From bc654acd10f95f4283a4aaa37da8a5c742a6be1e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 24 Jun 2025 22:04:05 +0000 Subject: [PATCH] Auto-Update: 2025-06-24T22:00:24.828561+00:00 --- CVE-2024/CVE-2024-377xx/CVE-2024-37743.json | 60 ++++++++ CVE-2024/CVE-2024-487xx/CVE-2024-48766.json | 14 +- CVE-2024/CVE-2024-569xx/CVE-2024-56916.json | 39 +++++- CVE-2024/CVE-2024-569xx/CVE-2024-56917.json | 64 +++++++++ CVE-2024/CVE-2024-569xx/CVE-2024-56918.json | 39 +++++- CVE-2025/CVE-2025-445xx/CVE-2025-44531.json | 39 +++++- CVE-2025/CVE-2025-458xx/CVE-2025-45878.json | 8 +- CVE-2025/CVE-2025-458xx/CVE-2025-45880.json | 8 +- CVE-2025/CVE-2025-474xx/CVE-2025-47438.json | 47 ++++++- CVE-2025/CVE-2025-482xx/CVE-2025-48273.json | 27 +++- CVE-2025/CVE-2025-498xx/CVE-2025-49851.json | 78 +++++++++++ CVE-2025/CVE-2025-498xx/CVE-2025-49852.json | 78 +++++++++++ CVE-2025/CVE-2025-498xx/CVE-2025-49853.json | 78 +++++++++++ CVE-2025/CVE-2025-51xx/CVE-2025-5139.json | 86 ++++++++++-- CVE-2025/CVE-2025-524xx/CVE-2025-52471.json | 102 ++++++++++++++ CVE-2025/CVE-2025-525xx/CVE-2025-52571.json | 60 ++++++++ CVE-2025/CVE-2025-525xx/CVE-2025-52572.json | 60 ++++++++ CVE-2025/CVE-2025-528xx/CVE-2025-52880.json | 60 ++++++++ CVE-2025/CVE-2025-528xx/CVE-2025-52882.json | 78 +++++++++++ CVE-2025/CVE-2025-528xx/CVE-2025-52883.json | 60 ++++++++ CVE-2025/CVE-2025-528xx/CVE-2025-52884.json | 102 ++++++++++++++ CVE-2025/CVE-2025-528xx/CVE-2025-52888.json | 60 ++++++++ CVE-2025/CVE-2025-530xx/CVE-2025-53021.json | 71 ++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6122.json | 89 ++++++++++-- CVE-2025/CVE-2025-61xx/CVE-2025-6123.json | 83 +++++++++-- CVE-2025/CVE-2025-61xx/CVE-2025-6124.json | 83 +++++++++-- CVE-2025/CVE-2025-65xx/CVE-2025-6555.json | 70 ++++++++++ CVE-2025/CVE-2025-65xx/CVE-2025-6556.json | 60 ++++++++ CVE-2025/CVE-2025-65xx/CVE-2025-6557.json | 60 ++++++++ CVE-2025/CVE-2025-65xx/CVE-2025-6578.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-65xx/CVE-2025-6579.json | 145 ++++++++++++++++++++ README.md | 72 +++++----- _state.csv | 127 +++++++++-------- 33 files changed, 2106 insertions(+), 146 deletions(-) create mode 100644 CVE-2024/CVE-2024-377xx/CVE-2024-37743.json create mode 100644 CVE-2024/CVE-2024-569xx/CVE-2024-56917.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49851.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49852.json create mode 100644 CVE-2025/CVE-2025-498xx/CVE-2025-49853.json create mode 100644 CVE-2025/CVE-2025-524xx/CVE-2025-52471.json create mode 100644 CVE-2025/CVE-2025-525xx/CVE-2025-52571.json create mode 100644 CVE-2025/CVE-2025-525xx/CVE-2025-52572.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52880.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52882.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52883.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52884.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52888.json create mode 100644 CVE-2025/CVE-2025-530xx/CVE-2025-53021.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6555.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6556.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6557.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6578.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6579.json diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37743.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37743.json new file mode 100644 index 00000000000..5923ee2758c --- /dev/null +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37743.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-37743", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T20:15:23.767", + "lastModified": "2025-06-24T20:15:23.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in mmzdev KnowledgeGPT V.0.0.5 allows a remote attacker to execute arbitrary code via the Document Display Component." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mmz-001/knowledge_gpt/blob/main/knowledge_gpt/main.py", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@cnetsec/vulnerability-identified-in-knowledgegpt-version-0-0-5-5168ec081842", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json index 570cdd911f1..28f70e3377f 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48766", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-13T16:15:23.717", - "lastModified": "2025-06-23T14:59:36.530", + "lastModified": "2025-06-24T20:04:07.863", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,10 +70,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netalertxnetalertx:*:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*", "versionStartIncluding": "24.7.18", "versionEndExcluding": "24.10.12", - "matchCriteriaId": "D2D19236-3E00-4144-B81D-56268DEC39C6" + "matchCriteriaId": "F227D5E6-2F6A-46A0-90E6-80807725DDAB" } ] } @@ -93,8 +93,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory", - "Mitigation" + "Mitigation", + "Third Party Advisory" ] }, { @@ -102,8 +102,8 @@ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", - "Third Party Advisory", - "Mitigation" + "Mitigation", + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json index bf56e985079..e7e5e12fa3a 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56916", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-24T18:15:24.240", - "lastModified": "2025-06-24T18:15:24.240", + "lastModified": "2025-06-24T20:15:24.643", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Netbox Community 4.1.7, once authenticated, Configuration History > Add`is vulnerable to cross-site scripting (XSS) due to the `current value` field rendering user supplied html. An authenticated attacker can leverage this to add malicious JavaScript to the any banner field. Once a victim edits a Configuration History version or attempts to Add a new version, the XSS payload will trigger." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56917.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56917.json new file mode 100644 index 00000000000..52ef267cb69 --- /dev/null +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56917.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-56917", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T20:15:24.790", + "lastModified": "2025-06-24T20:15:24.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Netbox Community 4.1.7 is vulnerable to Cross Site Scripting (XSS) via the maintenance banner` in maintenance mode." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56917", + "source": "cve@mitre.org" + }, + { + "url": "https://youtu.be/GC8-PUlu2i8?si=eoScOk8IUJdwPDc_&t=172", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json index 30cdc205d72..7707de3287c 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56918", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-24T17:15:29.333", - "lastModified": "2025-06-24T17:15:29.333", + "lastModified": "2025-06-24T20:15:24.953", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Netbox Community 4.1.7, the login page is vulnerable to cross-site scripting (XSS), which allows a privileged, authenticated attacker to exfiltrate user input from the login form." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", diff --git a/CVE-2025/CVE-2025-445xx/CVE-2025-44531.json b/CVE-2025/CVE-2025-445xx/CVE-2025-44531.json index 3f0c73e346c..871df3a8915 100644 --- a/CVE-2025/CVE-2025-445xx/CVE-2025-44531.json +++ b/CVE-2025/CVE-2025-445xx/CVE-2025-44531.json @@ -2,7 +2,7 @@ "id": "CVE-2025-44531", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-24T16:15:27.703", - "lastModified": "2025-06-24T16:15:27.703", + "lastModified": "2025-06-24T20:15:25.100", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted before a pairing public key is received during a Bluetooth connection attempt." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "http://realtek.com", diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json index 3abc5996a0c..ae1ced6d0cb 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45878", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-17T17:15:33.487", - "lastModified": "2025-06-19T01:16:08.927", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-24T20:15:25.250", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,10 @@ } ], "references": [ + { + "url": "https://packetstorm.news/files/cve/CVE-2025-45878", + "source": "cve@mitre.org" + }, { "url": "https://www.miliaris.it/", "source": "cve@mitre.org", diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json index d7c2fef514e..f6afcc6182f 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45880", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-17T17:15:33.603", - "lastModified": "2025-06-20T11:16:37.750", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-24T20:15:25.410", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,10 @@ } ], "references": [ + { + "url": "https://packetstorm.news/files/cve/CVE-2025-45880", + "source": "cve@mitre.org" + }, { "url": "https://www.miliaris.it/", "source": "cve@mitre.org", diff --git a/CVE-2025/CVE-2025-474xx/CVE-2025-47438.json b/CVE-2025/CVE-2025-474xx/CVE-2025-47438.json index 94aaa4c69ef..3186b07695d 100644 --- a/CVE-2025/CVE-2025-474xx/CVE-2025-47438.json +++ b/CVE-2025/CVE-2025-474xx/CVE-2025-47438.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47438", "sourceIdentifier": "audit@patchstack.com", "published": "2025-05-23T13:15:37.550", - "lastModified": "2025-05-23T15:54:42.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-24T20:31:59.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.2", + "matchCriteriaId": "3EFCB840-A826-4382-8FCB-A4AA0AE160B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-plugin-2-3-1-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-482xx/CVE-2025-48273.json b/CVE-2025/CVE-2025-482xx/CVE-2025-48273.json index cae9bbef879..5e0fb200a29 100644 --- a/CVE-2025/CVE-2025-482xx/CVE-2025-48273.json +++ b/CVE-2025/CVE-2025-482xx/CVE-2025-48273.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48273", "sourceIdentifier": "audit@patchstack.com", "published": "2025-05-23T13:15:44.140", - "lastModified": "2025-05-23T15:54:42.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-24T20:30:34.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.3", + "matchCriteriaId": "EEF4383E-9AFB-4394-A6AC-4012ECB81089" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-arbitrary-file-download-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49851.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49851.json new file mode 100644 index 00000000000..9e4b8fd8429 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49851.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-49851", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-06-24T20:15:25.560", + "lastModified": "2025-06-24T20:15:25.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to an Improper Authentication vulnerability which could allow an attacker to bypass authentication and gain permissions in the product." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-05", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49852.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49852.json new file mode 100644 index 00000000000..63bb4b2ec79 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49852.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-49852", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-06-24T20:15:25.727", + "lastModified": "2025-06-24T20:15:25.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to a Server-Side Request Forgery vulnerability which could allow an unauthenticated attacker to retrieve information from other servers." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-05", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49853.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49853.json new file mode 100644 index 00000000000..ff60371744f --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49853.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-49853", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-06-24T20:15:25.873", + "lastModified": "2025-06-24T20:15:25.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to SQL injections which could allow an attacker to leak arbitrary information and insert arbitrary SQL syntax into SQL queries." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-05", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json index 768a9014f44..c81b3e32dc7 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5139.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5139", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T01:15:23.710", - "lastModified": "2025-06-11T14:15:37.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T20:29:44.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-77" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qualitor:qualitor:8.20:*:*:*:*:*:*:*", + "matchCriteriaId": "41C8B471-E62C-4185-91E8-C4360B35DFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qualitor:qualitor:8.24:*:*:*:*:*:*:*", + "matchCriteriaId": "40FD775B-0465-4EA0-8E11-97620D8431E1" + } + ] + } + ] } ], "references": [ { "url": "https://gist.githubusercontent.com/MatheuZSecurity/fe221fd5b2e5393abf76be42f11f52c3/raw/e8d9c63885f0b83b3374db3d31dbe2c69c868334/poc.sh", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.310220", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310220", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.572477", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.youtube.com/watch?v=Dq4C5s9Uwyo", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-524xx/CVE-2025-52471.json b/CVE-2025/CVE-2025-524xx/CVE-2025-52471.json new file mode 100644 index 00000000000..755d37a5877 --- /dev/null +++ b/CVE-2025/CVE-2025-524xx/CVE-2025-52471.json @@ -0,0 +1,102 @@ +{ + "id": "CVE-2025-52471", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T20:15:26.033", + "lastModified": "2025-06-24T20:15:26.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. An integer underflow vulnerability has been identified in the ESP-NOW protocol implementation within the ESP Wi-Fi component of versions 5.4.1, 5.3.3, 5.2.5, and 5.1.6 of the ESP-IDF framework. This issue stems from insufficient validation of user-supplied data length in the packet receive function. Under certain conditions, this may lead to out-of-bounds memory access and may allow arbitrary memory write operations. On systems without a memory protection scheme, this behavior could potentially be used to achieve remote code execution (RCE) on the target device. In versions 5.4.2, 5.3.4, 5.2.6, and 5.1.6, ESP-NOW has added more comprehensive validation logic on user-supplied data length during packet reception to prevent integer underflow caused by negative value calculations. For ESP-IDF v5.3 and earlier, a workaround can be applied by validating that the `data_len` parameter received in the RX callback (registered via `esp_now_register_recv_cb()`) is a positive value before further processing. For ESP-IDF v5.4 and later, no application-level workaround is available. Users are advised to upgrade to a patched version of ESP-IDF to take advantage of the built-in mitigation." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/espressif/esp-idf/commit/b1a379d57430d265a53aca13d59ddfbf2e7ac409", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-idf/commit/c5fc81917805f99e687c81cc56b68dc5df7ef8b5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-idf/commit/d4dafbdc3572387cd4f9a62b776580bc4ac3bde7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-idf/commit/d6ec5a52255b17c1d6ef379e89f9de2c379042f8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-idf/commit/df7757d8279871fa7a2f42ef3962c6c1ec88b8a2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-idf/commit/edc227c5eaeced999b5212943a9434379f8aad80", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-idf/security/advisories/GHSA-hqhh-cp47-fv5g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-525xx/CVE-2025-52571.json b/CVE-2025/CVE-2025-525xx/CVE-2025-52571.json new file mode 100644 index 00000000000..328e01c81ff --- /dev/null +++ b/CVE-2025/CVE-2025-525xx/CVE-2025-52571.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-52571", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T20:15:26.213", + "lastModified": "2025-06-24T20:15:26.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hikka is a Telegram userbot. A vulnerability affects all users of versions below 1.6.2, including most of the forks. It allows an unauthenticated attacker to gain access to Telegram account of a victim, as well as full access to the server. The issue is patched in version 1.6.2. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hikariatama/Hikka/commit/9a0e4b1b387ef828c345c43d990421d5afcff5f6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/hikariatama/Hikka/security/advisories/GHSA-vwpq-wm8w-44wf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-525xx/CVE-2025-52572.json b/CVE-2025/CVE-2025-525xx/CVE-2025-52572.json new file mode 100644 index 00000000000..922cb9bb1a9 --- /dev/null +++ b/CVE-2025/CVE-2025-525xx/CVE-2025-52572.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-52572", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T21:15:25.463", + "lastModified": "2025-06-24T21:15:25.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hikka, a Telegram userbot, has vulnerability affects all users on all versions of Hikka. Two scenarios are possible. 1. Web interface does not have an authenticated session: attacker can use his own Telegram account to gain RCE to the server by authorizing in the dangling web interface. 2. Web interface does have an authenticated session: due to insufficient warning in the authentication message, users were tempted to click \"Allow\" in the \"Allow web application ops\" menu. This gave an attacker access not only to remote code execution, but also to Telegram accounts of owners. Scenario number 2 is known to have been exploited in the wild. No known patches are available, but some workarounds are available. Use `--no-web` flag and do not start userbot without it; after authorizing in the web interface, close the port on the server and/or start the userbot with `--no-web` flag; and do not click \"Allow\" in your helper bot unless it is your explicit action that needs to be allowed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hikariatama/Hikka/security/advisories/GHSA-7x3c-335v-wxjj", + "source": "security-advisories@github.com" + }, + { + "url": "https://t.me/bbcode/9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52880.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52880.json new file mode 100644 index 00000000000..13c7b6f61fb --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52880.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-52880", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T20:15:26.373", + "lastModified": "2025-06-24T20:15:26.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Komga is a media server for comics, mangas, BDs, magazines and eBooks. A Cross-Site Scripting (XSS) vulnerability has been discovered in versions 1.8.0 through 1.21.3 when serving EPUB resources, either directly from the API, or when reading using the epub reader. The vulnerability lets an attacker perform actions on the victim's behalf. When targeting an admin user, this can be combined with controlling a server-side command to achieve arbitrary code execution. For this vulnerability to be exploited, a malicious EPUB file has to be present in a Komga library, and subsequently accessed in the Epub reader by an admin user. Version 1.22.0 contains a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-799" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gotson/komga/commit/5f9cc449b7846ed2066752c72c9ce7b20c3a85a7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gotson/komga/security/advisories/GHSA-m7mm-6jxp-2m4x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52882.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52882.json new file mode 100644 index 00000000000..dc28bbf2521 --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52882.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-52882", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T20:15:26.543", + "lastModified": "2025-06-24T20:15:26.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Claude Code is an agentic coding tool. Claude Code extensions in VSCode and forks (e.g., Cursor, Windsurf, and VSCodium) and JetBrains IDEs (e.g., IntelliJ, Pycharm, and Android Studio) are vulnerable to unauthorized websocket connections from an attacker when visiting attacker-controlled webpages. Claude Code for VSCode IDE extensions versions 0.2.116 through 1.0.23 are vulnerable. For Jetbrains IDE plugins, Claude Code [beta] versions 0.1.1 through 0.1.8 are vulnerable. In VSCode (and forks), exploitation would allow an attacker to read arbitrary files, see the list of files open in the IDE, get selection and diagnostics events from the IDE, or execute code in limited situations where a user has an open Jupyter Notebook and accepts a malicious prompt. In JetBrains IDEs, an attacker could get selection events, a list of open files, and a list of syntax errors. Claude released a patch for this issue on June 13th, 2025. Although Claude Code auto-updates when a user launch it and auto-updates the extensions, users should take the following steps, though the exact steps depend on one's integrated development environment (IDE). For VSCode, Cursor, Windsurf, VSCodium, and other VSCode forks, check the extension Claude Code for VSCode. Open the list of Extensions (View->Extensions), look for Claude Code for VSCode among installed extensions, update or uninstall any version prior to 1.0.24, and restart the IDE. For JetBrains IDEs including IntelliJ, PyCharm, and Android Studio, check the plugin Claude Code [Beta]. Open the Plugins list, look for Claude Code [Beta] among installed extensions, update or uninstall any version prior to 0.1.9, and restart the IDE." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1385" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/anthropics/claude-code/security/advisories/GHSA-9f65-56v6-gxw7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52883.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52883.json new file mode 100644 index 00000000000..b181f239909 --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52883.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-52883", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T21:15:26.030", + "lastModified": "2025-06-24T21:15:26.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Meshtastic-Android is an Android application for the mesh radio software Meshtastic. Prior to version 2.5.21, an attacker is able to send an unencrypted direct message to a victim impersonating any other node of the mesh. This message will be displayed in the same chat that the victim normally communicates with the other node and it will appear as using PKC, while it is not. This means that the victim will be provided with a false sense of security due to the green padlock displayed when using PKC and they'll read the attacker's message as legitimate. Version 2.5.21 contains a patch for the issue. It is suggested to implement a stricter control on whether a message has been received using PKC or using the shared Meshtastic channel key. Moreover, instead of showing no green padlock icon in the chat with no PKC, consider using an explicit indicator like, for example, the yellow half-open padlock displayed when in HAM mode. This remediation, however, applies to the client applications rather than the Meshtastic firmware." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/meshtastic/Meshtastic-Android/pull/1720", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/meshtastic/Meshtastic-Android/security/advisories/GHSA-h4rg-g6f3-ghh7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52884.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52884.json new file mode 100644 index 00000000000..eee0a534c34 --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52884.json @@ -0,0 +1,102 @@ +{ + "id": "CVE-2025-52884", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T21:15:26.207", + "lastModified": "2025-06-24T21:15:26.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RISC Zero is a zero-knowledge verifiable general computing platform, with Ethereum integration. The risc0-ethereum repository contains Solidity verifier contracts, Steel EVM view call library, and supporting code. Prior to versions 2.1.1 and 2.2.0, the `Steel.validateCommitment` Solidity library function will return `true` for a crafted commitment with a digest value of zero. This violates the semantics of `validateCommitment`, as this does not commitment to a block that is in the current chain. Because the digest is zero, it does not correspond to any block and there exist no known openings. As a result, this commitment will never be produced by a correct zkVM guest using Steel and leveraging this bug to compromise the soundness of a program using Steel would require a separate bug or misuse of the Steel library, which is expected to be used to validate the root of state opening proofs. A fix has been released as part of `risc0-ethereum` 2.1.1 and 2.2.0. Users for the `Steel` Solidity library versions 2.1.0 or earlier should ensure they are using `Steel.validateCommitment` in tandem with zkVM proof verification of a Steel program, as shown in the ERC-20 counter example, and documentation. This is the correct usage of Steel, and users following this pattern are not at risk, and do not need to take action. Users not verifying a zkVM proof of a Steel program should update their application to do so, as this is incorrect usage of Steel." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 1.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-159" + } + ] + } + ], + "references": [ + { + "url": "https://docs.beboundless.xyz/developers/steel/how-it-works#verifying-the-proof-onchain", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/risc0/risc0-ethereum/blob/ff0cb9253a87945b653b825711b8b5075f8b7545/examples/erc20-counter/contracts/src/Counter.sol#L56-L63", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/risc0/risc0-ethereum/commit/3bbac859c7132b21ba5fdf2d47f1dd52e7e73d98", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/risc0/risc0-ethereum/pull/605", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/risc0/risc0-ethereum/releases/tag/v2.1.1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/risc0/risc0-ethereum/releases/tag/v2.2.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/risc0/risc0-ethereum/security/advisories/GHSA-gjv3-89hh-9xq2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52888.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52888.json new file mode 100644 index 00000000000..2f5245421c5 --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52888.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-52888", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-24T20:15:26.700", + "lastModified": "2025-06-24T20:15:26.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. A critical XML External Entity (XXE) vulnerability exists in the xunit-xml-plugin used by Allure 2 prior to version 2.34.1. The plugin fails to securely configure the XML parser (`DocumentBuilderFactory`) and allows external entity expansion when processing test result .xml files. This allows attackers to read arbitrary files from the file system and potentially trigger server-side request forgery (SSRF). Version 2.34.1 contains a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/allure-framework/allure2/commit/cbcb33719851ff70adce85d38e15d20fc58d4eb7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/allure-framework/allure2/security/advisories/GHSA-h7qf-qmf3-85qg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-530xx/CVE-2025-53021.json b/CVE-2025/CVE-2025-530xx/CVE-2025-53021.json new file mode 100644 index 00000000000..9001dee9256 --- /dev/null +++ b/CVE-2025/CVE-2025-530xx/CVE-2025-53021.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2025-53021", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T20:15:26.867", + "lastModified": "2025-06-24T20:15:26.867", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A session fixation vulnerability in Moodle 3.x through 3.11.18 allows unauthenticated attackers to hijack user sessions via the sesskey parameter. The sesskey can be obtained without authentication and reused within the OAuth2 login flow, resulting in the victim's session being linked to the attacker's. Successful exploitation results in full account takeover. According to the Moodle Releases page, \"Bug fixes for security issues in 3.11.x ended 11 December 2023.\" NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/moodle/moodle/releases/tag/v3.11.18", + "source": "cve@mitre.org" + }, + { + "url": "https://moodledev.io/general/releases#moodle-311", + "source": "cve@mitre.org" + }, + { + "url": "https://rentry.co/moodle-oauth2-cve", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6122.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6122.json index 82bc6fdfb77..6625a9ae6c5 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6122.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6122.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6122", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T13:15:21.397", - "lastModified": "2025-06-17T20:50:33.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T20:14:31.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabian:restaurant_order_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AF358A06-EDAE-4512-B8F3-60EF2AFE61EF" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ez-lbz/poc/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312591", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312591", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592617", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592624", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6123.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6123.json index 756b92f2c1f..10e96983201 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6123.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6123.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6123", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T13:15:22.190", - "lastModified": "2025-06-17T20:50:33.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T20:12:20.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabian:restaurant_order_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AF358A06-EDAE-4512-B8F3-60EF2AFE61EF" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ez-lbz/poc/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312592", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312592", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592621", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6124.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6124.json index 150a7b5deb2..ebc0396591e 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6124.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6124.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6124", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T14:15:22.777", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T20:03:26.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabian:restaurant_order_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AF358A06-EDAE-4512-B8F3-60EF2AFE61EF" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ez-lbz/poc/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312593", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312593", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592625", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6555.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6555.json new file mode 100644 index 00000000000..716fa8b2e60 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6555.json @@ -0,0 +1,70 @@ +{ + "id": "CVE-2025-6555", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-06-24T20:15:27.100", + "lastModified": "2025-06-24T21:15:26.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Animation in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/407328533", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6556.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6556.json new file mode 100644 index 00000000000..39f5aa35762 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6556.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6556", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-06-24T20:15:27.227", + "lastModified": "2025-06-24T21:15:26.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient policy enforcement in Loader in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/40062462", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6557.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6557.json new file mode 100644 index 00000000000..56800a59f01 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6557.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6557", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-06-24T20:15:27.333", + "lastModified": "2025-06-24T21:15:26.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient data validation in DevTools in Google Chrome on Windows prior to 138.0.7204.49 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/406631048", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6578.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6578.json new file mode 100644 index 00000000000..67a2045b1d4 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6578.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6578", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-24T20:15:27.433", + "lastModified": "2025-06-24T20:15:27.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/delete_account.php. The manipulation of the argument admin_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/yangfan-lang/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313774", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313774", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.601763", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6579.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6579.json new file mode 100644 index 00000000000..aa9301a2d91 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6579.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6579", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-24T20:15:27.630", + "lastModified": "2025-06-24T20:15:27.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Car Rental System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /message_admin.php. The manipulation of the argument Message leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/yangfan-lang/cve/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313775", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313775", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.601764", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 72f140e5f66..bd998d0db81 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-24T20:00:20.349462+00:00 +2025-06-24T22:00:24.828561+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-24T19:49:04.033000+00:00 +2025-06-24T21:15:26.697000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299236 +299255 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `19` -- [CVE-2024-56916](CVE-2024/CVE-2024-569xx/CVE-2024-56916.json) (`2025-06-24T18:15:24.240`) -- [CVE-2025-23260](CVE-2025/CVE-2025-232xx/CVE-2025-23260.json) (`2025-06-24T18:15:24.533`) -- [CVE-2025-2566](CVE-2025/CVE-2025-25xx/CVE-2025-2566.json) (`2025-06-24T19:15:23.520`) -- [CVE-2025-49147](CVE-2025/CVE-2025-491xx/CVE-2025-49147.json) (`2025-06-24T18:15:25.247`) -- [CVE-2025-5087](CVE-2025/CVE-2025-50xx/CVE-2025-5087.json) (`2025-06-24T19:15:23.757`) -- [CVE-2025-53073](CVE-2025/CVE-2025-530xx/CVE-2025-53073.json) (`2025-06-24T18:15:26.813`) +- [CVE-2024-37743](CVE-2024/CVE-2024-377xx/CVE-2024-37743.json) (`2025-06-24T20:15:23.767`) +- [CVE-2024-56917](CVE-2024/CVE-2024-569xx/CVE-2024-56917.json) (`2025-06-24T20:15:24.790`) +- [CVE-2025-49851](CVE-2025/CVE-2025-498xx/CVE-2025-49851.json) (`2025-06-24T20:15:25.560`) +- [CVE-2025-49852](CVE-2025/CVE-2025-498xx/CVE-2025-49852.json) (`2025-06-24T20:15:25.727`) +- [CVE-2025-49853](CVE-2025/CVE-2025-498xx/CVE-2025-49853.json) (`2025-06-24T20:15:25.873`) +- [CVE-2025-52471](CVE-2025/CVE-2025-524xx/CVE-2025-52471.json) (`2025-06-24T20:15:26.033`) +- [CVE-2025-52571](CVE-2025/CVE-2025-525xx/CVE-2025-52571.json) (`2025-06-24T20:15:26.213`) +- [CVE-2025-52572](CVE-2025/CVE-2025-525xx/CVE-2025-52572.json) (`2025-06-24T21:15:25.463`) +- [CVE-2025-52880](CVE-2025/CVE-2025-528xx/CVE-2025-52880.json) (`2025-06-24T20:15:26.373`) +- [CVE-2025-52882](CVE-2025/CVE-2025-528xx/CVE-2025-52882.json) (`2025-06-24T20:15:26.543`) +- [CVE-2025-52883](CVE-2025/CVE-2025-528xx/CVE-2025-52883.json) (`2025-06-24T21:15:26.030`) +- [CVE-2025-52884](CVE-2025/CVE-2025-528xx/CVE-2025-52884.json) (`2025-06-24T21:15:26.207`) +- [CVE-2025-52888](CVE-2025/CVE-2025-528xx/CVE-2025-52888.json) (`2025-06-24T20:15:26.700`) +- [CVE-2025-53021](CVE-2025/CVE-2025-530xx/CVE-2025-53021.json) (`2025-06-24T20:15:26.867`) +- [CVE-2025-6555](CVE-2025/CVE-2025-65xx/CVE-2025-6555.json) (`2025-06-24T20:15:27.100`) +- [CVE-2025-6556](CVE-2025/CVE-2025-65xx/CVE-2025-6556.json) (`2025-06-24T20:15:27.227`) +- [CVE-2025-6557](CVE-2025/CVE-2025-65xx/CVE-2025-6557.json) (`2025-06-24T20:15:27.333`) +- [CVE-2025-6578](CVE-2025/CVE-2025-65xx/CVE-2025-6578.json) (`2025-06-24T20:15:27.433`) +- [CVE-2025-6579](CVE-2025/CVE-2025-65xx/CVE-2025-6579.json) (`2025-06-24T20:15:27.630`) ### CVEs modified in the last Commit -Recently modified CVEs: `37` +Recently modified CVEs: `12` -- [CVE-2025-30281](CVE-2025/CVE-2025-302xx/CVE-2025-30281.json) (`2025-06-24T18:15:24.700`) -- [CVE-2025-32442](CVE-2025/CVE-2025-324xx/CVE-2025-32442.json) (`2025-06-24T18:14:31.943`) -- [CVE-2025-44528](CVE-2025/CVE-2025-445xx/CVE-2025-44528.json) (`2025-06-24T18:15:24.873`) -- [CVE-2025-45475](CVE-2025/CVE-2025-454xx/CVE-2025-45475.json) (`2025-06-24T18:42:50.893`) -- [CVE-2025-46570](CVE-2025/CVE-2025-465xx/CVE-2025-46570.json) (`2025-06-24T18:25:31.883`) -- [CVE-2025-46722](CVE-2025/CVE-2025-467xx/CVE-2025-46722.json) (`2025-06-24T18:12:30.023`) -- [CVE-2025-48026](CVE-2025/CVE-2025-480xx/CVE-2025-48026.json) (`2025-06-24T18:15:25.070`) -- [CVE-2025-48746](CVE-2025/CVE-2025-487xx/CVE-2025-48746.json) (`2025-06-24T18:40:18.270`) -- [CVE-2025-48988](CVE-2025/CVE-2025-489xx/CVE-2025-48988.json) (`2025-06-24T19:49:04.033`) -- [CVE-2025-50213](CVE-2025/CVE-2025-502xx/CVE-2025-50213.json) (`2025-06-24T18:15:25.427`) -- [CVE-2025-50348](CVE-2025/CVE-2025-503xx/CVE-2025-50348.json) (`2025-06-24T18:15:25.610`) -- [CVE-2025-50349](CVE-2025/CVE-2025-503xx/CVE-2025-50349.json) (`2025-06-24T18:15:25.830`) -- [CVE-2025-50693](CVE-2025/CVE-2025-506xx/CVE-2025-50693.json) (`2025-06-24T18:15:26.080`) -- [CVE-2025-50695](CVE-2025/CVE-2025-506xx/CVE-2025-50695.json) (`2025-06-24T18:15:26.250`) -- [CVE-2025-50699](CVE-2025/CVE-2025-506xx/CVE-2025-50699.json) (`2025-06-24T18:15:26.433`) -- [CVE-2025-6020](CVE-2025/CVE-2025-60xx/CVE-2025-6020.json) (`2025-06-24T19:15:23.937`) -- [CVE-2025-6133](CVE-2025/CVE-2025-61xx/CVE-2025-6133.json) (`2025-06-24T19:44:40.803`) -- [CVE-2025-6404](CVE-2025/CVE-2025-64xx/CVE-2025-6404.json) (`2025-06-24T19:33:00.033`) -- [CVE-2025-6405](CVE-2025/CVE-2025-64xx/CVE-2025-6405.json) (`2025-06-24T19:16:58.253`) -- [CVE-2025-6406](CVE-2025/CVE-2025-64xx/CVE-2025-6406.json) (`2025-06-24T19:09:54.780`) -- [CVE-2025-6407](CVE-2025/CVE-2025-64xx/CVE-2025-6407.json) (`2025-06-24T19:04:59.000`) -- [CVE-2025-6408](CVE-2025/CVE-2025-64xx/CVE-2025-6408.json) (`2025-06-24T18:59:35.810`) -- [CVE-2025-6409](CVE-2025/CVE-2025-64xx/CVE-2025-6409.json) (`2025-06-24T18:55:59.940`) -- [CVE-2025-6418](CVE-2025/CVE-2025-64xx/CVE-2025-6418.json) (`2025-06-24T18:51:41.453`) -- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-24T19:15:24.063`) +- [CVE-2024-48766](CVE-2024/CVE-2024-487xx/CVE-2024-48766.json) (`2025-06-24T20:04:07.863`) +- [CVE-2024-56916](CVE-2024/CVE-2024-569xx/CVE-2024-56916.json) (`2025-06-24T20:15:24.643`) +- [CVE-2024-56918](CVE-2024/CVE-2024-569xx/CVE-2024-56918.json) (`2025-06-24T20:15:24.953`) +- [CVE-2025-44531](CVE-2025/CVE-2025-445xx/CVE-2025-44531.json) (`2025-06-24T20:15:25.100`) +- [CVE-2025-45878](CVE-2025/CVE-2025-458xx/CVE-2025-45878.json) (`2025-06-24T20:15:25.250`) +- [CVE-2025-45880](CVE-2025/CVE-2025-458xx/CVE-2025-45880.json) (`2025-06-24T20:15:25.410`) +- [CVE-2025-47438](CVE-2025/CVE-2025-474xx/CVE-2025-47438.json) (`2025-06-24T20:31:59.710`) +- [CVE-2025-48273](CVE-2025/CVE-2025-482xx/CVE-2025-48273.json) (`2025-06-24T20:30:34.620`) +- [CVE-2025-5139](CVE-2025/CVE-2025-51xx/CVE-2025-5139.json) (`2025-06-24T20:29:44.870`) +- [CVE-2025-6122](CVE-2025/CVE-2025-61xx/CVE-2025-6122.json) (`2025-06-24T20:14:31.217`) +- [CVE-2025-6123](CVE-2025/CVE-2025-61xx/CVE-2025-6123.json) (`2025-06-24T20:12:20.880`) +- [CVE-2025-6124](CVE-2025/CVE-2025-61xx/CVE-2025-6124.json) (`2025-06-24T20:03:26.497`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b6299b4e929..7a312566018 100644 --- a/_state.csv +++ b/_state.csv @@ -182643,7 +182643,7 @@ CVE-2021-40422,0,0,b971fd01b5bc057c3e488ed4ff7b9b27613e89afd8bd99bd4ca8f9673f7d5 CVE-2021-40423,0,0,c0c5615357871b9bb65a5fb3878995c209e626ca688ff336b687b74afea7a66a,2024-11-21T06:24:06.237000 CVE-2021-40424,0,0,5244f2b9abc5386279f66d3ef9cf68976de2310af8212373932a373e2599ee02,2024-11-21T06:24:06.380000 CVE-2021-40425,0,0,bc47b9d86f99ee00e1f49e380862134121778e11eedca0e38ff41710765e8646,2024-11-21T06:24:06.520000 -CVE-2021-40426,0,1,a0e871015e1f523aac0ed03b3b2e8a879b9613c8f4ac3b187e04f62b1c559249,2025-06-24T19:34:47.390000 +CVE-2021-40426,0,0,a0e871015e1f523aac0ed03b3b2e8a879b9613c8f4ac3b187e04f62b1c559249,2025-06-24T19:34:47.390000 CVE-2021-4043,0,0,7c411bb641646d2d49d19f232ba646ba4dbc23f30e6f8879dc685b937c62bbd3,2024-11-21T06:36:47.090000 CVE-2021-40438,0,0,59aa3bc892d7447f5106a0ff761c58e1e10116439c40f668b2dbda37cfbcaf55,2025-05-16T15:27:13.890000 CVE-2021-40439,0,0,535b0c6da5b7f855962a13da448f90293d26c05ee109bb73431674a7ebe9dbf2,2024-11-21T06:24:07.130000 @@ -198817,8 +198817,8 @@ CVE-2022-30171,0,0,ccd765640e5dda39ae7d1ad214009223ca6f1eaf2e1bb1a754b573673e94f CVE-2022-30172,0,0,28fb04851f9fe4a26d9534eaea9ca784e3c380b0bb6bd862d59514fd996d2f36,2025-01-02T19:16:21.130000 CVE-2022-30173,0,0,96c923acc0309d1ccc0a692e6296f3def0018c6e4c4cb8055662326ed0537491,2025-01-02T19:16:21.250000 CVE-2022-30174,0,0,db7939baee4b160ca5f12e2340bfada994a7467371f87b34ad853d8a97827d00,2025-01-02T19:16:21.367000 -CVE-2022-30175,0,1,9857ea94312c7b6929459013790267e32d3bb2dc544a4e21681f6d3abaca6580,2025-06-24T19:15:21.760000 -CVE-2022-30176,0,1,2d6b087ad2926ce0b0d58667275d81cc4a1b266dcf0e98347266123851ce435c,2025-06-24T19:15:21.980000 +CVE-2022-30175,0,0,9857ea94312c7b6929459013790267e32d3bb2dc544a4e21681f6d3abaca6580,2025-06-24T19:15:21.760000 +CVE-2022-30176,0,0,2d6b087ad2926ce0b0d58667275d81cc4a1b266dcf0e98347266123851ce435c,2025-06-24T19:15:21.980000 CVE-2022-30177,0,0,534c35369415b0ce21af47a33416afb945c385cc28aaa4ba2f29281327270d48,2025-01-02T19:16:21.490000 CVE-2022-30178,0,0,0c1d9bb3a779ace7846976f666ad10e21e102a6ad9c7c7b3e020788afee30b16,2025-01-02T19:16:21.597000 CVE-2022-30179,0,0,fd9668375b6bdc3bbfea5f72d745b1473aa042f289e2c883e8a137fd37d57926,2025-01-02T19:16:21.717000 @@ -198833,9 +198833,9 @@ CVE-2022-3019,0,0,699aa72743ebef964bd50c3b949d73c946ed800706a74517bc948b67f928f9 CVE-2022-30190,0,0,08f5866aed3a78222767864a40caedb7a6f80a63e932833896b1289b1baf0ebd,2025-04-04T19:53:19.093000 CVE-2022-30192,0,0,d0fa3f703c3532d2882a3ffa92d6ac8f74486d22b3b21d3b4689701d5ae7a39e,2025-01-02T19:16:22.460000 CVE-2022-30193,0,0,e1012bdeb2f7d44c596c9dd5b6f2695bb91fc936b857957cfbe4a94cfcf3bd11,2025-01-02T19:16:22.607000 -CVE-2022-30194,0,1,f7f98342b0ca52d90a763c9cfde6dad08fe1eef2ec114a2a4d7061265cf63e27,2025-06-24T19:15:22.143000 +CVE-2022-30194,0,0,f7f98342b0ca52d90a763c9cfde6dad08fe1eef2ec114a2a4d7061265cf63e27,2025-06-24T19:15:22.143000 CVE-2022-30196,0,0,d630c91b74c1c4b7e0d754215ec8c1c4e2a34e03a540b6072253efbdfc10da93,2024-11-21T07:02:20.707000 -CVE-2022-30197,0,1,d4fa14799079cfa1633dbc41dd06b2443fba9903d609b24af6bd78ddb8c1ebdd,2025-06-24T19:15:22.340000 +CVE-2022-30197,0,0,d4fa14799079cfa1633dbc41dd06b2443fba9903d609b24af6bd78ddb8c1ebdd,2025-06-24T19:15:22.340000 CVE-2022-30198,0,0,0d32174fb45d51c99aa2fa0959ed02b0ea2f959413ec0d36c41f0d1a17447f76,2025-01-02T22:15:08.783000 CVE-2022-30200,0,0,5241ceb1c6145dc1d6d735886dbf29a05232ee9d0864589a654564239835145a,2024-11-21T07:02:21.100000 CVE-2022-30202,0,0,e972eeec09af33d8e11218d92bbd7e9b24b58a7300790ae9cd2e59ea2d078df3,2024-11-21T07:02:21.243000 @@ -237904,9 +237904,9 @@ CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25 CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000 CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000 CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000 -CVE-2023-47030,0,1,ee90a36dfc63d39b5c6737d0f0403f4137bce21157cbc095a67d4039da28da25,2025-06-24T18:15:23.003000 -CVE-2023-47031,0,1,8c355c94ea255597d7cb2c2cedcc31b6f0c5e4c2f796647a5bcdfb2cafe77d57,2025-06-24T18:15:23.563000 -CVE-2023-47032,0,1,ab1b52e064cb5253285a61f10d0988b397ce325e3f6846f306333001f10f5273,2025-06-24T18:15:23.730000 +CVE-2023-47030,0,0,ee90a36dfc63d39b5c6737d0f0403f4137bce21157cbc095a67d4039da28da25,2025-06-24T18:15:23.003000 +CVE-2023-47031,0,0,8c355c94ea255597d7cb2c2cedcc31b6f0c5e4c2f796647a5bcdfb2cafe77d57,2025-06-24T18:15:23.563000 +CVE-2023-47032,0,0,ab1b52e064cb5253285a61f10d0988b397ce325e3f6846f306333001f10f5273,2025-06-24T18:15:23.730000 CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000 CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000 CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000 @@ -238138,8 +238138,8 @@ CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000 CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000 CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000 -CVE-2023-47295,0,1,b4a5a5866365997d4b67d82b14a920f11d08b865f6fbb000c9018e6db15b352d,2025-06-24T18:15:23.893000 -CVE-2023-47297,0,1,8949ada58483b5ab75d0893499dc33e938392dca9ba71df8235231fd2dbaa934,2025-06-24T18:15:24.060000 +CVE-2023-47295,0,0,b4a5a5866365997d4b67d82b14a920f11d08b865f6fbb000c9018e6db15b352d,2025-06-24T18:15:23.893000 +CVE-2023-47297,0,0,8949ada58483b5ab75d0893499dc33e938392dca9ba71df8235231fd2dbaa934,2025-06-24T18:15:24.060000 CVE-2023-47298,0,0,c409530cf61d56b21c99c649ee44169bc5e7d2ee17a3a9ef9a5831f4a402984b,2025-06-24T16:15:23.940000 CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000 CVE-2023-47304,0,0,db46d98bf37576c1ea41928ed0e02027d39d0face4fca78440b8bb53d0e89930,2024-11-21T08:30:07.553000 @@ -263936,6 +263936,7 @@ CVE-2024-37734,0,0,942d71720aad180ed2fca0dd3a14d392234ecbc7fd118327494f9ee9c137b CVE-2024-3774,0,0,7a7a597b589690c12f919940345595f31743063972f70d8b4f9ea657d33a59e6,2024-11-21T09:30:22.263000 CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb10b,2024-11-21T09:24:16.130000 CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000 +CVE-2024-37743,1,1,a4a5d908c1e5f23438af2420972a727c7b7b33e800b7231e1c263a7ff6eb4825,2025-06-24T20:15:23.767000 CVE-2024-3775,0,0,527f7d608f8da6f09f241b673d5077f6d9275917117f8ac6d0ce1a26efac2c10,2025-04-08T16:30:51.500000 CVE-2024-37758,0,0,6aad1ab20925aeaf835ed115698dffcd6067c2af6f08e49e2fb33789c105b9ec,2024-12-20T20:15:22.937000 CVE-2024-37759,0,0,606805366b9f9646e3d660f6895299941a599eeb90c9b36368cb920769a669bf,2025-06-13T15:00:19.157000 @@ -272205,7 +272206,7 @@ CVE-2024-48758,0,0,c09d45b53d733862ccc897703fc7912f82231522c6286fcce4bbe3e958aaf CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 CVE-2024-48760,0,0,c9b65d5513092443fa283195a16f32efdb1113d6591583c1dbffd494c29d665e,2025-06-06T15:40:58.640000 CVE-2024-48761,0,0,1f5cd512aaf966e4ccb5e27fcd626f0bc8944acedd5c7d09423e312b2b471403,2025-05-23T15:26:18.807000 -CVE-2024-48766,0,0,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000 +CVE-2024-48766,0,1,3d319b5c058d9d749f13d98533bf5750784663ff551cf13c1631f53c3b33fad5,2025-06-24T20:04:07.863000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 CVE-2024-4877,0,0,8ee4a62119f4539bb72579c9037b385657424188b9828b8e94e3040efd347d3a,2025-04-29T19:45:07.223000 @@ -275254,7 +275255,7 @@ CVE-2024-52584,0,0,05cc6e3ff103831ab044abd88984264aa401bf8364effed0d59f3a0b0d807 CVE-2024-52585,0,0,ec6dca20c0d1e2e11d329482fbb993991114f47c6c84853b2c9b256dbad974c0,2025-01-21T17:56:12.597000 CVE-2024-52586,0,0,58f589286929e8882eacc7b729bb00d229d8ba9e3044967da953354df2f3103c,2024-12-09T19:15:13.707000 CVE-2024-52587,0,0,093741097879cda7a1d072d6c7d9e1af9c512283049cdc93f827fcd9e8692ae7,2024-11-19T21:57:32.967000 -CVE-2024-52588,0,1,d93dca01502649fa529a9582eb9268586b55ad48fc3cef8b1968daa32b5aa797,2025-06-24T18:27:42.593000 +CVE-2024-52588,0,0,d93dca01502649fa529a9582eb9268586b55ad48fc3cef8b1968daa32b5aa797,2025-06-24T18:27:42.593000 CVE-2024-52589,0,0,2ede3d8e14bcd4cd62c69ebdead0066730ee6e16ed6485066625c524f6b6f183,2024-12-19T20:15:07.337000 CVE-2024-5259,0,0,119eff95bcd79b908feae8170e28a91f717570f021a6c1d47745ac47a3df8603,2024-11-21T09:47:17.697000 CVE-2024-52590,0,0,1028a6f90f9b7a4321325d6ca4f957230806c5f96e57aa2c07369ac6099e9733,2024-12-18T20:15:23.527000 @@ -278059,8 +278060,9 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7 CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000 CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000 CVE-2024-56914,0,0,064f87427a8016e13b3b895075549080817f6e33abdd6a0f7fbfa426e2cf3bd7,2025-05-21T16:11:27.750000 -CVE-2024-56916,1,1,c7d5ad5b7117370120da35f0a0cc152f26bc7f7f2bbdc82dfdb000918ce4c7c1,2025-06-24T18:15:24.240000 -CVE-2024-56918,0,0,c33d49aa25d6f86a90d66125bb3fa4f8c1f3395bb86bb2857d38cb118def057f,2025-06-24T17:15:29.333000 +CVE-2024-56916,0,1,8d791153df4968d3eeeb69a9c48a710c5c1054b60793c3fffc13c78de96c4f0f,2025-06-24T20:15:24.643000 +CVE-2024-56917,1,1,22eee042f4d8b258955468fa7b726ed4840860e6e36c91120f332296bae2e2f7,2025-06-24T20:15:24.790000 +CVE-2024-56918,0,1,52ee2653b76f15ba0701a308965e0214f9660afd1f602bc274c062083d531183,2025-06-24T20:15:24.953000 CVE-2024-5692,0,0,7a0e93b4132c5556301f236baef387bd61eb187dcc76da3b0d3022ff1bfb1690,2025-03-27T20:07:17.167000 CVE-2024-56921,0,0,65e4ee21eb8e6911078997661eaf48bf52901c948266f74aa9bcc9e4df1037c6,2025-04-22T14:58:46.420000 CVE-2024-56923,0,0,604a6006dae0a3ab9d362a51dab025175b10dba2548343a30a9a7501ead66a17,2025-05-28T20:41:45.083000 @@ -286680,7 +286682,7 @@ CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a24523 CVE-2025-2309,0,0,a6ed30f6db928700252c14d866d4f1b24100fd592c5a071eddc42a141ff853da,2025-05-28T18:13:22.980000 CVE-2025-23090,0,0,db1a04b33215738ef9ff89e7dd3243ce6839535b0728d9bb0d1927af1170accb,2025-02-11T00:15:29.570000 CVE-2025-23091,0,0,52be052e818e282e438c6b1d873e178494e11252bb26056a7aa314d364167b02,2025-03-13T13:15:57.990000 -CVE-2025-23092,0,1,0c045677b8dbc244389820c8601bdf99d62a4994ef2b5a6938a477c021d5857a,2025-06-24T18:15:24.360000 +CVE-2025-23092,0,0,0c045677b8dbc244389820c8601bdf99d62a4994ef2b5a6938a477c021d5857a,2025-06-24T18:15:24.360000 CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000 CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000 CVE-2025-23095,0,0,0618822b2ded21e46ba3e1edbcfb4291064bcf636b99986ad46a652a3e8a3349,2025-06-11T19:07:40.863000 @@ -286845,7 +286847,7 @@ CVE-2025-23252,0,0,e12066f57f061e1c4b5e4699b8ee1a8a5a3daff9b46ccac2c27af7cd070a9 CVE-2025-23253,0,0,f9de68ed984cf5e5c99edc68b635f242d07cc929f5185cb27e2c9dcd5ffcaea9,2025-04-23T14:08:13.383000 CVE-2025-23254,0,0,8be2e21d58ec3fd7d92ec8e896dd51db7ae8bc6c069a21e838d199f9a2844aa9,2025-05-02T13:53:20.943000 CVE-2025-2326,0,0,0ec0c28e6b995dc182a44a080592df606d562ca954869d7753960c79a6ff321c,2025-03-24T15:15:16.830000 -CVE-2025-23260,1,1,a5d9d0489a70d6468c825ab162de62afb168ba49891e415dfbb7364cd02af78f,2025-06-24T18:15:24.533000 +CVE-2025-23260,0,0,a5d9d0489a70d6468c825ab162de62afb168ba49891e415dfbb7364cd02af78f,2025-06-24T18:15:24.533000 CVE-2025-23264,0,0,f9f55c6ab3f856021f3d59a62b68073d28f2e99a6865786c21bf57a825095213,2025-06-24T16:15:25.990000 CVE-2025-23265,0,0,ead97c0f7d6d0ce35eef7c683ba86fe6d811e1fbadeed68b63d73fe74acfd606,2025-06-24T16:15:26.183000 CVE-2025-2327,0,0,623acf4a26d9d0a627c39d6e7bd3767484bbbf51b695c128c65dda426894e878,2025-06-17T20:50:23.507000 @@ -288780,7 +288782,7 @@ CVE-2025-25635,0,0,beaccf1b133ae432bcedfcf1b43f20544c4e5ac5d5d33afd3d44ae08bcd87 CVE-2025-2564,0,0,72f0725dc11f6141f688de953b6cd7fe92ceff4353be89860d243a851bc3375f,2025-04-17T20:22:16.240000 CVE-2025-2565,0,0,d818b817202e54e9a5012e130505725e396db90172452c9fc8295f5a728db99c,2025-03-20T17:15:39.450000 CVE-2025-25650,0,0,70ecf06880b4929e5c513a2918fa826b8f349cb5d8c6a838be654946b1198891,2025-03-19T19:15:45.910000 -CVE-2025-2566,1,1,3f576bf2a5e2a0c6696cdf65fe8ba15286831cea3bff17d831a264321aa21ca1,2025-06-24T19:15:23.520000 +CVE-2025-2566,0,0,3f576bf2a5e2a0c6696cdf65fe8ba15286831cea3bff17d831a264321aa21ca1,2025-06-24T19:15:23.520000 CVE-2025-25662,0,0,c96e7c4ce4828b127cfecbe8c3b1c592fd63fab7f23366d035bb178815dbdd25,2025-05-07T17:56:07.840000 CVE-2025-25663,0,0,5a746eea3634250332bacc9c924ac5e785f1cc29be7fb51e65232a0170bb6bbb,2025-03-17T15:10:12.850000 CVE-2025-25664,0,0,1da9718d556db2a8964602e6e91c5c694bfb0281423a38648b821b59368a1401,2025-03-17T15:19:50.133000 @@ -291169,7 +291171,7 @@ CVE-2025-3027,0,0,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285 CVE-2025-30279,0,0,d448c979e445565b7cd2b2a1e7afd76dcee33cb92f1fa7194b593febbd34ae4e,2025-06-09T12:15:47.880000 CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000 CVE-2025-30280,0,0,9e649a9f23b93eda27c1f50fd0b3e90f4f0b81671b304e63c7efcfa3cfc7c59d,2025-06-10T16:15:37.550000 -CVE-2025-30281,0,1,4b4cdb14d496af6cd5efa9496e2a458ca3e848949633190591630f6d9c6160ed,2025-06-24T18:15:24.700000 +CVE-2025-30281,0,0,4b4cdb14d496af6cd5efa9496e2a458ca3e848949633190591630f6d9c6160ed,2025-06-24T18:15:24.700000 CVE-2025-30282,0,0,b482189716a5f155cff967a6285e9586d359fd995d9f0381362b5ad6a67e05b8,2025-04-23T16:45:08.487000 CVE-2025-30284,0,0,162db13ccae5f50e496d74519ee047a9e12c27af2ae44b041119fe67a728a1cc,2025-04-21T18:38:24.560000 CVE-2025-30285,0,0,20337b4fe09e596eb652cc330ac7d6b03155a6c7a8739e1b757f89718c1d557c,2025-04-21T18:38:08.320000 @@ -293016,7 +293018,7 @@ CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2 CVE-2025-3244,0,0,83385a875e2316aa8147e21cd040f4a5fd2ca8ba35219f944564cb0a256174d9,2025-05-14T21:07:17.220000 CVE-2025-32440,0,0,004c1f988ec42bc68ac22b8510f67d6a4fd5129ce758999e8bed844a2d628005,2025-05-28T15:01:30.720000 CVE-2025-32441,0,0,12603f2d6ebdb3d224734288a6ec55dd99e6ec0404f09faa29d26745252d6321,2025-06-17T19:48:03.580000 -CVE-2025-32442,0,1,a19bc9b3bfdbb170e2a54c06398417632ac83866aa186bb6cdfcbcdd2418ad18,2025-06-24T18:14:31.943000 +CVE-2025-32442,0,0,a19bc9b3bfdbb170e2a54c06398417632ac83866aa186bb6cdfcbcdd2418ad18,2025-06-24T18:14:31.943000 CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c84d7,2025-05-28T19:12:58.377000 CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000 CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000 @@ -295604,9 +295606,9 @@ CVE-2025-4449,0,0,a4957afce4f7142f6de98a930c08f3af72a27d35a255f875466a14d7968c01 CVE-2025-4450,0,0,3a234a45502595c5094cecb641169b3c6bb9c5a2703faedd8d7ac4d76fabf6c2,2025-05-13T18:28:00.750000 CVE-2025-4451,0,0,eb5e97d618832a986e1251a65937eaefe5aeac1b9186d7c4d7161ef8e37a07a8,2025-05-13T18:27:53.877000 CVE-2025-4452,0,0,a8fae799b613cae7d9f6b10e972c55aeeb7cd837573978501121983f7c8e677a,2025-05-13T18:27:48.207000 -CVE-2025-44528,0,1,ea0c1c5551ac38728cf8cd8f73269c888541cf6b10a2720199171ccb78f13119,2025-06-24T18:15:24.873000 +CVE-2025-44528,0,0,ea0c1c5551ac38728cf8cd8f73269c888541cf6b10a2720199171ccb78f13119,2025-06-24T18:15:24.873000 CVE-2025-4453,0,0,17e7f2032ab18ade514049189b71ae429256843d9863fdf6f0e71917f98a2587,2025-05-13T18:27:42.267000 -CVE-2025-44531,0,0,cf9337ae957e30ce1437a8284880ed810d5383665a9fe576a8b549513525bc97,2025-06-24T16:15:27.703000 +CVE-2025-44531,0,1,1d4bca660c9e3a33023ad4a769fdfad7e0245a0495c8c3fd6da7d6d1884c016c,2025-06-24T20:15:25.100000 CVE-2025-4454,0,0,0824340d2335f0221b12fbeabb29b5c209c67a1c502e8896c89c5f037561d2e0,2025-05-13T18:27:36.160000 CVE-2025-4455,0,0,05a1a98b2065f53be9218ed1130540464e36b521788d55ad2e6b4dc77e4298ca,2025-05-12T17:32:52.810000 CVE-2025-4456,0,0,e7ef7ea8d16290e794f525db2ea37bc8abc1615ee5fb21b539df1843139a93b5,2025-05-12T17:32:52.810000 @@ -295790,7 +295792,7 @@ CVE-2025-4547,0,0,5a9f97c59a5517a42eb37b2bfaeb218892d8ce2e6447168e1978702b983649 CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19e21,2025-05-23T15:55:02.040000 CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000 CVE-2025-45474,0,0,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000 -CVE-2025-45475,0,1,7400d330caefeb635586e4a2df7792360a8bced766ed5816725e62dba811d485,2025-06-24T18:42:50.893000 +CVE-2025-45475,0,0,7400d330caefeb635586e4a2df7792360a8bced766ed5816725e62dba811d485,2025-06-24T18:42:50.893000 CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000 CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000 CVE-2025-45488,0,0,a4a677b217c9c59760c1fc85e8b2f493a1b1fd5df028087d0ead93cd4bfeadf3,2025-05-13T20:19:15.500000 @@ -295887,9 +295889,9 @@ CVE-2025-45864,0,0,b32f79c80f948a5502c692222ba63db7db0d85fc0944e6f9a68e63f94b3a1 CVE-2025-45865,0,0,367062564ab2fabd14817d58b3e7095878e7c26afaa0eb1dd77e8dfb0a65054e,2025-05-15T18:37:31.917000 CVE-2025-45866,0,0,48c16ba2c1a450558a2d650800240d515297efe6c8338a7502e000a11c7cf020,2025-06-17T19:39:56.640000 CVE-2025-45867,0,0,a78de81cad59bbc316e2ff4eacf13da0ca81d5efbf89eb838fbfcc576cba1eb1,2025-06-17T19:39:47.240000 -CVE-2025-45878,0,0,6b615553fc01027582e83444469fbebd12926b528a6fd0f4487cffdba07fc964,2025-06-19T01:16:08.927000 +CVE-2025-45878,0,1,76479685a387cf61a43f7a306424fbb1613728900c34c34b117627476b791297,2025-06-24T20:15:25.250000 CVE-2025-45879,0,0,a523ea1be4f66a907ee86b9ebd07662f0a00641a69e4600b6fb7654b16a506de,2025-06-19T01:17:35.180000 -CVE-2025-45880,0,0,d6009e96847d0cc665e67c44e11ad18e8a6fe1f096c5d31794e5f5262a109ea4,2025-06-20T11:16:37.750000 +CVE-2025-45880,0,1,3705fe6fc368f2fbd94d197728c7493a9d3bdf0bf25c0a8940fe6c0fa1b87358,2025-06-24T20:15:25.410000 CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000 CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000 CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000 @@ -296191,7 +296193,7 @@ CVE-2025-46566,0,0,24d113192be0c68059a74a8b38378d8007a4303882cf168243cb6e7bc5606 CVE-2025-46567,0,0,bc82994034cac9d270d67e3ad4b581e4a047083d44f54435e8936072aa047d70,2025-06-17T14:19:39.290000 CVE-2025-46568,0,0,74c299788a3c6fb1d3c1e3efa08198b5d781f2674e99fc634be9d4c153a96da1,2025-06-17T14:19:19.067000 CVE-2025-46569,0,0,596192ea2f2bcb27dcfadc2be8975c11484ebb4929879c1b0161098a09bd2300,2025-05-02T13:52:51.693000 -CVE-2025-46570,0,1,3a7d71dfa03ea1ee6cc52c35f9160ccde1edfd0230daf603f78c6e43fb159322,2025-06-24T18:25:31.883000 +CVE-2025-46570,0,0,3a7d71dfa03ea1ee6cc52c35f9160ccde1edfd0230daf603f78c6e43fb159322,2025-06-24T18:25:31.883000 CVE-2025-46571,0,0,ec40c548e59ec2be75a2b0d33168e02e13ceee62e8da0fa2f749740447b55702,2025-06-17T20:18:30.580000 CVE-2025-46572,0,0,28dde8d86fa55aa1ea84117c1d0345fbf475350364f56b6ef37599b1d624e547,2025-05-07T17:15:58.323000 CVE-2025-46573,0,0,ca3251581cb3d63fce0f3c6374f79f818d84db51c7e8d6a6353bbff633bffad2,2025-05-07T16:15:22.590000 @@ -296274,7 +296276,7 @@ CVE-2025-46719,0,0,b25887997950d7d3ab39998b5b94bb3c024854b8ada00a78d9ecb1ca2e7fd CVE-2025-4672,0,0,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000 CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000 CVE-2025-46721,0,0,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000 -CVE-2025-46722,0,1,058312ac701115def56c84c4304eb04943312378d61c6dc94bcd5a66046d7965,2025-06-24T18:12:30.023000 +CVE-2025-46722,0,0,058312ac701115def56c84c4304eb04943312378d61c6dc94bcd5a66046d7965,2025-06-24T18:12:30.023000 CVE-2025-46723,0,0,23909492a9ee443fd9ae3060d2ebc8db94328dcc9cf17248e4a0a9a7d6a6e953,2025-05-05T20:54:19.760000 CVE-2025-46724,0,0,e9c56e50a6ab4789521e42f1b57dca0731674d1f66af8a8445523cd7498bdd5d,2025-06-17T14:11:48.377000 CVE-2025-46725,0,0,8e8c8e4075573d4fde69baf7d78b34a0d5c2e139e0809a70649a8b9ab0bae8da,2025-05-21T20:24:58.133000 @@ -296708,7 +296710,7 @@ CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021 CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000 CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000 CVE-2025-47436,0,0,237fab5236a29a936ddec4296e97c247520a483bdac2818cb262b4ed8ed3b03e,2025-05-16T14:43:56.797000 -CVE-2025-47438,0,0,e67b62a7da948f4156f9f04b4d7adfa7c627a2f7ae4015919bf6a741e6305baf,2025-05-23T15:54:42.643000 +CVE-2025-47438,0,1,fe275acc338b569a2d62ee32dc5c16ecb5ee001c618cb63ef5ed13d7f9eff81b,2025-06-24T20:31:59.710000 CVE-2025-47439,0,0,9e2590af3e39eaaf4df056815f620875eb955b8d41acc282710b61d3864cc002,2025-05-08T14:39:18.800000 CVE-2025-4744,0,0,8ac8fc8161c3a14fee7dbc44d1d0ef695513c904757d01a3e069448c42b24428,2025-05-28T14:28:24.427000 CVE-2025-47440,0,0,e06a89f27d23fce3bb6f10f753f41f0ee18bbdfc4aa35328ce00fda4fa13fd7d,2025-05-08T14:39:18.800000 @@ -297145,7 +297147,7 @@ CVE-2025-48017,0,0,9a34c5624691c4b31b9da6fd15ca0fc4e18270c4bd854af7ea9f4320e0575 CVE-2025-48018,0,0,7761e8e3612ee9775c346d4dd8ae962e705b15ee05a70aaa71be1ec26a1b2484,2025-05-21T20:24:58.133000 CVE-2025-4802,0,0,9b6a9418451eb684dbaf46149299384f3fd784fd4730d7af0d79543a6096d43d,2025-06-17T14:09:23.137000 CVE-2025-48024,0,0,ac746fb497cccde7b671eda6326e72522381250e5b7c54697735594cf6f8aedc,2025-05-16T14:43:26.160000 -CVE-2025-48026,0,1,f0862038b825000099e62f2b540bf86c41bd4e58bbca3a19af6309b435a4871f,2025-06-24T18:15:25.070000 +CVE-2025-48026,0,0,f0862038b825000099e62f2b540bf86c41bd4e58bbca3a19af6309b435a4871f,2025-06-24T18:15:25.070000 CVE-2025-48027,0,0,1553e3de579c54b8c12347894e7e439de00450ca8ef6f8ae1617a684639bd852,2025-05-16T14:43:26.160000 CVE-2025-4803,0,0,73c30a61e3c897c21c431bf31e162f151c5503d3c44c21d44160de67be34a09b,2025-05-21T20:24:58.133000 CVE-2025-4804,0,0,f8b39e70bd38762aab6b504fb7be417981a55297f3e6e74902fda434f25564c4,2025-05-19T13:35:20.460000 @@ -297285,7 +297287,7 @@ CVE-2025-4827,0,0,d47a71d05b44889e1baa543d22084cfefaa52c46e4e9470b39e886fbf66c5c CVE-2025-48270,0,0,133fff98e194972f33f1094510d8ec4d32c15dd7e4436e5da8670dbbe1e924ad,2025-05-21T20:25:33.823000 CVE-2025-48271,0,0,0d70c386c119c388d6a35958b80bfcca32a964cf1daaeb05cdf206898628a3db,2025-05-23T15:54:42.643000 CVE-2025-48272,0,0,ef1d1975800386c78d6ca4b6bc18290441d554a80fc7cd7a85f2b4b3a85069b3,2025-06-17T14:10:18.237000 -CVE-2025-48273,0,0,67cd492822cbe488d3e17d3a0b555d0c75e1160c730171b1f2bc8ec2a9e3702d,2025-05-23T15:54:42.643000 +CVE-2025-48273,0,1,743f8589336bd54dbc90368ddc5d50b78d40da1d0fdb94b5e7cdd1102e3461a3,2025-06-24T20:30:34.620000 CVE-2025-48274,0,0,ea6932f3e35526b4983e326c0e31d340d7e9481b7030caff8a4c4fae3870e8da,2025-06-17T20:50:23.507000 CVE-2025-48275,0,0,06271179e2a87da02697af4b0abc688b6bd5dc4ddeaf28630e532e9232bd6560,2025-05-23T15:54:42.643000 CVE-2025-48276,0,0,0e141f1bba6aa60f05739d7c11f150d7139abee4704e3e4b24e80ad758f6c866,2025-05-21T20:25:33.823000 @@ -297450,7 +297452,7 @@ CVE-2025-48742,0,0,5f33c781ef30502ef2e246627292bc67d88c79205c0f59dcb70501ff4a68f CVE-2025-48743,0,0,c91acb6150f07a43c974b698b48df19455694c9a8c5f37e0bbd5aa9b807fb2bc,2025-06-09T18:50:50.927000 CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8955,2025-06-09T18:50:58.620000 CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000 -CVE-2025-48746,0,1,c0059252d48b7f3ff2e4968ec9339b0ef7a83be4ec062ed225f4e6bed94a5485,2025-06-24T18:40:18.270000 +CVE-2025-48746,0,0,c0059252d48b7f3ff2e4968ec9339b0ef7a83be4ec062ed225f4e6bed94a5485,2025-06-24T18:40:18.270000 CVE-2025-48747,0,0,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000 CVE-2025-48748,0,0,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000 CVE-2025-48749,0,0,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000 @@ -297582,7 +297584,7 @@ CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14 CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000 CVE-2025-48976,0,0,3699ed4335c5c4e0111d1b3001cdfd7d0fb9ec7d8a6822aad5fb5532328dd5c2,2025-06-17T20:50:23.507000 CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000 -CVE-2025-48988,0,1,89f3346fcc4cd557a41994a11d0d1a4d79127913ab475205777ebe370f1ad8d6,2025-06-24T19:49:04.033000 +CVE-2025-48988,0,0,89f3346fcc4cd557a41994a11d0d1a4d79127913ab475205777ebe370f1ad8d6,2025-06-24T19:49:04.033000 CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000 CVE-2025-48990,0,0,35250e6aeab8f33cddd6a2463ca29c89c0b5491c46e9371235f8d9552555aa3b,2025-06-02T17:32:17.397000 CVE-2025-48992,0,0,6b15fffcdbf47d08f32eb69350dfd721fbd263466b12b44b59139ec83ba254ec,2025-06-17T20:50:23.507000 @@ -297656,7 +297658,7 @@ CVE-2025-49142,0,0,41188906e2e357ed545217831b9fe6ff5a3bf2332267c22eb7e3625fae9f5 CVE-2025-49143,0,0,f4eeb95d1c1d44e21a5fc96f8952099f90b0864e5b98bced44a49fab091919bb,2025-06-12T16:06:39.330000 CVE-2025-49144,0,0,d6baaf8446ddc27e2900045d55963dde986363ee0e21198d87807207a0a091ed,2025-06-23T20:16:21.633000 CVE-2025-49146,0,0,a352cc011ba361436b876cbd0ba26f98777672335f155f665e464243f2d6320b,2025-06-12T16:06:20.180000 -CVE-2025-49147,1,1,a9684e104a7314ca6d799206a4c275f0f5247256f8b108f80b0d2067225733b1,2025-06-24T18:15:25.247000 +CVE-2025-49147,0,0,a9684e104a7314ca6d799206a4c275f0f5247256f8b108f80b0d2067225733b1,2025-06-24T18:15:25.247000 CVE-2025-49148,0,0,c3b7fb08d13ff41d0698bee1d7c392e956316a8e5553d1877a2eed546fcf4c94,2025-06-12T16:06:20.180000 CVE-2025-49149,0,0,798bf70c7539e563311e2175a9634dcea6df9b43d0cf6e2ed916f772705b4b0f,2025-06-18T13:46:52.973000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 @@ -297948,6 +297950,9 @@ CVE-2025-49848,0,0,b95bb6de409da27e91c496fa7bcb82f15f67ace27f6d4466f1b54c3146170 CVE-2025-49849,0,0,8297db97c7fc15aa30d3cd9f82603f74eb8025767596630d8a5943b91e5623f1,2025-06-17T20:50:23.507000 CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000 CVE-2025-49850,0,0,12adad2ef0b8f2b8f84392dc49cc67ba3aaa7a82a61194bcc9f25e9e29ca770a,2025-06-17T20:50:23.507000 +CVE-2025-49851,1,1,cd1671e74734e9433d8d1c1a7dfdb2c05032c5b1c344b8327bef7bad6553931c,2025-06-24T20:15:25.560000 +CVE-2025-49852,1,1,d57906ef4976a1da27ed3d5ffc91464b0d583b4999c2b0d0db9e8587c3d7fee1,2025-06-24T20:15:25.727000 +CVE-2025-49853,1,1,f727bc26c0686bd0314d683130359aa6f9f19c5d43e7fa532349231debbe12d4,2025-06-24T20:15:25.873000 CVE-2025-49854,0,0,f5d12af17846f0fca9e71d9d31730f998dce4ab78a93a5d3453eac74f8fffd56,2025-06-17T20:50:23.507000 CVE-2025-49855,0,0,12a30fead2c10e8a1f16941c2d9bd96761a3083b3c6087644c0beee9652251c1,2025-06-17T20:50:23.507000 CVE-2025-49856,0,0,65b96385792b64182569a68dca6312790744d597250b91f428a4357b1b5a6881,2025-06-17T20:50:23.507000 @@ -298085,7 +298090,7 @@ CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245 CVE-2025-50200,0,0,b04b8a83061873d5a6a0dfbc2d26e36b23b8e421c71e6c73bb812e0e2b22ba3b,2025-06-23T20:16:59.783000 CVE-2025-50201,0,0,e397412bd6740556a32b6ef41171e688861c9a78331735a48e0e16a19730511a,2025-06-23T20:16:59.783000 CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000 -CVE-2025-50213,0,1,20bb0c394425212b43c09eb07cfa4df290f56fca6a1a1af3d022687454f82e45,2025-06-24T18:15:25.427000 +CVE-2025-50213,0,0,20bb0c394425212b43c09eb07cfa4df290f56fca6a1a1af3d022687454f82e45,2025-06-24T18:15:25.427000 CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000 CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000 CVE-2025-5026,0,0,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000 @@ -298095,8 +298100,8 @@ CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0 CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000 CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000 CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000 -CVE-2025-50348,0,1,5dcc135486f0213433ed5f7b9f4c6109dd3d9fe6d3d0bdb0c3c8b785caf7d50a,2025-06-24T18:15:25.610000 -CVE-2025-50349,0,1,b49b29406173d64e5335448cb0b74a4731d700428c9c3e2789ccd64489f70a7b,2025-06-24T18:15:25.830000 +CVE-2025-50348,0,0,5dcc135486f0213433ed5f7b9f4c6109dd3d9fe6d3d0bdb0c3c8b785caf7d50a,2025-06-24T18:15:25.610000 +CVE-2025-50349,0,0,b49b29406173d64e5335448cb0b74a4731d700428c9c3e2789ccd64489f70a7b,2025-06-24T18:15:25.830000 CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000 CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000 CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000 @@ -298116,9 +298121,9 @@ CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818f CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000 CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000 CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee5a,2025-06-05T14:11:10.430000 -CVE-2025-50693,0,1,77d7a264f395ecd37be4362dfcef333ec41f63a55d0d036dd8ad801ed5481b00,2025-06-24T18:15:26.080000 -CVE-2025-50695,0,1,24255541539d4722d757b5efbae2f94dae559ed0d9e03dfa6a18bfccedc3bbac,2025-06-24T18:15:26.250000 -CVE-2025-50699,0,1,d03883afb531a0407dd93c6ae3cd8abd1203ef4972537744ebffd7bbc8a9a808,2025-06-24T18:15:26.433000 +CVE-2025-50693,0,0,77d7a264f395ecd37be4362dfcef333ec41f63a55d0d036dd8ad801ed5481b00,2025-06-24T18:15:26.080000 +CVE-2025-50695,0,0,24255541539d4722d757b5efbae2f94dae559ed0d9e03dfa6a18bfccedc3bbac,2025-06-24T18:15:26.250000 +CVE-2025-50699,0,0,d03883afb531a0407dd93c6ae3cd8abd1203ef4972537744ebffd7bbc8a9a808,2025-06-24T18:15:26.433000 CVE-2025-5071,0,0,884ba5d773bfa631189c2fa39c9690b3ec846f53f569c43eb315d4166f9f7924,2025-06-23T20:16:59.783000 CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000 CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000 @@ -298131,7 +298136,7 @@ CVE-2025-5080,0,0,5ca4d3a0576d52c7ccf6fb54daeff4d47265f015764c5af1447369359c7bc1 CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000 CVE-2025-5082,0,0,654b6f5ca85bdee04f191b4415361841f39b64a4d62ac7e373566ed9502c800a,2025-05-28T15:01:30.720000 CVE-2025-5086,0,0,a6cd7e037b880807c2087a0cc62e18cec32dfcc1b05281e63e13ff759a08d643,2025-06-04T14:54:53.980000 -CVE-2025-5087,1,1,07ad39aeba45900f8d7e9d1a34e5ab24787db24ec1c69e0683b71d0b11ef6f8f,2025-06-24T19:15:23.757000 +CVE-2025-5087,0,0,07ad39aeba45900f8d7e9d1a34e5ab24787db24ec1c69e0683b71d0b11ef6f8f,2025-06-24T19:15:23.757000 CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000 CVE-2025-5097,0,0,56796bb8120929c8a6a0858cf0e395b320ecbafdfb6f27c42e47f8367c9df40c,2025-06-07T23:15:22 CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000 @@ -298170,7 +298175,7 @@ CVE-2025-5136,0,0,6b76178b393ce786e02c90a2baf18e1605a6560667c6c5172f14e227aef611 CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000 CVE-2025-5138,0,0,93cb713787e8030d0af7953a6d4f76509c75980d651a759b2f51250e8b4fdca6,2025-06-20T05:15:29.257000 CVE-2025-51381,0,0,90017ba2f2fd86cff636ae17c3c22e5ea0f00724f257397ca0c300a57129132c,2025-06-18T13:46:52.973000 -CVE-2025-5139,0,0,478cd92def8402421385452923781dbb1e2d7c36d24453f72439415b1b27838f,2025-06-11T14:15:37.437000 +CVE-2025-5139,0,1,9584b8867ef5df5f63b980a8e2a9b849712a42f018080e8307dd4e64a561de8e,2025-06-24T20:29:44.870000 CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000 CVE-2025-5141,0,0,c15f6868f26f87e39a3f43de04f54fd301d39ee102b85bad5264f415113350ff,2025-06-17T20:50:23.507000 CVE-2025-5142,0,0,cfb77a196d5255a5a436db83dff520eaaa1d53cc832ec32bce9b0d13a0b8d87b,2025-06-04T18:29:34.470000 @@ -298279,6 +298284,7 @@ CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e CVE-2025-52464,0,0,78f6019e85d48ab55c32d91e272573030421c73ef856e07219b800e33247830e,2025-06-23T20:16:59.783000 CVE-2025-52467,0,0,16105c9074c96ad94abfdf299814ac8afdc45b40f5844eda614417a0d3d4ca0b,2025-06-23T20:16:59.783000 CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000 +CVE-2025-52471,1,1,0c62d382ed0af363c08f042f130801cb12a4f00ca1898ecf3fe6d67ae2476ac6,2025-06-24T20:15:26.033000 CVE-2025-52474,0,0,85659b730b44219986935e49453dd6cf44bae5c711fd564545190739032f0da6,2025-06-23T20:16:59.783000 CVE-2025-5248,0,0,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000 CVE-2025-52484,0,0,ec9ef999d2f72c8ffe8c4f7a55a34b60e694dfe44a26c58275639cad0c1b5155,2025-06-23T20:16:21.633000 @@ -298304,6 +298310,8 @@ CVE-2025-52566,0,0,a71a61d8e0acfb81b85cd8ba79f5e666a1dec736c73eb607b3678639cea84 CVE-2025-52568,0,0,c5c4449512757bdbf87c08ff7aa03ea210585f8118654ad489df4eddb6c078e6,2025-06-24T04:15:49.693000 CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000 +CVE-2025-52571,1,1,93605af77865e4b4bbd8aa8df37b6227ed19cbe7c36e4563dfbf22f7ad6141df,2025-06-24T20:15:26.213000 +CVE-2025-52572,1,1,c9098d5ca2a634c2c4a58c403cfc6222ba614b823936e2401333651171589a19,2025-06-24T21:15:25.463000 CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000 CVE-2025-5258,0,0,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000 CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000 @@ -298361,6 +298369,11 @@ CVE-2025-52877,0,0,c1d6e2b07ce02bba590986d3df9c7581e2aa81b981d3f15dad43eb041681d CVE-2025-52878,0,0,e55775b8d24e3fed0ad2e0acdd563793038173ab54bc92391fdb84ab91ed384a,2025-06-23T20:16:21.633000 CVE-2025-52879,0,0,36a19ea63eabffb0ae9b5df676b3f85180b31571a550ff8a02ef30a65c0880dd,2025-06-24T15:15:25.180000 CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000 +CVE-2025-52880,1,1,9cb07f316e3d88e0df580ddbed7ea9b43e79f625bd4ca243674ed28fb6c24809,2025-06-24T20:15:26.373000 +CVE-2025-52882,1,1,1202797e512191e9de7b995f3a96465f7bfc2ed3174a803e0c7dd48572c30229,2025-06-24T20:15:26.543000 +CVE-2025-52883,1,1,94a59b16d2725ff940e9d9c5d66af8696ae28208bd1cc6d6422de88432398bcc,2025-06-24T21:15:26.030000 +CVE-2025-52884,1,1,111efc59963d9cf24b8cfd776de05a966fe0af3c7a58d02e676305ff800577c2,2025-06-24T21:15:26.207000 +CVE-2025-52888,1,1,3d1af33939cf7d42fdad330956d26c92022bdd0439ccab86c4344f860a5a72bc,2025-06-24T20:15:26.700000 CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 CVE-2025-5291,0,0,30fc605f4380fb7e9cd3dc4c3c29792847dcfc90b0ea5fa3ca9a29d145a853dc,2025-06-17T20:50:23.507000 @@ -298396,9 +298409,10 @@ CVE-2025-52979,0,0,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000 +CVE-2025-53021,1,1,f00c7a7e87b168adf26db9622068d05e126e48777cea689658514ba01dbc3fdf,2025-06-24T20:15:26.867000 CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000 -CVE-2025-53073,1,1,40631a69d715def90dbb075cc363bdeeda8113b89f76a1f7b4efe8f3f1b90b63,2025-06-24T18:15:26.813000 +CVE-2025-53073,0,0,40631a69d715def90dbb075cc363bdeeda8113b89f76a1f7b4efe8f3f1b90b63,2025-06-24T18:15:26.813000 CVE-2025-5309,0,0,4f40b16e57161a0b02ce9c3f4d7e0ba4cf08b0282b7954a09175078f67da41cb,2025-06-17T20:50:23.507000 CVE-2025-5318,0,0,43978098e56851e5b415c4c8f175357a6aaaecebbdcfcfe803fcf95f094aa057,2025-06-24T14:15:30.523000 CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000 @@ -298897,7 +298911,7 @@ CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde082 CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 CVE-2025-6019,0,0,75f7b9a6441bde9d23f3280f372789289893c4b264a698bdbb1ec39f610d4315,2025-06-23T20:16:59.783000 -CVE-2025-6020,0,1,abdab1613cff203ff4225a4e83eb5a681c34a8b5248c090e738170300c0f3bd4,2025-06-24T19:15:23.937000 +CVE-2025-6020,0,0,abdab1613cff203ff4225a4e83eb5a681c34a8b5248c090e738170300c0f3bd4,2025-06-24T19:15:23.937000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000 @@ -298952,9 +298966,9 @@ CVE-2025-6118,0,0,0685f8bc63456947f39cb813f32e63b00ad26aefe40acb93f91c2a60b564b2 CVE-2025-6119,0,0,f2397a97fdcfcfefd56020b114cdceca470e084d11ab5523cb4c6f456586eecc,2025-06-17T19:38:01.073000 CVE-2025-6120,0,0,1caeb083f10b59771519c237665434e8bbff629e0f44ae8ecd728310046bbe95,2025-06-17T19:37:41.883000 CVE-2025-6121,0,0,ac34c215559700b52c27e4eb85187c0f90e04bada26cf85e1da5d5a006994f69,2025-06-17T19:37:29.160000 -CVE-2025-6122,0,0,79bab9242c697b56597a153f6c6518ac5d670e665734da46c0282253ae61aec7,2025-06-17T20:50:33.517000 -CVE-2025-6123,0,0,d43d6d94100d023989c481dec6c898d450ddbc20841ed4ddfcc99856183ef27f,2025-06-17T20:50:33.517000 -CVE-2025-6124,0,0,5b60d811bf3cb9ef911f8612e6315e9b0b0997b30f24c3bf22952f378649f104,2025-06-17T20:50:23.507000 +CVE-2025-6122,0,1,9512210d31f0e4aa9c3be187ffaab640323dcef8bc9e333d46732643321b9cbc,2025-06-24T20:14:31.217000 +CVE-2025-6123,0,1,34dda1a02964822924ca264397b7fe620121ce47eda2e36e01d9deda486e7dee,2025-06-24T20:12:20.880000 +CVE-2025-6124,0,1,182f443b3dae3d5c1247d45e79bef173f9714760ba9efbc0541c94f55ad4ed9f,2025-06-24T20:03:26.497000 CVE-2025-6125,0,0,5970139c3a7232cc38ae30cfaf06d3e6e8652a495caadea4bc949c7056e7b9ac,2025-06-24T15:55:55.897000 CVE-2025-6126,0,0,3cecc13780f04c9d6e12cff3225a1c82a52d01b6e334f4c31582b486f92d1a99,2025-06-24T15:56:04.113000 CVE-2025-6127,0,0,8dab39e6a86d655538962f0fbccf53772eb4e509addd8914bf2b696eca5c0d0f,2025-06-24T15:52:30.757000 @@ -298963,7 +298977,7 @@ CVE-2025-6129,0,0,c11fcf3a911a2d8d8c4b37d8252afa26669376fbb7214d4fcbed546932aa45 CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c81,2025-06-20T14:39:23.200000 CVE-2025-6131,0,0,2866309ab3a411ed34af4bfc174dd80cc2f38df6ce0809f56ec34a44e1386fa4,2025-06-17T20:50:23.507000 CVE-2025-6132,0,0,4820b926dce549d59ace28c44f962f1b682b6ad27fe3050ad7fcb6e14d23357a,2025-06-17T20:50:23.507000 -CVE-2025-6133,0,1,e8ce544a9effd7cb8b54da22c642c5245af611c0276c41dc8559e4d5a610718a,2025-06-24T19:44:40.803000 +CVE-2025-6133,0,0,e8ce544a9effd7cb8b54da22c642c5245af611c0276c41dc8559e4d5a610718a,2025-06-24T19:44:40.803000 CVE-2025-6134,0,0,e314e671c8bc5848fa55335e6580660a169004bde35b809cd5c9e61560c3067a,2025-06-17T20:50:23.507000 CVE-2025-6135,0,0,ee51cf2c4222bfb9ad2c176fca2a379a43397e990b2eb061f92b5c8b5b0a323a,2025-06-17T20:50:23.507000 CVE-2025-6136,0,0,e9caa20ba8500c81ebc641ee6a945f6f003a8d2240dcf3f113058eaffabd98de,2025-06-17T20:50:23.507000 @@ -299123,12 +299137,12 @@ CVE-2025-6400,0,0,050d0d6363f6b2b57212039373a92161d9cd1cb135bfc82abdd36bd0aee1b9 CVE-2025-6401,0,0,41bcaa672e80b250462eaf816ea1897a3f15a9912c9f639c6287203c9cfc6c07,2025-06-23T20:16:21.633000 CVE-2025-6402,0,0,61f85794e486fb4b78106646380066727801bf33e1255c6a929fd147edb24319,2025-06-23T20:16:21.633000 CVE-2025-6403,0,0,bbcb5e232fc7a419f24c71a04ba268c5b6911e1cbd015d94a543231775d1af9c,2025-06-23T20:16:21.633000 -CVE-2025-6404,0,1,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000 -CVE-2025-6405,0,1,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000 -CVE-2025-6406,0,1,2db684a16f4e28aaee6c2ddbef92630dbb3eb77bc0c3d22bde49da8224e470bc,2025-06-24T19:09:54.780000 -CVE-2025-6407,0,1,00f10b229214c0a1e897663a31513da61f75e551ec09dba31fa5834ec889a929,2025-06-24T19:04:59 -CVE-2025-6408,0,1,24bc650a9e4f70106abdd7486753dd6d722bbe75931df339c3a441d581f110ee,2025-06-24T18:59:35.810000 -CVE-2025-6409,0,1,6a99fb2614583059088998d144c12c76b7571f4cbfc4084cae8e639cd6f9ffd2,2025-06-24T18:55:59.940000 +CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000 +CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000 +CVE-2025-6406,0,0,2db684a16f4e28aaee6c2ddbef92630dbb3eb77bc0c3d22bde49da8224e470bc,2025-06-24T19:09:54.780000 +CVE-2025-6407,0,0,00f10b229214c0a1e897663a31513da61f75e551ec09dba31fa5834ec889a929,2025-06-24T19:04:59 +CVE-2025-6408,0,0,24bc650a9e4f70106abdd7486753dd6d722bbe75931df339c3a441d581f110ee,2025-06-24T18:59:35.810000 +CVE-2025-6409,0,0,6a99fb2614583059088998d144c12c76b7571f4cbfc4084cae8e639cd6f9ffd2,2025-06-24T18:55:59.940000 CVE-2025-6410,0,0,d5093121a62c3b03264c8b74cf8cee58e08566191457abd305673f3d7b08558c,2025-06-24T14:51:28.207000 CVE-2025-6411,0,0,0e09e6bd75e65ae7b58d0e0820c1abe7bd7d437f8f8a3059af1dd0350f51a6eb,2025-06-24T14:51:00.910000 CVE-2025-6412,0,0,079483de9c3bd0a5bc9a675e45d922c2a7f9e0ab5ec14494088543bc4cc27948,2025-06-24T14:45:30.210000 @@ -299137,7 +299151,7 @@ CVE-2025-6414,0,0,4eee093f61e0856e820fcce1dd983d848e970d6e3ba9a8157662d6a173a0c8 CVE-2025-6415,0,0,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c301,2025-06-24T14:42:25.020000 CVE-2025-6416,0,0,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000 CVE-2025-6417,0,0,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000 -CVE-2025-6418,0,1,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000 +CVE-2025-6418,0,0,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000 CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287cf,2025-06-23T20:16:21.633000 CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000 CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000 @@ -299154,7 +299168,7 @@ CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000 CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000 CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000 -CVE-2025-6436,0,1,b853ac3673b78035fe770c3a17866c9ee7f8480961c5c6348e20fee513806904,2025-06-24T19:15:24.063000 +CVE-2025-6436,0,0,b853ac3673b78035fe770c3a17866c9ee7f8480961c5c6348e20fee513806904,2025-06-24T19:15:24.063000 CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000 CVE-2025-6447,0,0,ccb7491a53a65edb2a46fa34f91bfc98d3e4b5a673ea57cbc2e7809ed2b6f681,2025-06-23T20:16:21.633000 CVE-2025-6448,0,0,8222bc4acb92d0f776e1d0bca83e07196c49a6462816bce44b6bf839e1dbed85,2025-06-23T20:16:21.633000 @@ -299227,6 +299241,9 @@ CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33 CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000 CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000 CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000 +CVE-2025-6555,1,1,114cca9488cafee39d37756e238c0d2f69e19e4f4c0a5da213567ed5b93ae9bb,2025-06-24T21:15:26.380000 +CVE-2025-6556,1,1,c6e48072ac1f722ffbe77e89fb25bd2086d687ccdda4664c3d68404a643bb5b9,2025-06-24T21:15:26.553000 +CVE-2025-6557,1,1,9c8d24f715ee56ef9d342378028aa791ae3be74b300c390b225046716ecd370d,2025-06-24T21:15:26.697000 CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000 CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000 CVE-2025-6565,0,0,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000 @@ -299235,3 +299252,5 @@ CVE-2025-6567,0,0,5d754149f93ad7069f2d6b06b39e9a8d3070555d19c5f3fd33d0f2fd359ea3 CVE-2025-6568,0,0,78c40c1dd546517356b970cf01de10a143e7aca6dbd9dbb56f6a07312247f2e6,2025-06-24T15:15:25.823000 CVE-2025-6569,0,0,a9a253cca959ecf71ee669abff58d1659a78fe1070e8dc321456c5ad3c982f46,2025-06-24T15:15:26.017000 CVE-2025-6570,0,0,201e9f805b1f4a20f4bf6639f714adc91a251017bc1b72fa4c7da0c06d10c7b0,2025-06-24T16:15:30.253000 +CVE-2025-6578,1,1,af2637c61ea16d05cecb01cac485eded383d41ec954985f1f245d4df176aee36,2025-06-24T20:15:27.433000 +CVE-2025-6579,1,1,fcfc4d99bfb161b15743945c897440f1876e453b66f81d9d6e2cf977514af419,2025-06-24T20:15:27.630000