,0,7fc15c7af26adf36cdf89018fb748ea0cea6a0ed56d6cabffa736dce44604 CVE-2025-4793,0,0,ec69064861ba117d418880947f64b864bae8e19e90fef5ea47c2be77c9ecb787,2025-05-21T21:00:12.357000 CVE-2025-47930,0,0,19b1b7a285857f90bffb379b662daf30b43b34bd369e1d0ecf1fa5188f018150,2025-05-16T14:42:18.700000 CVE-2025-47931,0,0,2ba961b15398b05238bce593e14441b257d624d47fec2eb2b7b4debf34411048,2025-05-28T13:19:14.460000 -CVE-2025-47933,0,0,fefcc32bccfa62be4e831e6c27b00c9867593c9c5ec05f31b9f9cd3f42b3d4fe,2025-05-30T16:31:03.107000 +CVE-2025-47933,0,1,7a610857104282f346c5040e2ffa393c57367ac3e52a6fb1f44ff51a936cdf49,2025-05-30T16:31:03.107000 CVE-2025-47934,0,0,8438c1a5883ecd980df510f4404f64469627266e683abcc00b1872291e43b364,2025-05-21T20:25:16.407000 CVE-2025-47935,0,0,406b48db633b3cd8d2acd0e043f41be378de6269ff41278863cebb17c9ea9998,2025-05-21T20:25:16.407000 CVE-2025-47936,0,0,4515e69258cf939e3310505cb97bc58f8cad7f3dd5de8fc02e816b975a5e4843,2025-05-21T20:25:16.407000 @@ -295824,7 +295824,7 @@ CVE-2025-47938,0,0,596b5d3e2b328bb1df54f0e9acd6e7a45afec874a47a08c8050f1aa89cefc CVE-2025-47939,0,0,4ede8c5633e810c7cc281a200e2b1d268112757d46756b66e01d0c4169a4a98e,2025-05-21T20:25:16.407000 CVE-2025-4794,0,0,1c405daaf3d5fe49b91b465c5bc45162d39a8721f37d4e3e481eca779cf10b99,2025-05-21T21:00:03.920000 CVE-2025-47940,0,0,041b23d7fe6b85d81bc7e12896e6c239d30fa2ff6fd2920eb28aca61c02fe976,2025-05-21T20:25:16.407000 -CVE-2025-47941,0,0,dafb8ba1ff232841b087c6432f0891071454d1d4a5973555d096ee5d2e35e06d,2025-05-21T20:25:16.407000 +CVE-2025-47941,0,1,ccae7c3101a56671e4027a9ac1fc4d25c071f58e7060281653ad230449dde6b5,2025-05-21T20:25:16.407000 CVE-2025-47942,0,0,89669a9478df7875427b1ce81ed1c37d53f50384a3e98a50b2c381c0e1aa23d7,2025-05-23T15:55:02.040000 CVE-2025-47944,0,0,43f01036d58c7fc4ce68cbd36ac845bd2f2e9cbf043553eb4dd6eb8bb8c9e3b0,2025-05-21T20:25:16.407000 CVE-2025-47945,0,0,8d13d4100822453f248a5ab31f680be9f8a3511c1b2d489a753a6e4381ce6866,2025-05-19T15:15:25.300000 @@ -295864,7 +295864,7 @@ CVE-2025-48057,0,0,a191ca594fce2043575d294ad9a27f048e1246820e66b4cf94f49035f8bda CVE-2025-4806,0,0,2518615806c8845e10f07d0087e3d6590e4a403546137a9f44732cf46e6ce47d,2025-05-28T13:46:20.210000 CVE-2025-48060,0,0,e880a7998ac7937dea606622d4d4f9e16644f2d07bf1521aa507e684ea319d27,2025-05-21T20:24:58.133000 CVE-2025-48061,0,0,9623adaa4a2a12419dc1960402eeb7cda483dd4973982b2b4588eefcc7c2d6af,2025-05-23T15:55:02.040000 -CVE-2025-48063,0,0,b51c84591461349d9cf6414a93a17bf05aa314500b0f0e486a94556b20ce49d8,2025-05-21T20:24:58.133000 +CVE-2025-48063,0,1,30768bd0b996f4003af001e4f1f93e88434b229ec5305143caf606aa28b95eff,2025-05-21T20:24:58.133000 CVE-2025-48064,0,0,f30f6abfc706c8ec009b8e1646b8ce7a94ad294f1fc91f47ca51b619773ad0e0,2025-05-21T20:24:58.133000 CVE-2025-48066,0,0,faea31f6567e989a0ef973c3f26a498ca723f84a2b80d40e0205222fbd185beb,2025-05-30T01:18:41.410000 CVE-2025-48068,0,0,8829e4d02604079a80fe777b2b1440ff57426176316d262891eaefe3a9476157,2025-05-30T16:31:03.107000 @@ -295906,7 +295906,7 @@ CVE-2025-4815,0,0,31cc1cd9ba179e2e20111ed224a5d1f55b5f28081bf7ef82d4c48c2315ce9f CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000 CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000 CVE-2025-48174,0,0,c3e8083f71af16819d1dd271b42b6299c82ce55401fe37929ced2b9ea25ef1fa,2025-06-04T20:02:37.147000 -CVE-2025-48175,0,0,3f6bab737596fdb5634db37c0296a1b165ba48ea379824d01c7b1ce82612cf5b,2025-05-16T14:42:18.700000 +CVE-2025-48175,0,1,6ead55096c8c33942432e9134de8e8e1e3ada82e07b8efd3900a835d80a4249f,2025-05-16T14:42:18.700000 CVE-2025-4818,0,0,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000 CVE-2025-48187,0,0,be9d0afeae04913d345ed4d335591274c105e6700369ecf88b41657ac12d62eb,2025-05-19T16:15:30.853000 CVE-2025-48188,0,0,9338f093747813e06d902a44455aea29fdf3a611a5e401cd7c2e67e28da8d86c,2025-05-19T13:35:20.460000 @@ -295986,7 +295986,7 @@ CVE-2025-4832,0,0,5d40eb0b072a9c981644738a05ce42d6d77248f4a38128aded9cccf62a96e3 CVE-2025-48328,0,0,2accd3850508758c9e548229397ea6c443d492556b0df0d4dedfd45679e0d634,2025-06-06T14:06:58.193000 CVE-2025-48329,0,0,698a43d9c2a3c88d905d61475cac4fe62a4708308900da986b4f6c58f487d52f,2025-06-06T14:06:58.193000 CVE-2025-4833,0,0,524b74208b998ac185cb2f32a80e77b8ca0d39465baae0b1b3d7710a8e9aad50,2025-05-23T15:50:46.407000 -CVE-2025-48331,0,0,5389ff0bf3d60b67852461285efa3bddd1d7822fd9aee84d5419257f4846e73c,2025-05-30T16:31:03.107000 +CVE-2025-48331,0,1,2e293173c8bdd95f274569d90c4fc672d4dd2c84b398ba10c7c764970ea66904,2025-05-30T16:31:03.107000 CVE-2025-48334,0,0,65fc2027acba858836e737fb0f1df3a72d4113a56a3d69faba9cd52176926fa8,2025-06-04T18:30:00.867000 CVE-2025-48335,0,0,c49547ff19be1d26f8bf3d5a28ac9c1371efb1b8247c39b8856be7dd2c2a385f,2025-06-06T14:06:58.193000 CVE-2025-48336,0,0,cde5f5f8ee74c92259e7bd148625c213e9829c471551e9e911ca67e0b81ffb00,2025-05-30T16:31:03.107000 @@ -296068,13 +296068,13 @@ CVE-2025-4849,0,0,79bafc8d78c1efc632ed95ad4a130766ed5d90c45e45605773df0d46773756 CVE-2025-48490,0,0,87ecfeb6e490715223675b6987710680d7319b22f1f72e859b8289d6cc58a36f,2025-05-30T16:31:03.107000 CVE-2025-48491,0,0,192909d10acf6a2f5c7dbd7cf4a77eb5c3f60df46b3da837effcf5a7a7693800,2025-05-30T16:31:03.107000 CVE-2025-48492,0,0,403a5473251d0861ab7d826ccca3a9aee2288a4f6bf49b37e21ab18d8ee7611e,2025-06-04T19:56:47.567000 -CVE-2025-48493,0,0,9be07ed790bedf2cc0e86f687624e1ccd3c0b5fdca2cf98e9cb4ec35c870a5bf,2025-06-05T20:12:23.777000 -CVE-2025-48494,0,0,e00521f8a0f3a9ebe9171d0cc58187598193294c5888b4b6a1109f72d9410a03,2025-06-02T17:32:17.397000 -CVE-2025-48495,0,0,fb3d4c3815acb69b7e6dd709945e299a370be57fca621c3fdcbb8bde438068e6,2025-06-02T17:32:17.397000 +CVE-2025-48493,0,1,7c20ba456ec69ef1e70d2ecb4fd146dbaf6e95fff0c896df69b76de160cbc941,2025-06-05T20:12:23.777000 +CVE-2025-48494,0,1,0329dcb313613e53f258f49f9571ad3f690e1a097f931b0aba423ffd216938fc,2025-06-02T17:32:17.397000 +CVE-2025-48495,0,1,231a0a2df8efd4f811988b128f1772192e88580d1043466f8b361c6491441d56,2025-06-02T17:32:17.397000 CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000 CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000 CVE-2025-4852,0,0,9fdc9f5e4228d0479c129fbe9c7f799e549cc0e36b5c79452a30c2f45481eb4e,2025-06-04T20:10:34.490000 -CVE-2025-4857,0,0,d86d3fb17bd9b41ad77b16b1cb7ac57de7d8e1bb1267a59c03a74c832ceeee36,2025-06-02T17:32:17.397000 +CVE-2025-4857,0,1,b6ec0c66ed29ada02472a0e7a1b3550d25a25d3a8303b36013711cb37caac06a,2025-06-02T17:32:17.397000 CVE-2025-4858,0,0,4d4acfd1ddd3d80c071f1db7dab6f9bace329ed4acf49c3284cbb245e6202bfe,2025-05-22T18:19:26.573000 CVE-2025-4859,0,0,7ee73dc7bc51986d834579cc9ff8417bc2588c9d45015a0c69616c74659b9b88,2025-05-22T18:17:04.033000 CVE-2025-4860,0,0,fa12aef32fad3c3802761bc8400f14de20766289f40cf8277fe973a0e73a100b,2025-05-22T17:53:56.563000 @@ -296093,9 +296093,9 @@ CVE-2025-48701,0,0,35aa8b81bef67a8b475084f139411c80773326ef7d953cb76c543e9e2bb84 CVE-2025-48708,0,0,74d2d0f043ff5c865a6d0a1563d74024ae79bdc118ea29e39da5392ad954839c,2025-05-24T01:15:19.420000 CVE-2025-4871,0,0,3f055501a74b827c2979fd506b6a31da5aa1cc38fbff75b8f146849a462b3ed0,2025-05-19T15:15:35.460000 CVE-2025-48710,0,0,f0402bb1ed6d8f6e40d35a516c63ba6d11524553c0fc1bb2ee868d959afc0447,2025-06-04T14:54:33.783000 -CVE-2025-4872,0,0,31ba0e872a667df2b5f905b91ad79d23d6ae9f1d90fe7298a8e93eb9f4930329,2025-05-19T15:15:35.567000 +CVE-2025-4872,0,1,30863c3012076b0862c02f7223e45f39a482607108cedc8377812aeb4ff48652,2025-05-19T15:15:35.567000 CVE-2025-4873,0,0,63423bb9fd17f5cd0d086d7b5556b35e17f23a209119a6131192f7c612f8b1ea,2025-05-21T17:34:03.960000 -CVE-2025-48734,0,0,32f5159e3649d709552e9d6060e2feb59065772785f70db027b9b029edf3a535,2025-05-28T18:15:27.410000 +CVE-2025-48734,0,1,3a4d2ed7881f8105604f4564403b6f6d709d56b3f1a20fb0aec3159057e3213a,2025-05-28T18:15:27.410000 CVE-2025-48735,0,0,9d5a08d093cc66e61f5e34f16eb5a90406e438748127c461c01c0b9a9907d82b,2025-05-28T14:58:52.920000 CVE-2025-48738,0,0,65752e8b34a930365e2bd7e8d92c72cb3dcfec04e747f7f58b2581c790532cdc,2025-05-28T14:58:52.920000 CVE-2025-48739,0,0,bba3d5ac118f557180952cdfc3ccafa99d859ead1572a9917ac889a50d634b65,2025-05-28T14:58:52.920000 @@ -296103,8 +296103,8 @@ CVE-2025-4874,0,0,3801201aebed5dc0a8e923b5407a2610ac97c6bf23696c0909d5665f5d87f1 CVE-2025-48740,0,0,9cce611916a4dc21fb7406dff2e92d33482eb065ceb85ae23dff891eb09fb22b,2025-05-28T14:58:52.920000 CVE-2025-48741,0,0,75001d0705bc789d943f76109b8b14a126d281e251509064c5cca96008e10105,2025-05-28T14:58:52.920000 CVE-2025-48742,0,0,5f33c781ef30502ef2e246627292bc67d88c79205c0f59dcb70501ff4a68f09c,2025-05-29T17:15:21.900000 -CVE-2025-48743,0,0,24d943dbdb45a4fa6b30762dbd53504c04a4380cb55364901f38457df34be0b5,2025-05-28T15:01:30.720000 -CVE-2025-48744,0,0,2bdd08647659ee3f558bb4b4bded879f1ed8d92273df3815d9aaa6c8cd04d2b8,2025-05-28T15:01:30.720000 +CVE-2025-48743,0,1,c76f13c9957b05dc761602bf79dba24f2889ab5a933ef1979a2aebf1738634ab,2025-05-28T15:01:30.720000 +CVE-2025-48744,0,1,5b88b5f0f2118b69d165e6d14fd79bd6bdbf0e30ef11a5ceea27f79ef8baa6d6,2025-05-28T15:01:30.720000 CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000 CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000 CVE-2025-48747,0,0,8c3baf0ee9646e657c0ba351a53bca2d3d39df6e364e578cbb75404ea4e19368,2025-05-29T14:29:50.247000 @@ -296154,7 +296154,7 @@ CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec CVE-2025-4885,0,0,8b1f3d2344963a11ed048c1b11c72d90a832e37d4502c4d02b2f6dc0aedfb978,2025-05-28T11:49:42.250000 CVE-2025-4886,0,0,ee7f76edd86c24830d90a51f41a4fa49fae21d920e8b2e20261474187c5dd2a8,2025-06-04T16:10:37.057000 CVE-2025-48865,0,0,94f89730bd8ed106556973261399e33383a3753b92f1a19b2cc4e5a5c200670c,2025-06-04T19:54:41.613000 -CVE-2025-48866,0,0,2eb24bb6d4b88e199059b8164a727c7dc019422a59663d0449e28d2835a02c01,2025-06-02T17:32:17.397000 +CVE-2025-48866,0,1,a1b5e6900744dd6335631bee4d049dc86bb99097e5e581ca914a10fa91c812ea,2025-06-02T17:32:17.397000 CVE-2025-4887,0,0,b3da4e0d52d5d712d7aa083818ad0dfb6e4d4e8d4d6275a1920198b65f71ddac,2025-06-04T16:10:54.340000 CVE-2025-48870,0,0,f0dd4c510b4e0f1b9cd4488ee6e0602ab690635caab16c9782c16ad205fa1ad1,2025-05-30T20:15:43.107000 CVE-2025-48871,0,0,e51827db50c06633d673c9028d7cda097fa8237d9938def1c48be2ebb4d18762,2025-05-30T20:15:43.197000 @@ -296165,10 +296165,10 @@ CVE-2025-48875,0,0,029be7ab6273a4455b3ac7b9bf6f732c1f5c1649e6f1271a40adecc61bf80 CVE-2025-4888,0,0,6310b8fff197a575079561816e1f76f1ad70f7608de3ca85411d4b87b2143843,2025-05-28T15:27:22.353000 CVE-2025-48880,0,0,e3f8b2cdd2d7e01ae05621a292349f1663c3a39c76f38840987aaac340e5533a,2025-06-04T18:32:36.090000 CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe5e0,2025-06-04T21:15:40.263000 -CVE-2025-48882,0,0,6d6e301c2fcca30015e0984c4a90fadf5de5a52e61a797038d25aa4d72a7ec08,2025-06-02T17:32:17.397000 -CVE-2025-48883,0,0,92ab56394b62eb2df4399dca780d3d5ceac187964ae5c1c326a5706f8feae836,2025-06-02T17:32:17.397000 -CVE-2025-48885,0,0,b3b8091c9c67396c0508ab00ef540bc3be5bfff70b8e10d6327b1a2b9cd2cb7d,2025-06-02T17:32:17.397000 -CVE-2025-48887,0,0,a71e21704f01ff2a5562100145742098cd6bb3c5b25e05dcc86442a0d077f196,2025-06-02T17:32:17.397000 +CVE-2025-48882,0,1,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000 +CVE-2025-48883,0,1,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000 +CVE-2025-48885,0,1,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000 +CVE-2025-48887,0,1,1d5cacac7d4463b079037d15dea05f85b4e0e8b7d35792f7788c0510a474c648,2025-06-02T17:32:17.397000 CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000 CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000 CVE-2025-4889,0,0,01c7a8037082d88b5ac656519933c8c5460517579f14e0273e6b2875f7942bab,2025-05-28T15:30:05.053000 @@ -296197,38 +296197,38 @@ CVE-2025-48931,0,0,9a24a64e0ef76c1e8795f67a812a3665cb8357f39db23fd805f099443712b CVE-2025-48934,0,0,da09fe1de5165be7f58b28c1117d7179188883881184896933b151cc78fe9312,2025-06-05T20:12:23.777000 CVE-2025-48935,0,0,290e64ec3bef597e0aaf785c3f2a47773257f90fb9ee8de652ea401ad9b16be1,2025-06-05T20:12:23.777000 CVE-2025-48936,0,0,466cc85edbb9de09c6e53990c33f4edba165b1227854443bbecd0e6313d71310,2025-06-04T18:31:41.773000 -CVE-2025-48938,0,0,a912921d4d92c08babc86f1d87d9a3c7f64794d28789a8d268c733457eab99b1,2025-06-02T17:32:17.397000 +CVE-2025-48938,0,1,69a6b3e527c71a70d204c408cd7b6de2f9d11cdc8bb56708cb8a375fccb4e065,2025-06-02T17:32:17.397000 CVE-2025-4894,0,0,e203d4bd91eb3e3cb92f624dec258fe2ede19a69c9e41059892032f4ff18f560,2025-06-05T19:39:01.520000 -CVE-2025-48940,0,0,69c8738c40ce7804d4df0abebfa7b439311ba65046421bb97675e682461cc8b0,2025-06-02T17:32:17.397000 -CVE-2025-48941,0,0,27372c9a3f2bc12dcc7fb2eb69cf1151ae0278ab9c7bcb04bd6a31084f7da468,2025-06-02T17:32:17.397000 -CVE-2025-48942,0,0,2a485fb562d70d0576cababddaf40f7a7eb7a022a0399a7752fb108cbdc63bd5,2025-06-02T17:32:17.397000 -CVE-2025-48943,0,0,a8336061cd82b2763534445e738f3f56033701ffd72befd4f9fd3a2a34fc2be4,2025-06-02T17:32:17.397000 -CVE-2025-48944,0,0,caf8a769244dbe965165de00600739682945d12403742a9653aa5e6215975f28,2025-06-02T17:32:17.397000 -CVE-2025-48946,0,0,9e8302d4346a2222f59b2639a60bac20acececc93e94ce2ece2d40ebb96743b5,2025-06-02T17:32:17.397000 +CVE-2025-48940,0,1,e926be5dfd68a2ca8f22b1d6590ba6a2e87ec22f343f0f3f40e3fab5d3cf0df6,2025-06-02T17:32:17.397000 +CVE-2025-48941,0,1,c23242aa7e301d29aff18e048486e28515881061d13426011646be2e4ccb060c,2025-06-02T17:32:17.397000 +CVE-2025-48942,0,1,2b3adcfc1e2b12a0daac6aff1c1d9e01819e9647a8852a209e7ac17a75beb867,2025-06-02T17:32:17.397000 +CVE-2025-48943,0,1,72753488f7b42f841e46478b617635837e730692252bcf582e8d0e92d8146c48,2025-06-02T17:32:17.397000 +CVE-2025-48944,0,1,d04b86254668c0d13e0109f39ae5f5c21b3c97e45de2b9a6960a7a67fee0d56e,2025-06-02T17:32:17.397000 +CVE-2025-48946,0,1,18d7566e4b82943bae337077025bdcce1129b01eb962d14b0dff15c514c8a6f0,2025-06-02T17:32:17.397000 CVE-2025-48947,0,0,d90b5aaaf4cc8c304986f18a8eb730316cb3d60dbefc90b199a5754769c3b731,2025-06-05T20:12:23.777000 -CVE-2025-48948,0,0,3dc5363d45860f970916d1ac03bdc1271b5feb7adf997122b609e1a438a9d971,2025-06-02T17:32:17.397000 -CVE-2025-48949,0,0,62156b7897f2e3e419ce5967535cd6e746f097cb6d4066f4a89eda60c6dfbe12,2025-06-02T17:32:17.397000 +CVE-2025-48948,0,1,7dbecc10f978b3ffd5df1a8f185195dcebb2a040ae156ed08fea3f21a1cfa967,2025-06-02T17:32:17.397000 +CVE-2025-48949,0,1,fc8b75cb76f12da9c381ba1cbe524a49076c2a7b248109a10affb9726113654b,2025-06-02T17:32:17.397000 CVE-2025-4895,0,0,451159abdd179506166eda92c0cc3ecdcfca15d4a903bf6a2c0ccf029c166653,2025-05-21T19:37:48.777000 CVE-2025-48950,0,0,cc973f7c5355f4974e0729310c9855d4650934cbce88e929f2539748e53aae88,2025-06-04T14:54:33.783000 CVE-2025-48951,0,0,ede6a9271ef2c495a550496dbd581ce6ffb53f4b9f98c935ca8083cc1b4fd602,2025-06-04T21:15:40.580000 CVE-2025-48953,0,0,70684a4684db41347c8126e913d4ccc37a9d8250a7889d7b10445edb04853791,2025-06-04T14:54:33.783000 -CVE-2025-48955,0,0,635af14418567c50c9f62dcd2c50650fe7629bfb1694d02914be628a2ee55fa7,2025-06-02T17:32:17.397000 -CVE-2025-48957,0,0,4dcb1f30e5e2aec3e21e37bae221cc13e1aae7a4a0ffd535052c26dd64dcb033,2025-06-02T17:32:17.397000 -CVE-2025-48958,0,0,46fd5e9c83e8ade67c84942ff50f6e8ba5c9ec4365d7ad6ad95af9803a00d241,2025-06-02T17:32:17.397000 -CVE-2025-48959,0,0,274814497f5703fcf3a7ae807070e8aff96e2761c8b0c63a15ded955eb77460d,2025-06-04T14:54:33.783000 +CVE-2025-48955,0,1,560b04619e43ec6eda07e48b947f9bc229ed274e024fa427eb478249da962f8f,2025-06-02T17:32:17.397000 +CVE-2025-48957,0,1,2a3761a5801fd5ee703634fc43f87a21218d925d9f5bdb2e21bd6c0c9aad55ce,2025-06-02T17:32:17.397000 +CVE-2025-48958,0,1,8c90d5f5b1a3b380eb0fd9a0eabccd26db118226ac52ddc9c94ec9a7d02c9ea7,2025-06-02T17:32:17.397000 +CVE-2025-48959,0,1,55ce7b99f1833d3a24c336c621480457f088960383573f163be8ebb2ce71d800,2025-06-04T14:54:33.783000 CVE-2025-4896,0,0,eb43857d84c4e3c0ca9bf4ac15086d7606c87aaeb17237d45e10278d3431115c,2025-05-27T16:30:13.490000 -CVE-2025-48960,0,0,93f7fd9b74fe1fffbfcbbaf102f22a258bd7aba129214a2c64d0ca9bd95e335b,2025-06-04T14:54:33.783000 -CVE-2025-48961,0,0,a59d8ad86e14da858d0bea999138c2abff05ee9971d0086d8ddde32b64455cb8,2025-06-04T14:54:33.783000 -CVE-2025-48962,0,0,15294a34140f594ef80b51b3ca023944882e0df4f1a3fb2d6042aebef1f90b5b,2025-06-04T14:54:33.783000 +CVE-2025-48960,0,1,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec2922af,2025-06-04T14:54:33.783000 +CVE-2025-48961,0,1,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000 +CVE-2025-48962,0,1,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000 CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000 CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000 CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000 -CVE-2025-48990,0,0,3d637804381ef08042cb58db91b863fe4e22385581dabde03cf4a364dec0eac2,2025-06-02T17:32:17.397000 -CVE-2025-48994,0,0,004623ecc6eb2d1d3509106543a6938cc0abfa24d5e2d84523819d9bd5ad928a,2025-06-02T17:32:17.397000 -CVE-2025-48995,0,0,454d1911143e07368e22c698f209af43101d290055ed9218cfef91671d133926,2025-06-02T17:32:17.397000 +CVE-2025-48990,0,1,35250e6aeab8f33cddd6a2463ca29c89c0b5491c46e9371235f8d9552555aa3b,2025-06-02T17:32:17.397000 +CVE-2025-48994,0,1,2347eea9d248ee0ef643957a0a53d1ea86b7f69fd6aea9013390675ac9969f47,2025-06-02T17:32:17.397000 +CVE-2025-48995,0,1,13be942b01243f59599a7f021ac94d7f691b51f24284ec645c1ab118368b0b77,2025-06-02T17:32:17.397000 CVE-2025-48996,0,0,a5bc0462fba0b0454b69362838585b85b6432cd607f3470780f5a230a04991c5,2025-06-04T14:54:33.783000 CVE-2025-48997,0,0,f8cf0c626626da2a845a3e6c5808d35b62f20f32b01c03fefd762b607f15feb3,2025-06-04T14:54:33.783000 -CVE-2025-48998,0,0,179ce0b1073d70dad4ff555b3610940ccbc92dbe442ffdd7e4a7279d8c90c02a,2025-06-04T14:54:33.783000 +CVE-2025-48998,0,1,c4816eecd21ebef610ce74050844aa211c362031956c85944ff7fca52db15f4a,2025-06-04T14:54:33.783000 CVE-2025-48999,0,0,ab7be31f2d6d8537c239c3147eaffa5be1881f2b09b0ef526e5e81a388962818,2025-06-05T14:07:58.140000 CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee63,2025-05-21T19:37:15.790000 CVE-2025-49000,0,0,f8cce1a2bdee8bde170fefa186e3e45152457ed27acc2f9d05d9f849c91c807b,2025-06-04T14:54:33.783000 @@ -296236,7 +296236,7 @@ CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094 CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000 CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000 CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000 -CVE-2025-49009,0,0,76d8be196b9fa55d517dc826120ab50a9788f285be9ce66c1a1960b2443dc26c,2025-06-05T20:12:23.777000 +CVE-2025-49009,0,1,05fbc148f5fea24cfe48010b88fe5429514c8df92279b8f7fec4106b44808b61,2025-06-05T20:12:23.777000 CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000 CVE-2025-49011,0,0,2e7da429b95a4f2254c5a8795b5999a44c06845c593ad460917245d4e9c39380,2025-06-06T18:15:35.497000 CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000 @@ -296259,8 +296259,8 @@ CVE-2025-4908,0,0,de60be5e9644ec87fb1afc243f75b0e5b1a22cdd347bf91d496fa5782bf1af CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d9b,2025-05-28T13:08:14.173000 CVE-2025-4910,0,0,d0c7584b70570a0f60f72259e5222dec42c6f070aafbec7da031c0738cd595d2,2025-05-21T17:40:58.137000 CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f3696f,2025-05-21T13:26:25.383000 -CVE-2025-49112,0,0,76902d9e5d22cd5a11f3d533ef551f790c89e42a3232b598745b0d1e516b91f3,2025-06-02T17:32:17.397000 -CVE-2025-49113,0,0,0c3b29880bdce65ee86ec4692335b37df834d186f37bd8d28a9c54f66ee6335a,2025-06-02T18:15:24.640000 +CVE-2025-49112,0,1,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000 +CVE-2025-49113,0,1,78e1e19e9b432b93ff96a76bc8575f71429241f56372df732f7bdb78a4469ea1,2025-06-02T18:15:24.640000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 CVE-2025-49127,0,0,75d721494d98d4722f3d78798cf05e23db38a7c6bebef6c22b8d9a8d81898d86,2025-06-06T21:15:23.137000 CVE-2025-49128,0,0,42874cd39e27e420db84f117bd69f6a93c7d0ef6555be75306d09ad33e291157,2025-06-06T22:15:23.427000 @@ -296371,7 +296371,7 @@ CVE-2025-49429,0,0,14ed0ba82def1d0e640a8727f229499d2319d7849d8415c045b11d1f3e7b5 CVE-2025-4943,0,0,4340407097d641a732a3d64a65d30b42dd912a533e30289b536536d0a1b67ff5,2025-06-04T18:31:24.923000 CVE-2025-49435,0,0,b7201f226b840dc718d2742730b626825e0c6abe0ac22b74626ee310f25d7b17,2025-06-06T14:06:58.193000 CVE-2025-49439,0,0,ffaf81f9fce83e007d45500693718419efd10043ce0bbdfa9d62bc6f491fec99,2025-06-06T14:06:58.193000 -CVE-2025-4944,0,0,1b40397bbd57296a9c952ff4bf5bee11c9c99b8a77bbc95a0f994a8e28013698,2025-05-30T16:31:03.107000 +CVE-2025-4944,0,1,9a1f50eb597824061a4527d790f3f67b01a7246be2339b95cef835a527892fed,2025-05-30T16:31:03.107000 CVE-2025-49440,0,0,58a79ad2252a284b017bdf4e59b39c85f6b4978bfbc512cfc9af83483bd08a5c,2025-06-06T14:06:58.193000 CVE-2025-49441,0,0,eab1aa518f2c5de3a32d4c8f66944216d1ff633a574e18dbdc2b3a24c805abca,2025-06-06T14:06:58.193000 CVE-2025-49442,0,0,24a55d00214af303b7bedcd135d17d3a130400faafa39cfc82367dcb48f344af,2025-06-06T14:06:58.193000 @@ -296392,7 +296392,7 @@ CVE-2025-49619,0,0,668bd05025c86671edffdc13a521d6f88794f1d70ee3c0823fa2dd6aee1a1 CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000 CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000 CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000 -CVE-2025-4967,0,0,fa5aaf72596dd505e2f8bb43a15bd743497bb32df510d8b3798c90dfaee37959,2025-05-30T16:31:03.107000 +CVE-2025-4967,0,1,108222a9fb8d269319085d1510581dfa0458c27c4448fa960791612bde83ca72,2025-05-30T16:31:03.107000 CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000 CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000 CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000 @@ -296400,20 +296400,20 @@ CVE-2025-4977,0,0,bd1fd849d67fd76fbcb9bab811ae102c8a3ea5945e2e64bb03121997ef69d5 CVE-2025-4978,0,0,d098f546d229ff0b8b6c1c02e6df2a8e7e88cccb563b41e18115eb4da78ff2f6,2025-05-21T20:25:16.407000 CVE-2025-4979,0,0,7e8b6f43d28eec17b5c7e32a4c2e9e758ae8a9febc674a66c2d9d3ad4e2605c5,2025-05-23T15:55:02.040000 CVE-2025-4980,0,0,8aa1adb8a90611d76764e2b7dd4eacd1e1573f12338bc98504352a5bc77529f4,2025-05-21T20:25:16.407000 -CVE-2025-4983,0,0,73b1aabf997231d008cad49210784e43e928a2c273c6568499d5e3dacec75e0e,2025-05-30T16:31:03.107000 -CVE-2025-4984,0,0,62261e70e89447c56d0cdc737d6533c5c21f267757892bc51fb7437773789f75,2025-05-30T16:31:03.107000 -CVE-2025-4985,0,0,cbbb94e8ae17e9c8cad49d33ae4892ab13f085560f67392efd00e564244bc35a,2025-05-30T16:31:03.107000 -CVE-2025-4986,0,0,0a37cbb24f05bf20cb639ffa2507780020c49bd1b244ef1d1ec81e2d62b4a110,2025-05-30T16:31:03.107000 -CVE-2025-4988,0,0,7ed2f80fd7f2a867b0172d2406bd57baa68fe4cf5c41b451aafe0575222d0bfa,2025-05-30T16:31:03.107000 -CVE-2025-4989,0,0,746a4c11c726c14cb5532ab841fe48d07829b00d77ca56fc288834c1f2e1e8f4,2025-05-30T16:31:03.107000 -CVE-2025-4990,0,0,21dceeb305d8034167ec07cfcd7c9de0d45f2f0e7393dd8965f13f401edb94c2,2025-05-30T16:31:03.107000 -CVE-2025-4991,0,0,cd337465e9e5faec6895d10c04f94573e8fe3b079dbd1d7de709ee1e57837f53,2025-05-30T16:31:03.107000 -CVE-2025-4992,0,0,880736a669f914bf306e8c04d5a132b1ebcb3d222e4cf80674407ad695c9db71,2025-05-30T16:31:03.107000 +CVE-2025-4983,0,1,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000 +CVE-2025-4984,0,1,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000 +CVE-2025-4985,0,1,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000 +CVE-2025-4986,0,1,0d635bfcd5ea7157ed48c7c5f6511d7b519fc07571e2245e906f4237ec28c07f,2025-05-30T16:31:03.107000 +CVE-2025-4988,0,1,a7c799add205e04161903a2f90e2fafc16c75a5a4daac88e051c1af2ef20204f,2025-05-30T16:31:03.107000 +CVE-2025-4989,0,1,74686f3d4372e905fa27c624734660eade1cfc1a7c1d6b7d7fe07ac62f07c46a,2025-05-30T16:31:03.107000 +CVE-2025-4990,0,1,11128ad236ff0bbb6407ba12ca704aae39e79d15ca91d8e93c05e36bda39beb6,2025-05-30T16:31:03.107000 +CVE-2025-4991,0,1,67056c54ed0af796c00b82147df15690931ae5839b2ce0ae3dfbe8c6af0dc82c,2025-05-30T16:31:03.107000 +CVE-2025-4992,0,1,1082d6f32cdc55d2f0bee5c68a2d5eed24aa7fd6cfec642561c01b1514f010a8,2025-05-30T16:31:03.107000 CVE-2025-4996,0,0,01c374c560811bd4951a0baf104248c2dacc855112424c09410e3d0cdc0b6780,2025-05-21T20:24:58.133000 CVE-2025-4997,0,0,17df11423bba66ddb6339ed723346d4b79206f94abe64d75a525849e1b0c7122,2025-05-21T20:24:58.133000 CVE-2025-4998,0,0,a06730a0691f90a016a49869bfa33e7c322397c4e2518cd0a37207b150756354,2025-05-21T20:24:58.133000 -CVE-2025-4999,0,0,13735415b149480bfb9de9a45e935c4947f4c7ec7df58eed18894635f565eb11,2025-05-21T20:24:58.133000 -CVE-2025-5000,0,0,b88fb5c3c6d713007bd8f08b5b98b94c4b65f452e1cfcae4950b23010aca8b7a,2025-05-21T20:24:58.133000 +CVE-2025-4999,0,1,1ab1ccf9ffd7ad941fca6ad888de61f9325a789ff12a1f00bdf23e7dff70770d,2025-05-21T20:24:58.133000 +CVE-2025-5000,0,1,7b3b64ee241c0917b7914cb06c32468b4a031e0c72ce10af0f2158b424981c4b,2025-05-21T20:24:58.133000 CVE-2025-5001,0,0,31ad5c5ea8790484d4eb2202eb4a0629e0128642e382cfb8927c9b9893b4fc3b,2025-05-21T20:24:58.133000 CVE-2025-5002,0,0,971f36c284dfb1e294c2db4acf298a0f7591c6e0e260cfb633ad289f7903a4d3,2025-05-28T01:25:25.310000 CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000 @@ -296424,25 +296424,25 @@ CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d CVE-2025-5010,0,0,93497e2b48b334d59fac1bb8ca9073e5f336f986ef89ce0b89f9db876e65e870,2025-05-21T23:15:55.330000 CVE-2025-5011,0,0,d1caeeaa784d143902e41e16fc8809733bc411c4665df188f33764965bcab2ec,2025-05-21T23:15:55.447000 CVE-2025-5013,0,0,9e2206cee3d9a4da13b7d790d61a24286d0c704fc74b7b095d3cf27be2eea613,2025-05-21T23:15:55.563000 -CVE-2025-5016,0,0,b9a08e54f0dc13772d502436f2596aa0967ba42878080f55f50a463435bfc853,2025-06-02T17:32:17.397000 +CVE-2025-5016,0,1,d907c2ff3d5c65fe44aee01e8b0e3594629d2dcb543e14c1a3c5bbcba44c8083,2025-06-02T17:32:17.397000 CVE-2025-5018,0,0,e6074d13c744f0bbc4fedce0adf645747389e40f5acdd13f0492e74df313cc90,2025-06-06T14:07:28.330000 CVE-2025-5019,0,0,9e77689bce77b4f77cc10eef8ecd39dc784fee948cba6d9ab205fa6a8f33f986,2025-06-06T14:07:28.330000 -CVE-2025-5020,0,0,8e92e81268cb02470f5321fbe111bd1217491079f6b87fc538686f0917f7768a,2025-05-21T20:24:58.133000 +CVE-2025-5020,0,1,31bc3186f732e7faa9ae1d13b5d2df3023d86c8369b328a78de3b6443f12dd1a,2025-05-21T20:24:58.133000 CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000 CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000 -CVE-2025-5026,1,1,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000 +CVE-2025-5026,0,0,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000 CVE-2025-5029,0,0,ecb9afcd5e588564920b0ea2535593ae37c1896d06cac3ff8323350bc3b94721,2025-05-21T20:24:58.133000 -CVE-2025-5030,0,0,524bdc59d3cf3de128931a2064721f0c18eb0893fa1e7a140dbc00738f726523,2025-05-21T20:24:58.133000 +CVE-2025-5030,0,1,e075ecc32fc6bbe0493e50b2bdca73e5d2dced38e71810f902f33a94b6648462,2025-05-21T20:24:58.133000 CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000 CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000 -CVE-2025-5033,0,0,69d07fd1d6d2b0e1cfe5b6997abebee22e6f9bcc6a787bd1b23c7941de74915a,2025-05-21T20:24:58.133000 -CVE-2025-5036,0,0,3d20187ba7a82efe841d9f904cc531aef7567edbb89147c05771ae6b42293a18,2025-06-02T18:15:24.783000 +CVE-2025-5033,0,1,a528a35a236ac356b37ad2e6b6e85f88ab77bd30b99dd8e69b0e8dc623bb5ee4,2025-05-21T20:24:58.133000 +CVE-2025-5036,0,1,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000 CVE-2025-5049,0,0,6be769e63b7936d84c6427cb6db022f696b00834d46110cecd1cbd77c6e202b9,2025-05-21T20:24:58.133000 CVE-2025-5050,0,0,589b169c40b037eea9cb072f964d65e5e3d4fd396fb0aa30971ab829944d6511,2025-05-21T20:24:58.133000 CVE-2025-5051,0,0,9c110d30fb7d5b76a834a2709876396dbb061a47276883a9c8b6f8ca7926c469,2025-05-21T20:24:58.133000 CVE-2025-5052,0,0,aa387e74996184bbceb7dcb0f0533b96402b1f03de23f558fcebbd4c6085f924,2025-05-23T15:55:02.040000 -CVE-2025-5053,0,0,d1f3d03feac0d168cc0b9fceb4dacff5c6f1aabc5f310733ca2bf60999576839,2025-05-23T15:55:02.040000 -CVE-2025-5054,0,0,6f452ae635a28988447e7d7bb95807384ac80bc99bc742ccc46e6b2e79bae217,2025-06-02T17:32:17.397000 +CVE-2025-5053,0,1,7ba8d4b83cb8ea58a60010c1ed6b147b92378648fc3871cdc44f9ac4ef239fce,2025-05-23T15:55:02.040000 +CVE-2025-5054,0,1,68d095110a6b2be331697a8699cb10ea98d7a65a96add11ba5059f95d872a268,2025-06-02T17:32:17.397000 CVE-2025-5055,0,0,2813a40f904a4d38c72314bdeb0478f12eb76957b4f05117bb45d588d4e24d35,2025-05-28T14:58:52.920000 CVE-2025-5056,0,0,41abcc4b21c4c44af1bb2b5ebe6eed640fd93ff380221b407c4bb670519af696,2025-05-28T02:08:30.840000 CVE-2025-5057,0,0,c177a6255394eb47f572d99869089826f5992edac771e2e307615417afe5454f,2025-05-28T02:04:36.163000 @@ -296467,7 +296467,7 @@ CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd CVE-2025-5082,0,0,654b6f5ca85bdee04f191b4415361841f39b64a4d62ac7e373566ed9502c800a,2025-05-28T15:01:30.720000 CVE-2025-5086,0,0,a6cd7e037b880807c2087a0cc62e18cec32dfcc1b05281e63e13ff759a08d643,2025-06-04T14:54:53.980000 CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000 -CVE-2025-5097,1,1,56796bb8120929c8a6a0858cf0e395b320ecbafdfb6f27c42e47f8367c9df40c,2025-06-07T23:15:22 +CVE-2025-5097,0,0,56796bb8120929c8a6a0858cf0e395b320ecbafdfb6f27c42e47f8367c9df40c,2025-06-07T23:15:22 CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000 CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000 CVE-2025-5100,0,0,a54df1e8b0bff17450a1f67dfee2545841c6f379cdcd252b360f4d2a6c61fdc9,2025-05-27T16:15:34.280000 @@ -296480,7 +296480,7 @@ CVE-2025-5109,0,0,5abf8acd1fc057f203dd85a2a34a9edaa7978027ca3d8fc7088b1ce3b56aeb CVE-2025-5110,0,0,e2706181e4b2e1bc3c920ff85e81ecd3dc0098104158eb0a62ceafab3ac1e150,2025-05-23T15:54:42.643000 CVE-2025-5111,0,0,ab3c47416b65781d53c047fed78dbbb335dd4bed9307ae97643de9e73c2c429f,2025-05-23T15:54:42.643000 CVE-2025-5112,0,0,f0cd0b8c93be317d3a2c0e92912b455b4fb61ee919b7fe6bebacd87c921bdc33,2025-05-23T15:54:42.643000 -CVE-2025-5113,0,0,0bd61b4abacfc5745f349f466d36dc6433bff2c84afe9ce5402853e11bea600a,2025-06-02T17:32:17.397000 +CVE-2025-5113,0,1,4fded5fd40401c221cac2ef8ce80b61992e5d3143855e1468dca36f7819a9933,2025-06-02T17:32:17.397000 CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000 CVE-2025-5116,0,0,b6938e7bcf712294173537b38f61d79bb1a781951b36c05c0a08cc11ed4b2073,2025-06-04T14:54:33.783000 CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000 @@ -296491,13 +296491,13 @@ CVE-2025-5126,0,0,8a0557ea6376858295fab66f0f6670724f6318d02f3458731c89655e92d81a CVE-2025-5127,0,0,7a64d2e3a1c19302b37f8a44391f03e9fc812375ea47ae5f3f49c753f63873bf,2025-05-28T18:15:28.277000 CVE-2025-5128,0,0,6fe3700356303c45a9067b6294bb5c54f9b61d4a0638ae7ce7b11822443181a0,2025-05-28T18:15:28.403000 CVE-2025-5129,0,0,56c8280b7ab9d50626d5099e1e35b516047027b3308a199d92ac8ca29c27bb60,2025-05-28T18:29:27.117000 -CVE-2025-5130,0,0,67e5b4838ca1431971c5acebe16c1194f9d3c4df6cec429597c531b7d6fb1171,2025-05-28T18:15:28.740000 +CVE-2025-5130,0,1,7ca064ff2d32ed629e352632ab6119c1b19816ec10514ed4942bad6f53c2e5e4,2025-05-28T18:15:28.740000 CVE-2025-5131,0,0,eeda3e678c6bf3cae3baaa36d3f477414d472841fe55de3fbb95328097797894,2025-06-03T15:47:41.350000 -CVE-2025-5132,0,0,75f126b9a30c6a99c86e64c66ea7fd046bea3a2d72f9d0c6076ceb7040c4fbd7,2025-05-28T18:15:29.037000 +CVE-2025-5132,0,1,60d114eb1b84c81f01282cc1970a388ff7a9921dd29492ad2d5c5226ca8afdbc,2025-05-28T18:15:29.037000 CVE-2025-5133,0,0,71ff685cb41d220918422266a9a9027a78bee24552031db902c458276c3d0621,2025-06-03T15:48:15.610000 CVE-2025-5134,0,0,d420ea46d85516af4902b09065e0670f0f7a966eecf320488abdd86a620ad3ac,2025-06-03T15:48:28.580000 CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c456,2025-06-03T15:48:40.953000 -CVE-2025-5136,0,0,6b5f88824c6819c9067ba2a7cc4e9b248d29b2e219ade7b27acd010192e50f7f,2025-05-28T18:15:29.530000 +CVE-2025-5136,0,1,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000 CVE-2025-5137,0,0,c83c907e9ec05e68313328484d50f5a3a65ffbd23d70539d45126ec5cf338d9e,2025-06-03T10:15:22.570000 CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000 CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000 @@ -296545,7 +296545,7 @@ CVE-2025-5183,0,0,c805e02643e0e27a9dd9169f81c14e80e19028c481797ace1339fadf2ddd19 CVE-2025-5184,0,0,0c83a5fa50189682781f691fc4b3c0711f14dbbbb155d47eaa329f84d4444e80,2025-06-03T15:46:21.597000 CVE-2025-5185,0,0,38d3e8df6b4bf723f8b7c203881d74ed487013508bbfe062800873a9ef93893c,2025-05-28T15:01:30.720000 CVE-2025-5186,0,0,f1c0dc9e00200ceb159990b282fc6fc2adc0cb5ea875d85c26223f5d5865c3f8,2025-05-28T18:15:33.550000 -CVE-2025-5190,0,0,70a052004bc045461af67b84ae1100d2a7e875422f170d4e9a768a5f2460c6a4,2025-05-30T16:31:03.107000 +CVE-2025-5190,0,1,b83fcbe64867ed5f66064afe0985f0f8e1099ccb823b90fa56196e26e3f4bf39,2025-05-30T16:31:03.107000 CVE-2025-5192,0,0,c8e62f23c9de7e8df2a7ff16a1e89f07fa53a95ef2f278e663f0dc7acfc08af7,2025-06-06T14:07:28.330000 CVE-2025-5196,0,0,e0938db7c97745bb3f3070e04c267d2314060f49f00cd38492cd5b468ae94740,2025-05-28T18:15:33.670000 CVE-2025-5198,0,0,81bd13d2a866ca7de4c3f2f26760c3d14afdd9d115b50ea3fd55967b3466e3f8,2025-05-28T15:01:30.720000 @@ -296567,11 +296567,11 @@ CVE-2025-5215,0,0,b474fef582698d1da247f3d19a45fd39f888869bffdeede119632bb605f572 CVE-2025-5216,0,0,055c6e0bf462827ac1da33850cd24c0034f80451f364dc70e380ec186ecf86e2,2025-06-05T15:59:14.990000 CVE-2025-5217,0,0,845e58cc2a7cf7d636f8550dca345401beab30372e211227ca46148f5ec7226e,2025-06-05T15:58:28.290000 CVE-2025-5218,0,0,1e3c0e444a44984ee7f56e05d3f73c2542844250923c93b4721e1f91900b8427,2025-06-05T15:58:31.370000 -CVE-2025-5219,0,0,fbe1fa73aedb4fbd97c687001f76584c875629796a3a86d963442a74065f5fe6,2025-05-28T15:01:30.720000 -CVE-2025-5220,0,0,01714d41c936d281129b6f4914f8bf3f17a3457584ae2a1e25d883595532f804,2025-05-28T15:01:30.720000 +CVE-2025-5219,0,1,a3cbd2aef4ce6a58be527a32b107e1b69333e524d15b7f7fb05a80a61572dd1b,2025-05-28T15:01:30.720000 +CVE-2025-5220,0,1,ad87e3d30efe66514c3b6c88a1ab013a78e6b90a599f10c270ffea96c6ecf33d,2025-05-28T15:01:30.720000 CVE-2025-5221,0,0,76b4b126f1bc556c52431d11cb00bdcb2a0f2b01d264f4d49c244dec0f4ae94a,2025-05-28T15:01:30.720000 -CVE-2025-5222,0,0,373759e82235421b7a590f5f6a94a08734e18a3190661ebc7deff07cbe571625,2025-05-28T15:01:30.720000 -CVE-2025-5223,1,1,eedcac5c929aac409f34f81cc2ec2de352a7f5b73ed89921b6a7fb323152d259,2025-06-07T23:15:22.067000 +CVE-2025-5222,0,1,f80b4651006f76581a0f11e89a1589708b41e90d125505313b9f47c711003228,2025-05-28T15:01:30.720000 +CVE-2025-5223,0,0,eedcac5c929aac409f34f81cc2ec2de352a7f5b73ed89921b6a7fb323152d259,2025-06-07T23:15:22.067000 CVE-2025-5224,0,0,fe1dde8170826294eeb006cd262e5a7be588d2b4007cd87274f687b8957160b1,2025-05-28T20:46:50.577000 CVE-2025-5225,0,0,e0f7a8aba15fff895101b090456eaee855f3c175e14c6b8dc2047e796322aa04,2025-05-28T20:38:39.167000 CVE-2025-5226,0,0,980540ab1b1d279e62959a4ba73d7e24cf3246c85b025673be4e06737ce5ba1c,2025-05-28T15:01:30.720000 @@ -296584,7 +296584,7 @@ CVE-2025-5232,0,0,94f780db8b43929a33d0ebce8e4a0421854097c69daa52f40cf1b8be5db5d1 CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000 CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000 CVE-2025-5239,0,0,7898c1e396cfbf8baf8b107169103de7dd241d1dc63468b7841c136fc0bb5fc9,2025-06-06T14:06:58.193000 -CVE-2025-5242,1,1,3430448059313f76ae0f8dcef9fc481fd3cfce1823da3d8abe54d77d5e6c274d,2025-06-07T23:15:22.130000 +CVE-2025-5242,0,0,3430448059313f76ae0f8dcef9fc481fd3cfce1823da3d8abe54d77d5e6c274d,2025-06-07T23:15:22.130000 CVE-2025-5244,0,0,f16a7ad73436a8b188ea427e076cb6d66c3866f0d06770cfebf2ea7a2f86cb34,2025-05-28T15:01:30.720000 CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000 CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e82,2025-05-28T20:38:00.033000 @@ -296593,7 +296593,7 @@ CVE-2025-5248,0,0,354fd11447bc9fe4034996bca17e9d4af33bf34fe37dc0c74b25b8724779b6 CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b76,2025-05-28T15:01:30.720000 CVE-2025-5250,0,0,dcd6edbc7cb845dfb15b14bc09cddc26e98b0f3af5b9bd34a6caeb449702d2fd,2025-05-28T15:01:30.720000 CVE-2025-5251,0,0,c92bc64cbc5c80d1395afd727d86f0210c965e62a95faeaea45803d46499e451,2025-05-28T15:01:30.720000 -CVE-2025-5252,0,0,602f3789b759b097a18c8455f7aaa10959e65cbc7e798714b2f009bf5c2c1fcf,2025-05-28T15:01:30.720000 +CVE-2025-5252,0,1,51e9c8868255c2621d06ea1959abe8548147a11d32f6eb9675032857ef2959d9,2025-05-28T15:01:30.720000 CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000 CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000 @@ -296616,11 +296616,11 @@ CVE-2025-5279,0,0,81720af3c8cc837e31e88e83d11ebb304616a1e1b5e7e1af8c0ac6f8280ff2 CVE-2025-5280,0,0,3c6af0d30a51ecb706066ad212af1114fdaaf7f2415af1fe946985167145905d,2025-05-29T15:50:31.610000 CVE-2025-5281,0,0,4065baa6ec2536bda486e7298d71ac521380ba5a3be043da1b14156c61e3ebd6,2025-05-29T15:50:25.993000 CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000 -CVE-2025-5285,0,0,dca47c529893a81373a6ae069269dfa271e9349d111638cacf9d1bcc200c1b1d,2025-06-02T17:32:17.397000 +CVE-2025-5285,0,1,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000 CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000 CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000 -CVE-2025-5290,0,0,4ffa05f28c9659e1e1f70a32a2d7d1f69608185350f1b802817d91261d648079,2025-06-02T17:32:17.397000 -CVE-2025-5292,0,0,6685e6fab49a6f71479c88fef9a57e741264aa66bf0ea46c5e81d2f4172892d8,2025-06-02T17:32:17.397000 +CVE-2025-5290,0,1,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 +CVE-2025-5292,0,1,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b48,2025-06-02T17:32:17.397000 CVE-2025-5295,0,0,86992e97da5db3e66123dc758ac5a1f83b74ab998ea61bbd2f95d3d081833d3f,2025-05-28T15:01:30.720000 CVE-2025-5297,0,0,87f5c2ea55786c8b81963baa725b45d00523179cb7524fec69b00cb83e8c752e,2025-05-28T15:01:30.720000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 @@ -296631,8 +296631,8 @@ CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a1 CVE-2025-5321,0,0,31d96e00ea1024b8084a7837ef9bf0b4fd55d789d529b1f4fae375684c451003,2025-06-01T05:15:20.947000 CVE-2025-5323,0,0,b0785ba87cd1215b18904af4ecc0dec4461f38599fcb91263ef5f63563e48a70,2025-05-30T16:31:03.107000 CVE-2025-5324,0,0,78e349d2bd14065297b1365314e2e0d4a2b731776a4275b89f97d27f39ee4fa3,2025-05-30T16:31:03.107000 -CVE-2025-5325,0,0,d82e126894cc7351e394d1a1dad6b33b7eb2577ee318a5a223143d9a5a396539,2025-05-30T16:31:03.107000 -CVE-2025-5326,0,0,fec52c0dcee78c717cbb3b646040566b584b97d9dc130d2630145b5c1729a54b,2025-05-30T16:31:03.107000 +CVE-2025-5325,0,1,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a2d,2025-05-30T16:31:03.107000 +CVE-2025-5326,0,1,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000 CVE-2025-5327,0,0,c122b41cd4784d743ae12bd66678d79115777b161337566718924549ff9d5ace,2025-05-30T16:31:03.107000 CVE-2025-5328,0,0,417fcf6f51b727567848f3720a3768648afbb392d247fa240c0094835655e393,2025-05-30T16:31:03.107000 CVE-2025-5330,0,0,d834ad4ad61a847f16cff13c2e41a3edc0634ba2b8cfe9a60897f96120871dc7,2025-05-30T16:31:03.107000 @@ -296640,11 +296640,11 @@ CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5334,0,0,aae33d23bbf6c41c89830eb61bfdac6ed00173515e45aa173ca7510ab84466a1,2025-05-30T16:31:03.107000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 -CVE-2025-5341,0,0,7764c060e61d8cb7c4309ae991a7bb25dacf904c74848947da2999a2e54c55d9,2025-06-05T20:12:23.777000 -CVE-2025-5356,0,0,21392522e07ca9a487f30a83cb437c3946fac9f76c3d7bf47bcf1046c70d9769,2025-06-02T17:32:17.397000 -CVE-2025-5357,0,0,6d225f1517736407e2a985f06fb943b8c693ee3a8fb797d8fef47d394fbcd075,2025-06-02T17:32:17.397000 -CVE-2025-5358,0,0,db1fd286294db8040b1bdb4a6c8b2445c4920d6583d92ce80f74471f2c3e9ca3,2025-06-02T17:32:17.397000 -CVE-2025-5359,0,0,6872eab38593592d2ac8b60b8829baf13b29b09b97911624b463fcce371b0135,2025-06-02T17:32:17.397000 +CVE-2025-5341,0,1,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 +CVE-2025-5356,0,1,d2223801ca567247b6cb0c5b7ef4a510c84f7151648945f3dcaaa1c30308362b,2025-06-02T17:32:17.397000 +CVE-2025-5357,0,1,5ffac87c68c3d58819140208e19f32acf2a5d2446a9a83bf211e7c826fa75a53,2025-06-02T17:32:17.397000 +CVE-2025-5358,0,1,a571adceafdafc811f521f24b0330af92fa86d371ee0585eb9bd211008c5ed1d,2025-06-02T17:32:17.397000 +CVE-2025-5359,0,1,7a8f6dcf877628bd337b8ab2dabeb336b2618c3f523230568d00f0546df60b77,2025-06-02T17:32:17.397000 CVE-2025-5360,0,0,f6f6f0a68bcc88f729faa5e7b6e62c265dbe0f87de895580450e0ebfdb395bd6,2025-06-03T15:35:19.237000 CVE-2025-5361,0,0,63ed55da0a8819c3072e9ae5cbf20f6ad96bd8fa3415071144a15d946aef0cb0,2025-06-03T15:35:09.950000 CVE-2025-5362,0,0,33b74730f9e7ac14985e93de797c2da60e582983293fbae692e330f50a44162c,2025-06-03T15:34:57.473000 @@ -296653,71 +296653,71 @@ CVE-2025-5364,0,0,95a5e56210a5d35c1ea6e33ff22c35248d45f8b8e37cb258e052523a9909bc CVE-2025-5365,0,0,0d1ce8893a30ec21d7e83dd6a06faaa956ad93af9fce8162c82d46544a42f85c,2025-06-03T15:34:08.383000 CVE-2025-5367,0,0,d74e7f7b5df4373a6cb4c4912d3e92ada0700cf6b4dd42f020dd71a2e6663e2f,2025-06-03T15:33:39.070000 CVE-2025-5368,0,0,9330ec771717069f27ceda5473a12198f97847c6ad28dab99e3c2364851c8dad,2025-06-03T15:32:13.583000 -CVE-2025-5369,0,0,972604ef45925af569944bd9beb457f4f976d47cf3dd4c088b381c8005f3c50f,2025-06-02T17:32:17.397000 -CVE-2025-5370,0,0,82a251850084559b91e242285060e0c4abaf9bc7e82cc860e4eab24b23ff9ab2,2025-06-02T17:32:17.397000 +CVE-2025-5369,0,1,168c7bd4df19fbaf65329971bcfde2203a6db7b083d7a3d5d21d92d46e3163d3,2025-06-02T17:32:17.397000 +CVE-2025-5370,0,1,b8108fb76b6baed62fff6920571b278834427c11ce000292827743154d3b4777,2025-06-02T17:32:17.397000 CVE-2025-5371,0,0,16f45a240979d3e28a1f7ae1c207a37bd22e9e5d64cb4ee381668bed7ebf71f7,2025-06-04T14:31:41.573000 CVE-2025-5373,0,0,c749a6b1c61526825a3ec95e76f4d6286fc94a99723ecde6b20b472fbeaf94ea,2025-06-03T15:31:55.267000 CVE-2025-5374,0,0,08ec0fbe437c75568e797a6883653990f3916903b217127f6e162f78c26a7157,2025-06-03T15:31:45.257000 CVE-2025-5375,0,0,79ab6f61d55d13152e6cea237408e960f1fbc5f1ab43084ee7b9d3d96e5ce6a0,2025-06-03T15:31:34.527000 -CVE-2025-5376,0,0,767f922892e4f198a07a4d3c4bd62b52ad7663bdfadce9556e33dd86dee03fe9,2025-06-02T17:32:17.397000 -CVE-2025-5377,0,0,2399afc5a584b224c0f03f84e3b6a4e678bfb49aff7469b5d56f8cceeaa86dbf,2025-06-02T17:32:17.397000 -CVE-2025-5378,0,0,9f7ed04f1de786bdd2d9d69c07c5596ce5f130ac7f59918f74e0b6694512c231,2025-06-02T17:32:17.397000 -CVE-2025-5379,0,0,294bfe303a493f8ef507ba17f9eac6ff8ea9575ed74d65a826b9cb49f28068d3,2025-06-02T17:32:17.397000 -CVE-2025-5380,0,0,d2698228251ac462fcca2fde09225f28015054ecba201d2f3a6cd0f114b840ef,2025-06-02T17:32:17.397000 -CVE-2025-5381,0,0,48fe953e7db33ae55adc1994e89df9c2c8d3303fc812b0f464ace320e9f7084b,2025-06-02T17:32:17.397000 -CVE-2025-5382,0,0,4c535be2e59f00a8a4d6693d735d47dbaf22760438896c539c1776678c82914e,2025-06-05T20:12:23.777000 -CVE-2025-5383,0,0,604187d33907730681fb66d5eabea7aeb1612d589d61e20c7acbc08c0460fbcd,2025-06-02T17:32:17.397000 -CVE-2025-5384,0,0,ba3645146453549cc678861c53346aca8cbced7f3dae6428c6940bac203b56e1,2025-06-02T17:32:17.397000 -CVE-2025-5385,0,0,9bb4048a2c29a99e793bae7d912b910b776b19bca689291fe9f827bf5f2de55e,2025-06-02T17:32:17.397000 -CVE-2025-5386,0,0,42a5b893bad707068b1efb433cfb9f36d183e2e18bc5a32b968708c932097515,2025-06-02T17:32:17.397000 -CVE-2025-5387,0,0,67c063fa0aa8e78fe72ce8fb2808f65a9f1699e0a69507ee7a7e2cc276f4324c,2025-06-02T17:32:17.397000 -CVE-2025-5388,0,0,704011a1b4dcb0cdd9ec2d34beaa834c04dacb60a86d587f2653e924febc3992,2025-06-02T17:32:17.397000 -CVE-2025-5389,0,0,8aed18925806e84c75170ad2760b1c0d25854e094a7e1b95d4b307dbf824ecc1,2025-06-02T17:32:17.397000 -CVE-2025-5390,0,0,00c8952fb6387a3318dc8c0c729ad01c9f85d358d42813026e2eaf5af44dbf76,2025-06-02T17:32:17.397000 +CVE-2025-5376,0,1,39a14fa96d50f1baf719b3ad8d88b8f3a9b2d8e90c5b3fb82fa9a6817a5073aa,2025-06-02T17:32:17.397000 +CVE-2025-5377,0,1,2a0798779e7d52f49745b9feb07e61348c997b311ca9bddc8c055e3107eb6d7f,2025-06-02T17:32:17.397000 +CVE-2025-5378,0,1,cc5520629a7069706f7c6084705618298e02d67847501b12d08f886dd744c255,2025-06-02T17:32:17.397000 +CVE-2025-5379,0,1,babae66c34b79d220aa89dea42bf99c98467244dd3a186230eda29d38866e8d0,2025-06-02T17:32:17.397000 +CVE-2025-5380,0,1,176b1ee72b374b7a2508eced98587e37dc97b48f72df46ac15bbf19e005dd5e5,2025-06-02T17:32:17.397000 +CVE-2025-5381,0,1,4d14c7ebda54837df107f43a6a90f3a735aa13263eaac4c039951484a6236a16,2025-06-02T17:32:17.397000 +CVE-2025-5382,0,1,9079c2a9e6c4f8d6485de3e4de03758083c94f7f70711ced95ebca1375632a3c,2025-06-05T20:12:23.777000 +CVE-2025-5383,0,1,791613a1dc0e4e50e5577662482853d5ee06d080bccb63905c0f9aaea6635081,2025-06-02T17:32:17.397000 +CVE-2025-5384,0,1,f375db7813781db4bdacf08584da1154bf33f5ee0b6baa312008505a3e0ca931,2025-06-02T17:32:17.397000 +CVE-2025-5385,0,1,81d3a8bdc57f666b0adbd9c85ad08e2f03feda44c3cd53e81cdd7d6a3bcdb7d7,2025-06-02T17:32:17.397000 +CVE-2025-5386,0,1,bee43d085d0da8f3d71008308b9f2d43d838c3810cace4a325df0fad7a9295ae,2025-06-02T17:32:17.397000 +CVE-2025-5387,0,1,65ec5c965e0aa55c8047ca231400a6ecd9307463295059e1349de0bd80976c02,2025-06-02T17:32:17.397000 +CVE-2025-5388,0,1,a0253f0c3333e57e30f53ca748c2f786064d252af030391460f61763742994dc,2025-06-02T17:32:17.397000 +CVE-2025-5389,0,1,260909efcc6b6b292bffdc65b5b0e9633781d0b5c8c5ea87a3dce1c6319b67ab,2025-06-02T17:32:17.397000 +CVE-2025-5390,0,1,039345fdea46e1731d2841f7a4397db225f36b8f7cd62f23d1ae898d97067564,2025-06-02T17:32:17.397000 CVE-2025-5399,0,0,2760b717b030d03c7627cf67ecc731e4ba767e47a97334843123a895120dcc29,2025-06-07T08:15:20.687000 -CVE-2025-5400,0,0,da671ae8c2d66fc5c6bdf456b7568c47c14a63e2eaec6f212e8c3bf343de80d1,2025-06-02T17:32:17.397000 -CVE-2025-5401,0,0,4245aa491f1bcfc9fb02f8eb51cc6e6ebc19d4b47d7be55d9a852ceb2088c9b4,2025-06-02T17:32:17.397000 -CVE-2025-5402,0,0,d16efdcac5178a3a5fe41cd948ab906ef973bb6b51fe229ec95b16357a3b77a9,2025-06-02T17:32:17.397000 -CVE-2025-5403,0,0,0bd1ed0dc6f15641e9f6bfa7535a3c2481a8c7e857269890ac31422717dabd80,2025-06-02T17:32:17.397000 -CVE-2025-5404,0,0,9c4d7819170b94e8ddb22a0a123ef686006c2da9e1d5235ff5b7e86d18760004,2025-06-02T17:32:17.397000 -CVE-2025-5405,0,0,a3f3fab0ead746025c0b007ff623a72efa46b0db816a83b27e0e0d7221d2bd64,2025-06-02T17:32:17.397000 -CVE-2025-5406,0,0,9e5ca29ce9c25aaa25ee6c14b0ddec63e5996ffb10238856e09e4f680da75421,2025-06-02T17:32:17.397000 -CVE-2025-5407,0,0,565cc70a8aedeca74097514890a75be0b0019359945a1ab1514f22b38edcb7fc,2025-06-02T17:32:17.397000 -CVE-2025-5408,0,0,db3e2ded67f5dd503a83c682dc52fcf0f3daee2af167a420a8bdaa5bde866d68,2025-06-02T17:32:17.397000 -CVE-2025-5409,0,0,209b521ab5ccc30904997673163794c81e8bbcd661514ad5d6db90496c692a33,2025-06-02T17:32:17.397000 -CVE-2025-5410,0,0,8f6aec665b1901bf160e99989f915904c0b12f976e27a46b4117cb6a4d26984d,2025-06-02T17:32:17.397000 -CVE-2025-5411,0,0,bda57e821f06e7acb04b67298784cbbe1631c5e86f17b6a45cfc7ca79da6e664,2025-06-02T17:32:17.397000 -CVE-2025-5412,0,0,753b4152a593f449df2c00057cf330d4f98993025991e4c159242de574477a9d,2025-06-02T17:32:17.397000 +CVE-2025-5400,0,1,7cd289b1f8796f433468abfa83e965b2ae8c6d02300bfc34aeb9a97484dcc2f7,2025-06-02T17:32:17.397000 +CVE-2025-5401,0,1,7191cee0bc77ec5bd67bfc250972477b89f2f18db54f39596b26be9c1bb1595c,2025-06-02T17:32:17.397000 +CVE-2025-5402,0,1,45f6783233a4afb3eb11fc05c7cd975eca906300368aad5ba6a7385cf6bfa0ef,2025-06-02T17:32:17.397000 +CVE-2025-5403,0,1,b7784092ecc6f3a87e42e7b0240fbaed09cb8cf0459833dc28f094c26d89e82c,2025-06-02T17:32:17.397000 +CVE-2025-5404,0,1,ce5e31eee3c80f2ad412dfabd16b40c19d81bff9ff597bb5cde5ae7b82c11fee,2025-06-02T17:32:17.397000 +CVE-2025-5405,0,1,5fcaeeee8bf699a80c2fa3fe4d2798ff46c23308e1262163f6fe7f34f411bae1,2025-06-02T17:32:17.397000 +CVE-2025-5406,0,1,1edf46821fa558440a179b5e9d0682cfdf7f2b95c95a4879bfa16b0a0cb5b731,2025-06-02T17:32:17.397000 +CVE-2025-5407,0,1,b4ae60046ae6fef1141fec2d3d54964f6f96b96f9d0f16f2f795339dac8ae435,2025-06-02T17:32:17.397000 +CVE-2025-5408,0,1,4ea50252a3a1c6dbc6b050284f6928a887a07f0d5ebe1dc1421f53a664871129,2025-06-02T17:32:17.397000 +CVE-2025-5409,0,1,e19327c856251bb6630e10234de5c371173630bbc620fa2c6779542a53a31980,2025-06-02T17:32:17.397000 +CVE-2025-5410,0,1,60de637176ae188b21c928ddf29aeb5cb2d5057ec1cb9930e2bf7416d8e02e6f,2025-06-02T17:32:17.397000 +CVE-2025-5411,0,1,ad8be7495abcae78273f6c1ce2f42bd21b73f6b28a6ccf317309fd27de8359de,2025-06-02T17:32:17.397000 +CVE-2025-5412,0,1,cdedc82e39d6eb66906e9774b875480255e558374703496c9f6705513eee4b45,2025-06-02T17:32:17.397000 CVE-2025-5419,0,0,36b3b4fd8694c8182e333b12d51dc519287ba680aafbb848dd210da76090343d,2025-06-06T01:00:03.300000 -CVE-2025-5420,0,0,febb25c16bce360c4a759b2a4127c671c1e4f8d4aafbd5e7bf731b1578cd725f,2025-06-02T17:32:17.397000 -CVE-2025-5421,0,0,aaf7308ceb57221ad68dbb7db22ba2000af542ccf461039f6c7d796fca57cef7,2025-06-02T17:32:17.397000 -CVE-2025-5422,0,0,9e450c046e1f91b7dd55771f187d3de2563113f044a3b50f5e4e98096355fb9a,2025-06-02T17:32:17.397000 -CVE-2025-5423,0,0,1113abb12281376ec4a95c2e22a6cea20512767be435a5a19814cabdb304f19f,2025-06-02T17:32:17.397000 -CVE-2025-5424,0,0,a85ece3357434d0c9b2fe4f6cf6f6a096e978b68971f9bd817517adc676b5d38,2025-06-02T17:32:17.397000 -CVE-2025-5425,0,0,c6a103415a09261f17d6bacc2d51ffcd970ecd7792078e9597f3c99c30051abe,2025-06-02T17:32:17.397000 -CVE-2025-5426,0,0,6695a648a30f67eca5a5e0f79e674a51e2fc5e72c77bc5e065dbff4fe3f62bde,2025-06-02T17:32:17.397000 -CVE-2025-5427,0,0,53b569575fc7ae329cf4f520abf8a3056125680458eacc3ddd8fb7936d9442d6,2025-06-02T17:32:17.397000 -CVE-2025-5428,0,0,79cdbd7bff79acfa5c20aab80d4139d1b3b90f239524ccfe1a4affc92969bdc4,2025-06-02T17:32:17.397000 -CVE-2025-5429,0,0,089db2023d85f73ac2e21c7164c31e7754a45fcc1b2799cd0016564d1cf03890,2025-06-02T17:32:17.397000 -CVE-2025-5430,0,0,4d548160374dce86a977ce625ee08fe3a0bc6c866dfbc44977820d0dcd42f11f,2025-06-02T17:32:17.397000 -CVE-2025-5431,0,0,23c3a32087045a8d3d4088412a086903928cd1ddd4d9a4f57cd254ce149de8e7,2025-06-02T17:32:17.397000 -CVE-2025-5432,0,0,596798c265be734e9407c2fe2b349a5cb0f09f33c5c7af9447c8dbf2cf5f5bfd,2025-06-02T17:32:17.397000 -CVE-2025-5433,0,0,ee1c6d55dcff444255908a0bba5ad7421695641c3346d43fcaa2b2a049e83adf,2025-06-02T17:32:17.397000 -CVE-2025-5434,0,0,6ab3df63dbc0a2ee8defda49f0fb7793a40436e653689d62ed2758023cbac1ca,2025-06-02T17:32:17.397000 -CVE-2025-5435,0,0,7530a3ae97acd1c3194dd3b21cb13e8866aeda13b8fdc3e617255077a6727d93,2025-06-02T17:32:17.397000 -CVE-2025-5436,0,0,dea7caf9911ac56d7a4276582ffc050be7b227ccbd5d069da60bdeff73b549ce,2025-06-02T17:32:17.397000 -CVE-2025-5437,0,0,b4df5f09e17de4c53e6ae8359539a3c3b3b3d5e6c5320a12b5b99841efc86ff0,2025-06-02T17:32:17.397000 -CVE-2025-5438,0,0,28e2df5944f7dfe0afd426f71792ba319fc0645caefe22f4e3d716fbfb4d3f87,2025-06-02T17:32:17.397000 -CVE-2025-5439,0,0,cae4136fd27726f195a16ddbc08f745c8bd698a49f55876eb5399e8b0216a5bc,2025-06-02T17:32:17.397000 -CVE-2025-5440,0,0,ee15217663aa4ad12cc98edd272dcb8daf6739a71d8186181e18c4720c845591,2025-06-02T17:32:17.397000 -CVE-2025-5441,0,0,e385cf131482d9a424eb0f1d272064d0bfaeff1e3d3a9031a49bec8223977e52,2025-06-02T17:32:17.397000 -CVE-2025-5442,0,0,2a69877bffaf7ac9fc6c95b4336c5720e7b5d0f096cb71a98dcc1a590f615a6a,2025-06-02T17:32:17.397000 -CVE-2025-5443,0,0,1db902e66463971b330dd22c5d59c86686617eeef885bd375962edf0f30adbaa,2025-06-02T17:32:17.397000 -CVE-2025-5444,0,0,2d8ad7bdb6bbfd9ab8bc1c16f803c9edeaf72348cb64c37cc82448cae746617d,2025-06-02T17:32:17.397000 -CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f02,2025-06-02T17:32:17.397000 -CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000 -CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000 -CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000 +CVE-2025-5420,0,1,bf70756c39e9dea23b0c816e09f0dd8a8c0fec20f895b8da63a3c06b02366dd3,2025-06-02T17:32:17.397000 +CVE-2025-5421,0,1,d2e0e9bc35bbd320edcde1789430d242d275ec660582ad9c01dbcac65ffeff5e,2025-06-02T17:32:17.397000 +CVE-2025-5422,0,1,02f7c3476c5469022713fc6b775cbdd5242cd88c2274a9c13a17119daa901fed,2025-06-02T17:32:17.397000 +CVE-2025-5423,0,1,9fa639c46cd5f3996d2be465697ab976f6391ab53a4edd7bd2b79c526f5a92b6,2025-06-02T17:32:17.397000 +CVE-2025-5424,0,1,f116f9bc726afcccd2bba6778592ee021daa8d2c6f52a9ae8e78bdb44641c9df,2025-06-02T17:32:17.397000 +CVE-2025-5425,0,1,f739d3c954f21e30e12d5764f5b0ddd43364cd0e389aacb6bf3d440974c713aa,2025-06-02T17:32:17.397000 +CVE-2025-5426,0,1,b7f513d96610f55c7b953e45bcfd9f07575f75d8dea29cc2d9f2dd2600d71227,2025-06-02T17:32:17.397000 +CVE-2025-5427,0,1,4501934149db5b4cfc4454f95859f2d3cc4bf433b9db4b115367e3e4a10f02e9,2025-06-02T17:32:17.397000 +CVE-2025-5428,0,1,56579640d9e3280569408d31bde11a696b672083fb71307ceae93c06cf978492,2025-06-02T17:32:17.397000 +CVE-2025-5429,0,1,ffc34a876eabd6044cf8704e26931cad7b5affe99a2b0ad97e8c7c687e1dedbf,2025-06-02T17:32:17.397000 +CVE-2025-5430,0,1,721b5c88afc6da4a80e97b1a5ef8eaf94742f589c0f962267eb50a0332fec24b,2025-06-02T17:32:17.397000 +CVE-2025-5431,0,1,d9f4107965484122ffa06028626eceb6090f34ea0bd932635eb13ae97c7d4a30,2025-06-02T17:32:17.397000 +CVE-2025-5432,0,1,ad0aab0bef6f1136827f68f2f96d3a9b8e29aaa30711093620987a905f29a6c0,2025-06-02T17:32:17.397000 +CVE-2025-5433,0,1,eb15a384a821bba34241efb14a104b51e457d6e9711b3da2811d4d1957fe1a32,2025-06-02T17:32:17.397000 +CVE-2025-5434,0,1,9c74c53f1cf63c29a6c4f421d3e66dd8e0230e030b10a94ec340a164b1af82f4,2025-06-02T17:32:17.397000 +CVE-2025-5435,0,1,a07b000fdd10d693271c33e5855ef762ee79c33e1434ecbd5fe85a5e86df8fc5,2025-06-02T17:32:17.397000 +CVE-2025-5436,0,1,79ce2e03946bf46829683ce641eb6e62632f0261fbc1007a9d8df993bd98e559,2025-06-02T17:32:17.397000 +CVE-2025-5437,0,1,811a7dd33c5ee8133b31f658086585361c8a0965b92e0717d81b56b78c843fdd,2025-06-02T17:32:17.397000 +CVE-2025-5438,0,1,d0985e247d8ce1a92b6f4e2738cfa6ba90dfc930e6ad8b88fa8adf4eeb1c06e9,2025-06-02T17:32:17.397000 +CVE-2025-5439,0,1,3cf41ec943c23293f4dda106c2a9c964060d68097fffb17e42ce95be089b7218,2025-06-02T17:32:17.397000 +CVE-2025-5440,0,1,9fb3ee8b902bf4c82a55ea9cc309a96a9f5bc9b647e9bb2e28aea5dae7d84f37,2025-06-02T17:32:17.397000 +CVE-2025-5441,0,1,ac74c7cc0f531f603ebba9c2bca9d48918e26d19fe5966f70f4992ef7f9dc14a,2025-06-02T17:32:17.397000 +CVE-2025-5442,0,1,aff4e7dbcf6e16c07e1755fc79189c8c906002caae35c81216b58555f7942402,2025-06-02T17:32:17.397000 +CVE-2025-5443,0,1,d5d0b82969bf11c714f39e6c42d424b733ddc8bd47929ddba9bd0cb239ee6ac2,2025-06-02T17:32:17.397000 +CVE-2025-5444,0,1,ea6c0636dfee92671fcbe5fd9d2661a6e766c435ad916cee44dfb5b114ce02bc,2025-06-02T17:32:17.397000 +CVE-2025-5445,0,1,048fd814ef42199f053c2e82398be3c5147effcceabcbf3b1626ae84367b426b,2025-06-02T17:32:17.397000 +CVE-2025-5446,0,1,35d85a6b109786f1b24f687919ca0a0a29c0ef8c307735f4c4f3239f7042c652,2025-06-02T17:32:17.397000 +CVE-2025-5447,0,1,3f0e18d04d97ed4b37df377d5a284b98bec607376a89ae1ee717f001b4c6401a,2025-06-02T17:32:17.397000 +CVE-2025-5455,0,1,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000 CVE-2025-5473,0,0,3fe62f0104bf9a4b0a1d8ab027088b8f175238f5a4bdc7e000632cb2da20271a,2025-06-06T19:15:27.463000 CVE-2025-5474,0,0,36332de2185297aad47d710829277e2bb20c3868e01cf4164480d727b7485abb,2025-06-06T19:15:27.613000 CVE-2025-5480,0,0,d99165dc939dd1b33cdd36787937414a81409d6ee0fe6550da8ac1874c25f128,2025-06-06T19:15:27.757000 @@ -296738,19 +296738,19 @@ CVE-2025-5505,0,0,446964e3eb0d4dd76d452f5358cb34395ed631d401919996fdbc4c2592cb82 CVE-2025-5506,0,0,3d9429b6b10a6b3e06443a8965e5b7b16b7fc4e72fd23941fb117dff70e6229c,2025-06-04T14:54:33.783000 CVE-2025-5507,0,0,88ff57ec4c901427f803ec660f2ae97038e9ab3b77cea5b8bb8e00b7dddf7450,2025-06-04T14:54:33.783000 CVE-2025-5508,0,0,50f1e1ed990e9f1e208da7cb241edb6d0ec7f9869853e4df950fa84ca68b0bb5,2025-06-06T15:14:29.550000 -CVE-2025-5509,0,0,3539d4089740baa0eca62d43bab8c73fed0812e19e5915af924b9504eb2663fb,2025-06-04T14:54:33.783000 -CVE-2025-5510,0,0,7c73a3d3a6bffd7a0f894d33714060b119b1615808e95e627f2ffa67f393448b,2025-06-04T14:54:33.783000 +CVE-2025-5509,0,1,5929974d884b5a4d4fc156860278e7a1ab18276029a25a742adf216bbee3a66e,2025-06-04T14:54:33.783000 +CVE-2025-5510,0,1,6e321958a04f3e7ce0b9a2eb6bca74c7ddc1f7df8b01b3665f07e9e8d646baa1,2025-06-04T14:54:33.783000 CVE-2025-5511,0,0,dc11727eeaf3ff134ac86f7744e483b4844b784d2fb5f0ebbc7688ff688397cc,2025-06-04T14:54:33.783000 CVE-2025-5512,0,0,928bf241a04e6f233ea4797161d04d18b17e3498020465b77bbfd133375e0a8f,2025-06-04T14:54:33.783000 CVE-2025-5513,0,0,8b9deb8bfd077eaa06e3766c71deddefc7ec160546ad93b5bea3e81778183cb6,2025-06-04T14:54:33.783000 CVE-2025-5515,0,0,f79961a91b30f9e2454ef2ad8ea226c45534538ce6258faff70246141b067814,2025-06-04T14:54:33.783000 CVE-2025-5516,0,0,e46c0cac83b86ce3176774dfc5fcec7555beaf5b4cc847dd9f90d439ebb39443,2025-06-06T17:42:29.520000 -CVE-2025-5520,0,0,44141505222ef241703ec614a1ff4a30be75907eff83ac39140f2bf22fc427eb,2025-06-04T14:54:33.783000 -CVE-2025-5521,0,0,2095aca7402553e86899f1ab452e6d8dccb9d483d7d614c6abf50daa71fc7d34,2025-06-04T14:54:33.783000 +CVE-2025-5520,0,1,b437b4ee9aa8e841e3774d0b95ee5b515c56390eb6910a283290ac31a42dafe8,2025-06-04T14:54:33.783000 +CVE-2025-5521,0,1,020d023a574c593f850471199af8000603c84cca1f7b169920c2a0dfb090eedd,2025-06-04T14:54:33.783000 CVE-2025-5522,0,0,a6f0feb7c3dd1459fe736f4f5982460ecbcab99d78d309661631c0ee8cbfc4d4,2025-06-04T14:54:33.783000 -CVE-2025-5523,0,0,3d6f767d22c6db3d901c9fe460993f574c4cc4a691383d638625efefbfde064b,2025-06-04T14:54:33.783000 +CVE-2025-5523,0,1,3db88372cbc1cbb18787ac749ffbf9db8eaa6d8a017b7015b4abf369a593e9d6,2025-06-04T14:54:33.783000 CVE-2025-5525,0,0,8a6fda70c73f8d7caf337b44e8088af73f34b5d808b601ef429b01e524913c40,2025-06-06T17:27:21.350000 -CVE-2025-5527,0,0,5dead2f90bfa336b299d2790c248c3e2b665e86fc2c3c9c7ff0f4ee35f1af83c,2025-06-04T14:54:33.783000 +CVE-2025-5527,0,1,df26e082fd575c8053d5aaf00a7861d1af6fb5a0812fe71c052a1b13260a10c9,2025-06-04T14:54:33.783000 CVE-2025-5528,0,0,6361ca8ed5a8d00c711f415cb8430cc9f7678ed6bf73cc3ee4aabca88fed903b,2025-06-07T12:15:23.157000 CVE-2025-5531,0,0,6d27f31038761ad0a1ccad441f88039d5d4e8afb6e2422d32c208713130619d5,2025-06-04T14:54:33.783000 CVE-2025-5532,0,0,d307f7aa5ca0395a7c8a1bde45bdc53cca6e2426e0b9fc80212fdc7f65c5fbe7,2025-06-04T14:54:33.783000 @@ -296763,7 +296763,7 @@ CVE-2025-5541,0,0,391135ebadea81125a316a68624bd1db152869e9dddfca42493d694df648dd CVE-2025-5542,0,0,3ecc2ef85a02a09c9be7e6dbf30040d86ff640f6ba754495a5d8dbf30a0806ed,2025-06-06T18:47:37.757000 CVE-2025-5543,0,0,1ff545b0787bdb2f415332be5f3786ca673df4cb409c2ec190778560a2d9b13a,2025-06-06T18:47:47.150000 CVE-2025-5544,0,0,020a516e79a3f89efe59dfb651e1ec3f5e799cf4a3d54ccd47ef877829750c60,2025-06-04T14:54:33.783000 -CVE-2025-5545,0,0,389e1c995ff3b8301f082d6239329a262b969461cdde480fd8a11ba009de114a,2025-06-04T14:54:33.783000 +CVE-2025-5545,0,1,5b722d0348e3156f62a1773d62d4edcec25d2368307860fb58645c14a8d59b82,2025-06-04T14:54:33.783000 CVE-2025-5546,0,0,c014aea6b5432f9ec15a4f9236a0abd58e7be7ace9bb9e49f7a344a566124468,2025-06-04T14:54:33.783000 CVE-2025-5547,0,0,ad624e392a872fc040477ed96757114cbc2f98e534b38b49cf7cf171901251a1,2025-06-04T14:54:33.783000 CVE-2025-5548,0,0,590c16f8c57c95c6b0fc54003176d2c57cd3a4ed604f2d3d418aed1b64c7d579,2025-06-04T14:54:33.783000 @@ -296799,14 +296799,14 @@ CVE-2025-5582,0,0,d2f1baa22f55fc38a8f865d0e99938121f7ce9bfb4e6584060e61c164943f9 CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991ad,2025-06-04T17:44:26.393000 CVE-2025-5584,0,0,33fb5e30c150aff6fd49d9e5053812971ddea6fb06de04e2dfe2862137521fb0,2025-06-04T14:54:33.783000 CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000 -CVE-2025-5592,0,0,788797f86c46be9691efa8bf5e6ca7f39860f123d70f12f2bbf93e8b3cfcaa8b,2025-06-04T15:15:24.060000 +CVE-2025-5592,0,1,41e05346fb582fcf3c6d7bed546ead1c137aadc956085e3795ca151529549c96,2025-06-04T15:15:24.060000 CVE-2025-5593,0,0,2fc870a522f11936dac0dea9ff39b04ab227f9c952baf080bcd9f5e32f30e2b0,2025-06-05T20:12:23.777000 CVE-2025-5594,0,0,b27966499bfacb8dd28a0b76f2459af0a87ee57098cc25d08139feded7c76259,2025-06-05T20:12:23.777000 CVE-2025-5595,0,0,6fd2895568ff74e54f1725927ad75de212a244c65c2887bf2aa1787076195717,2025-06-05T20:12:23.777000 CVE-2025-5596,0,0,82e23e549f21aaf09e5e1c4b088111b178830006f56637c5b165470eaca69f89,2025-06-05T20:12:23.777000 -CVE-2025-5597,0,0,78cf40616f985d3cad04554e5602b7505997259b6d0943c31793a653c75cd7ef,2025-06-04T14:54:33.783000 -CVE-2025-5598,0,0,efb7880317f0049799157d10855cf28fe4a9c31a69fac19c47da1815d7ffbdb7,2025-06-04T14:54:33.783000 -CVE-2025-5599,0,0,15a37a27a802c624b46420c603dfdacb86e86e9291c7de3b2c0bfc691d08030c,2025-06-05T20:12:23.777000 +CVE-2025-5597,0,1,c6542e113819d36b9ca3595ae5f78250394d8b05f7ccd0ada2c6c9bddae0ce68,2025-06-04T14:54:33.783000 +CVE-2025-5598,0,1,3e6053accb2ad1c62c474f119bb1ce64d7f1c5c7b880697e1b74f6ef86954e5b,2025-06-04T14:54:33.783000 +CVE-2025-5599,0,1,4e40c7b89c8c9864da27ce4691c386207993ce9a8f9bbc40cae66d1618a7d3ac,2025-06-05T20:12:23.777000 CVE-2025-5600,0,0,ec384cb6ecf5880516ee231f4ac4b03c216224af5eddf6c197e3e90b27c21c9a,2025-06-05T20:12:23.777000 CVE-2025-5601,0,0,d110cb5e0e987f41c84d932ca577eb76fded00997009129ff3930d50ad06c883,2025-06-04T14:54:33.783000 CVE-2025-5602,0,0,d31a0a832243a6c21ea6404356e93d5a8f62fce2d86889f5d30233438d9a91c1,2025-06-05T20:12:23.777000 @@ -296848,41 +296848,41 @@ CVE-2025-5638,0,0,5fa603e90eeb98583ea40591c0f1493256693a05d984ab5725744a9282518d CVE-2025-5639,0,0,df69c796d2f2dcdd7b52222b3cca34eb33581a84dfcf4149ec44f708e4f12118,2025-06-06T20:12:28.340000 CVE-2025-5640,0,0,a28c86c8136e1feb945fccbeca2e1e5a219c046c15a8a6365d3963b3188e3fa7,2025-06-05T20:12:23.777000 CVE-2025-5641,0,0,df2f8e67412bd3c26e133e9c22b5aaffd184d651ccf7d91de52d048560bde551,2025-06-05T20:12:23.777000 -CVE-2025-5642,0,0,cdea268fbbf02c956db061288f1750dd3f9bc0dd95d487772829e46cead5e434,2025-06-05T20:12:23.777000 -CVE-2025-5643,0,0,411b63fa0707215c4790a86bfbfb2a22a354998e6b3a7e215f42cbf3494173d1,2025-06-05T20:12:23.777000 +CVE-2025-5642,0,1,3e36d4ed06584482143b20b533eabf4f74503b969fe44c47f9a5e57301d25d68,2025-06-05T20:12:23.777000 +CVE-2025-5643,0,1,f64857cbba9a486e68db6bf39a6682e2523c9f3d41a902ff63929690e5c32ccf,2025-06-05T20:12:23.777000 CVE-2025-5644,0,0,d60d5dc138f3c6f7665a40430162650bff18b3b25ea792c38aed95ece508dde3,2025-06-05T20:12:23.777000 -CVE-2025-5645,0,0,b334b6a75908b73184736be04dcdfa9a550e7f6a5f642d6d372135fdc400bd6f,2025-06-05T20:12:23.777000 +CVE-2025-5645,0,1,4709827fc4187848d80e03985eac7eeca7940fd2f1746e8979029ff17abfa1b0,2025-06-05T20:12:23.777000 CVE-2025-5646,0,0,2fff89e5f69774bf0290e16798e92cb561fb097e337cf23ea1fef978bc71b88a,2025-06-05T20:12:23.777000 -CVE-2025-5647,0,0,04b0aaa9da93e85e49a78e6e792d27cb8165082e9293d4fff2f6de8ac925ba56,2025-06-05T20:12:23.777000 -CVE-2025-5648,0,0,6ac7bd30998079a462b2bc55b6cfc8e5226c95680358c7ac74fbfcbda797048e,2025-06-05T20:12:23.777000 -CVE-2025-5649,0,0,30d42caea517c90bf1f7021dff1f808d9270a04d62d708de625ff00d2719d5f5,2025-06-05T20:12:23.777000 -CVE-2025-5650,0,0,2909155d6a53f122792d3e476ad36bbe0484dad5750217bd0dcf041153c745bb,2025-06-05T20:12:23.777000 -CVE-2025-5651,0,0,24cde1636f70e4b89cb882e89c8eff4d2956b5eaffc93a7e1b7d2d1cf201e123,2025-06-05T20:12:23.777000 +CVE-2025-5647,0,1,04c0fa928fcb1a5c135d2ada655645cde50c394ce2a4307fd438db3c37aeef0e,2025-06-05T20:12:23.777000 +CVE-2025-5648,0,1,96e93640f610667c70c48957a0d4bd5fc792d47f1dcc9dfd76ceecd1e0d80957,2025-06-05T20:12:23.777000 +CVE-2025-5649,0,1,448c5e556252feff63876eafed9d38c3b0932cf06a0db2fc26539e26dbe03cce,2025-06-05T20:12:23.777000 +CVE-2025-5650,0,1,87f3c3c120c063468fe229baab4f00edab29d85be2380535eae18ec0563c1f54,2025-06-05T20:12:23.777000 +CVE-2025-5651,0,1,6209ebc1ccd4a1f20f8cc371c1f66f629fc089e2785b3cc644626be9224d10b5,2025-06-05T20:12:23.777000 CVE-2025-5652,0,0,0724d88b1f9ce21bc0e0832801cf9e7e7f74020843d83266b3b7dd809f5e6ba7,2025-06-06T18:31:53.513000 -CVE-2025-5653,0,0,ebc9eb83de293a88516540da2ce2435411ee3546cd5862503970f7009364c6f2,2025-06-05T20:12:23.777000 -CVE-2025-5654,0,0,470669381fa89a79219bdd6634bdeceab6ff857036f45afc019f916775f0a0f6,2025-06-05T20:12:23.777000 -CVE-2025-5655,0,0,c796c17b7373b526172363b0234ec394ac17946bb8c4a3e20a583b4c47a9dc29,2025-06-05T20:12:23.777000 -CVE-2025-5656,0,0,b338b16f85071743f3b302134535a1f857dec7cd2cee9533740ff897ea1f7bf5,2025-06-05T20:12:23.777000 -CVE-2025-5657,0,0,71e7461c8138a6792ecd2f0932635df730ab7b98b19b67ac9a8e77bd098112dd,2025-06-05T20:12:23.777000 -CVE-2025-5658,0,0,dcee7864d155df2523a869996e1acf244f160fa00194028f996c749af64c6996,2025-06-05T20:12:23.777000 +CVE-2025-5653,0,1,d67f90066a64650fd07c71c53987fc320a100a4122fafd3c5ca0bf66911b12ac,2025-06-05T20:12:23.777000 +CVE-2025-5654,0,1,ac37000fc0a5c67183c860682e6cd76b640af07a5b604f1733acd7c742cb45bf,2025-06-05T20:12:23.777000 +CVE-2025-5655,0,1,0d0e81d708d4e5c3e35310162f70e9687943439e976750ed421c2cf3d3cf6a29,2025-06-05T20:12:23.777000 +CVE-2025-5656,0,1,5ab0dfd5eac6b051598855ee0c0f484fd750c7ce164470299b2100cb7c40a181,2025-06-05T20:12:23.777000 +CVE-2025-5657,0,1,9e332ef30ee6117f5e7ce2deefe86e1454a18b30e588530e6f579a92b8d13eb8,2025-06-05T20:12:23.777000 +CVE-2025-5658,0,1,7c4edfba5cac760f9dcdb78b99b7d36c29988f2c8898df730122297f7fe7ce17,2025-06-05T20:12:23.777000 CVE-2025-5659,0,0,2e9f4a0e418de16bd3132ecd2481fb9b9879d63feb5400e7c03179d6af45fcfd,2025-06-06T18:42:31.650000 CVE-2025-5660,0,0,d49a54f32a97bad23440ace013a3dd27ada7eeb7c7e0a58f71ba52213e92aef2,2025-06-06T18:42:59.143000 -CVE-2025-5661,0,0,8487e6a4666a69dba5b926ee889c5eb9849fbd0981bf9f397fc8b987e7d814e8,2025-06-05T20:12:23.777000 +CVE-2025-5661,0,1,d22ede1b5ac8256ec11f7d4e6774547649cae66e79ef4dfbebc78f3483796d4f,2025-06-05T20:12:23.777000 CVE-2025-5663,0,0,8c93d873d2b9bcbc305e1d9b46e20f6f681f336f769ee36ddc277777629edd2b,2025-06-06T18:43:14.380000 -CVE-2025-5664,0,0,3013c13b7f28a8a34239b9d6327d4d3f98fd81c78564ff317f65ad36bff38c71,2025-06-05T20:12:23.777000 -CVE-2025-5665,0,0,3cfde591a91c9aedc86fb3daccd90d9dab049587a7bfb0bf8cb91a53b3a7c91e,2025-06-05T20:12:23.777000 -CVE-2025-5666,0,0,adc46dea78cf5d2df08a3aff0d414721e4e000d8a87176352724dcee0cf64ddb,2025-06-05T20:12:23.777000 -CVE-2025-5667,0,0,fb9ad8936314077bd0556e4ab10f6636ff023079fcaf277e5878155eaea45611,2025-06-05T20:12:23.777000 +CVE-2025-5664,0,1,30931b2c13042b11b7b60910daf38207426745862a59590cdb56b739bd04f24b,2025-06-05T20:12:23.777000 +CVE-2025-5665,0,1,4af9267cc3c4d7515d0da96e1aabaa9d1714f2d5d087787bb7acb55bd95581eb,2025-06-05T20:12:23.777000 +CVE-2025-5666,0,1,e8e2dc91da9c7f684cc5a14c567138a40d5f5dca86096521cda3e5889ef99ce7,2025-06-05T20:12:23.777000 +CVE-2025-5667,0,1,cd6e5d8d99bf20121cabff7ac550550c03353988486ebeadde5e2949e64328cd,2025-06-05T20:12:23.777000 CVE-2025-5668,0,0,1211cddee03af2415de55db280d878d322f2813bac80f85800ef54efc47ebea3,2025-06-06T20:12:46.590000 CVE-2025-5669,0,0,e41cf90831d0a6cf4929e129e10c87880a3b230cc5343d610b4f26d94c5ca251,2025-06-06T19:39:31.743000 CVE-2025-5670,0,0,aa088ba5a44773ff1366ed76955e38f916db102440b97c97a352678ba98d3d07,2025-06-06T19:40:14.910000 -CVE-2025-5671,0,0,e1cb68a1a7e0ce2770bac37bb536d1554569874249823872f4fc248121eb36fe,2025-06-05T20:12:23.777000 -CVE-2025-5672,0,0,bec0b00b183687e8a6e63d1c861d9a4aaa1eb1c6829029f9f585e4f4a769b3ca,2025-06-05T20:12:23.777000 -CVE-2025-5674,0,0,f090282830840d43410a45e8dd19b0b1f93ee5e6b318e39fe0e7b2a1ab816f34,2025-06-05T20:12:23.777000 -CVE-2025-5675,0,0,2cbbcc65445c387821d2db309e144dfe905aa4bf09ea82e4d03a99dbc356e943,2025-06-05T20:12:23.777000 -CVE-2025-5676,0,0,00e6a1ebff7bf2a7f2994dcb4095163000c4b2b5e4e0d8e41b13858ffbebe1da,2025-06-05T20:12:23.777000 -CVE-2025-5677,0,0,a001ea9b76f78f3f1863e938aa2b1752ac60e19c978feacb4aa67789658c45d6,2025-06-05T20:12:23.777000 -CVE-2025-5679,0,0,59c0e847ad907b313509a8a7262ed706ea6357cc7a8feeba56ceeee73456c780,2025-06-05T20:12:23.777000 +CVE-2025-5671,0,1,eb8fc745fee34a3711d29fe25f4c5db1a3010a89ad41b22fe8685e426fcf1532,2025-06-05T20:12:23.777000 +CVE-2025-5672,0,1,b5f35a60b31667154d144333dd8af0cb05b469f7cf6c2dd3ee23c9b3b86a5c05,2025-06-05T20:12:23.777000 +CVE-2025-5674,0,1,9dacc216e72a5c21b2bb70260eaf6434ba5024915d4a375341ad992502176d52,2025-06-05T20:12:23.777000 +CVE-2025-5675,0,1,e69b73849e9b6e4fa37ed277920cb46c4fb8f58903a12efb83913cd73dd73fda,2025-06-05T20:12:23.777000 +CVE-2025-5676,0,1,f1cb78284fdf7c9104110b19aaefa10287c445e72aceb2bd0d0b5bbc7b7bd31e,2025-06-05T20:12:23.777000 +CVE-2025-5677,0,1,e1fd2dd1f7c92e781313ec950251f1d358d151486fbb0cb8bc3c7bf097d9eb1b,2025-06-05T20:12:23.777000 +CVE-2025-5679,0,1,39a76065dd3011f556df8ecc5c1607529488c249cbea269aa42dbb97296654d5,2025-06-05T20:12:23.777000 CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000 CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000 CVE-2025-5685,0,0,41f30934d37a68c0b6e306b8453424d3ff8a24b4556b1bfb8e01e5aa7db29ca9,2025-06-06T16:15:29.510000 @@ -296896,8 +296896,8 @@ CVE-2025-5696,0,0,b4091ee0fb4fa532c5f66065f45fdcbfe956ac564f6752fbce6c2f5c6e7f4f CVE-2025-5697,0,0,e16a3d80fb06f7ce0327380d6c48a4da47ce2498c4d874e03daa95c5a77d2485,2025-06-06T14:07:28.330000 CVE-2025-5698,0,0,516450620243a6336d536db4f711e75cf0a3068f72ea66a45708384556a39a46,2025-06-06T14:07:28.330000 CVE-2025-5699,0,0,0a1565e1ee571962b106c0d60bfe684a5661c8b79bdbf83ccaf5e242dffe56c7,2025-06-06T14:07:28.330000 -CVE-2025-5701,0,0,4e463ab950f8de8dad2504c9adb1bf69b81ba722d49ef312bfe8e0759a419475,2025-06-05T20:12:23.777000 -CVE-2025-5702,0,0,ee47ef64676a08151d4b3eb2425d567b0db2b91fed39f1554b45738f903b4519,2025-06-05T21:15:22.873000 +CVE-2025-5701,0,1,873890d0d7ee46e4c64243a1f1cf0740948dafdadf78be33a983ccdb225e9602,2025-06-05T20:12:23.777000 +CVE-2025-5702,0,1,f4b41a5876bf80125fd2f1b602bb755c8f57b5d1f34dfd56969670098c786271,2025-06-05T21:15:22.873000 CVE-2025-5703,0,0,94709a108b8c052e235b42f888b0029894770c90f72ee62feea2d3d3af8ba023,2025-06-06T14:07:28.330000 CVE-2025-5704,0,0,515adf76f484d2d077dbbf65ec74272a97df74bcb6a18d1d10ceba40eb288cba,2025-06-06T14:07:28.330000 CVE-2025-5705,0,0,9ada4d5865d2af97246c761bd5a6b2674b5b0939a7c2e2861d27e4a678a40a76,2025-06-06T14:07:28.330000