From cb78456ca57938e2ec95d8bf6ba52f82a4abfda4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 10 Jun 2025 14:03:55 +0000 Subject: [PATCH] Auto-Update: 2025-06-10T14:00:19.863824+00:00 --- CVE-2023/CVE-2023-22xx/CVE-2023-2298.json | 6 +- CVE-2023/CVE-2023-22xx/CVE-2023-2299.json | 6 +- CVE-2023/CVE-2023-24xx/CVE-2023-2415.json | 6 +- CVE-2023/CVE-2023-24xx/CVE-2023-2416.json | 6 +- CVE-2023/CVE-2023-399xx/CVE-2023-39992.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12770.json | 46 +++++++- CVE-2024/CVE-2024-128xx/CVE-2024-12800.json | 46 +++++++- CVE-2024/CVE-2024-128xx/CVE-2024-12808.json | 46 +++++++- CVE-2024/CVE-2024-128xx/CVE-2024-12812.json | 46 +++++++- CVE-2024/CVE-2024-133xx/CVE-2024-13313.json | 46 +++++++- CVE-2024/CVE-2024-133xx/CVE-2024-13357.json | 46 +++++++- CVE-2024/CVE-2024-133xx/CVE-2024-13383.json | 46 +++++++- CVE-2024/CVE-2024-136xx/CVE-2024-13616.json | 46 +++++++- CVE-2024/CVE-2024-136xx/CVE-2024-13619.json | 46 +++++++- CVE-2024/CVE-2024-136xx/CVE-2024-13621.json | 46 +++++++- CVE-2024/CVE-2024-137xx/CVE-2024-13727.json | 46 +++++++- CVE-2024/CVE-2024-138xx/CVE-2024-13823.json | 46 +++++++- CVE-2024/CVE-2024-138xx/CVE-2024-13828.json | 46 +++++++- CVE-2024/CVE-2024-30xx/CVE-2024-3062.json | 46 +++++++- CVE-2024/CVE-2024-372xx/CVE-2024-37262.json | 6 +- CVE-2024/CVE-2024-40xx/CVE-2024-4004.json | 40 ++++++- CVE-2024/CVE-2024-50xx/CVE-2024-5026.json | 46 +++++++- CVE-2024/CVE-2024-57xx/CVE-2024-5791.json | 6 +- CVE-2024/CVE-2024-58xx/CVE-2024-5859.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22122.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22123.json | 6 +- CVE-2025/CVE-2025-29xx/CVE-2025-2918.json | 72 ++++++++++++ CVE-2025/CVE-2025-310xx/CVE-2025-31019.json | 10 +- CVE-2025/CVE-2025-436xx/CVE-2025-43697.json | 33 ++++++ CVE-2025/CVE-2025-436xx/CVE-2025-43698.json | 33 ++++++ CVE-2025/CVE-2025-436xx/CVE-2025-43699.json | 33 ++++++ CVE-2025/CVE-2025-437xx/CVE-2025-43700.json | 33 ++++++ CVE-2025/CVE-2025-437xx/CVE-2025-43701.json | 33 ++++++ CVE-2025/CVE-2025-45xx/CVE-2025-4577.json | 64 ++++++++++ CVE-2025/CVE-2025-47xx/CVE-2025-4774.json | 60 ++++++++++ CVE-2025/CVE-2025-494xx/CVE-2025-49454.json | 56 +++++++++ CVE-2025/CVE-2025-494xx/CVE-2025-49455.json | 56 +++++++++ CVE-2025/CVE-2025-495xx/CVE-2025-49507.json | 56 +++++++++ CVE-2025/CVE-2025-495xx/CVE-2025-49509.json | 56 +++++++++ CVE-2025/CVE-2025-495xx/CVE-2025-49510.json | 56 +++++++++ CVE-2025/CVE-2025-495xx/CVE-2025-49511.json | 56 +++++++++ CVE-2025/CVE-2025-59xx/CVE-2025-5912.json | 18 ++- CVE-2025/CVE-2025-59xx/CVE-2025-5913.json | 14 ++- CVE-2025/CVE-2025-59xx/CVE-2025-5934.json | 18 ++- README.md | 73 +++++++----- _state.csv | 122 +++++++++++--------- 46 files changed, 1558 insertions(+), 184 deletions(-) create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2918.json create mode 100644 CVE-2025/CVE-2025-436xx/CVE-2025-43697.json create mode 100644 CVE-2025/CVE-2025-436xx/CVE-2025-43698.json create mode 100644 CVE-2025/CVE-2025-436xx/CVE-2025-43699.json create mode 100644 CVE-2025/CVE-2025-437xx/CVE-2025-43700.json create mode 100644 CVE-2025/CVE-2025-437xx/CVE-2025-43701.json create mode 100644 CVE-2025/CVE-2025-45xx/CVE-2025-4577.json create mode 100644 CVE-2025/CVE-2025-47xx/CVE-2025-4774.json create mode 100644 CVE-2025/CVE-2025-494xx/CVE-2025-49454.json create mode 100644 CVE-2025/CVE-2025-494xx/CVE-2025-49455.json create mode 100644 CVE-2025/CVE-2025-495xx/CVE-2025-49507.json create mode 100644 CVE-2025/CVE-2025-495xx/CVE-2025-49509.json create mode 100644 CVE-2025/CVE-2025-495xx/CVE-2025-49510.json create mode 100644 CVE-2025/CVE-2025-495xx/CVE-2025-49511.json diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json index a0de2c7afd8..d3dd24f67c8 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2298", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.173", - "lastModified": "2024-11-21T07:58:20.190", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.2.10", - "matchCriteriaId": "49D6D1DC-9F19-4BB2-84AC-59CE9952111D" + "matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15" } ] } diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json index f0f2eb44448..3a5621eef39 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2299", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.267", - "lastModified": "2024-11-21T07:58:20.323", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.2.10", - "matchCriteriaId": "49D6D1DC-9F19-4BB2-84AC-59CE9952111D" + "matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15" } ] } diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json index 9efa3ef0eea..baff32bb477 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2415", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.843", - "lastModified": "2024-11-21T07:58:34.373", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.2.10", - "matchCriteriaId": "78676BA2-72C4-45F9-AA3A-F25FCF27BC6C" + "matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15" } ] } diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json index f390090e843..1525919103b 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2416", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.903", - "lastModified": "2024-11-21T07:58:34.510", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.2.10", - "matchCriteriaId": "78676BA2-72C4-45F9-AA3A-F25FCF27BC6C" + "matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15" } ] } diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json index 65b8a13a96c..88fbe05ee97 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39992", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:41.030", - "lastModified": "2024-11-21T08:16:12.073", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.3.3", - "matchCriteriaId": "8BF8819C-9FBF-40E4-BC21-D552BE257E48" + "matchCriteriaId": "F383456B-0C97-4EF9-8398-A64F2202D58E" } ] } diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12770.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12770.json index 226db52b9cf..09bae6dd5aa 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12770.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12770.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12770", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.293", - "lastModified": "2025-05-20T20:15:32.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T12:55:45.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.7.6", + "matchCriteriaId": "D53E4E2A-164B-4711-8D4D-01BF24A8A2D5" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e21f6a4e-f385-411b-8d91-0f38f9e6cdd3/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/e21f6a4e-f385-411b-8d91-0f38f9e6cdd3/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12800.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12800.json index 90e6cbccfb8..1d817a3651b 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12800.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12800.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12800", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.507", - "lastModified": "2025-05-20T20:15:33.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T12:52:18.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brijeshk89:ip_based_login:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.1", + "matchCriteriaId": "CC8582A6-DCFD-4B96-B5AB-30C9AC73C7F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/8f1ceca5-3b7b-4cf0-bccd-03e204e5bfad/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/8f1ceca5-3b7b-4cf0-bccd-03e204e5bfad/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12808.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12808.json index f7639540cfe..62ba8004bfd 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12808.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12808", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.640", - "lastModified": "2025-05-20T20:15:33.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T12:29:25.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.13.4", + "matchCriteriaId": "171DAE82-C0B9-4F44-B4AF-CEFFCCC93771" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f1f823f5-d0f1-45a5-85c2-60208d76366e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/f1f823f5-d0f1-45a5-85c2-60208d76366e/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12812.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12812.json index 91c75d591b4..ceb69a81aea 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12812.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12812.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12812", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:37.747", - "lastModified": "2025-05-20T20:15:33.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T12:22:08.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.13.4", + "matchCriteriaId": "171DAE82-C0B9-4F44-B4AF-CEFFCCC93771" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/757e76fd-830f-4d1c-8b89-dfad7c9c1f37/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/757e76fd-830f-4d1c-8b89-dfad7c9c1f37/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13313.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13313.json index 3e2450dc46c..90e94f9e92c 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13313.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13313.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13313", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:38.980", - "lastModified": "2025-05-20T20:15:34.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T12:01:55.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aweber:aweber:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.3.21", + "matchCriteriaId": "2AAE25EB-E9EE-4CBA-BC8A-0B9C5A4AFFEE" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/cc35b2f4-f1f1-4ed3-91b2-025bd5848b29/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/cc35b2f4-f1f1-4ed3-91b2-025bd5848b29/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13357.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13357.json index 56adbd625d5..3431168484c 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13357.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13357.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13357", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:39.067", - "lastModified": "2025-05-20T20:15:34.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:31:40.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.52", + "matchCriteriaId": "55E44700-63F2-4F71-ADC4-CB117651178F" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d134bb34-6324-4bc8-943e-4e743d00fcb2/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/d134bb34-6324-4bc8-943e-4e743d00fcb2/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13383.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13383.json index 9eba3efd53e..4f78ac10ac8 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13383.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13383", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:39.233", - "lastModified": "2025-05-20T20:15:34.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:11:27.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:harmonicdesign:hd_quiz:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "B864BAB9-9E74-4720-AB8F-13D8CE79AC7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/85bc905d-c960-4399-a879-2d18a4b03007/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/85bc905d-c960-4399-a879-2d18a4b03007/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13616.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13616.json index e7a5d058c1c..b7ec61e4dfc 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13616.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13616.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13616", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:39.570", - "lastModified": "2025-05-20T20:15:35.373", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:10:20.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vikwp:vikbooking_hotel_booking_engine_\\&_pms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7.2", + "matchCriteriaId": "2E3A5DAA-1CCC-44D8-9CA9-3C1E7FD137B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/44b3a2d9-a2e1-43dd-b27a-1ad9d6015c9b/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/44b3a2d9-a2e1-43dd-b27a-1ad9d6015c9b/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13619.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13619.json index f85547ec13a..b3022cd3ab0 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13619.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13619.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13619", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:39.660", - "lastModified": "2025-05-20T20:15:35.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:08:49.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lifterlms:lifterlms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.0.1", + "matchCriteriaId": "B269B4D2-B135-45B1-8EFD-B83BC8F4CDC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/97a7e1a6-0fb3-49e9-86fc-ebb1d426fcca/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/97a7e1a6-0fb3-49e9-86fc-ebb1d426fcca/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13621.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13621.json index 67d2d997418..18eef6f4cb5 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13621.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13621", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:39.743", - "lastModified": "2025-05-20T20:15:35.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:06:41.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:data443:gdpr_framework:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "2478250C-DA15-40C2-80BA-15935CAEF9EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/5b48ecbb-c459-4c39-825d-61744d36f2fe/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/5b48ecbb-c459-4c39-825d-61744d36f2fe/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13727.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13727.json index cb6daead0fd..11a5a439932 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13727.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13727.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13727", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:39.827", - "lastModified": "2025-05-20T20:15:35.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:05:39.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:memberspace:memberspace:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.14", + "matchCriteriaId": "1C230396-9778-49C3-9F5D-26DBBBCC3946" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/598d20f2-0f42-48f2-a941-0d6c5da5303e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/598d20f2-0f42-48f2-a941-0d6c5da5303e/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13823.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13823.json index a79bb62a028..f2d015393af 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13823.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13823.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13823", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:40.087", - "lastModified": "2025-05-20T20:15:36.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:04:43.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yofla:360_product_rotation:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.8", + "matchCriteriaId": "F6FBF1B1-7D29-47A5-9D9C-2A6F56D8FE99" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/dcfd8a03-0a04-4fd1-986d-1e816b1fad19/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/dcfd8a03-0a04-4fd1-986d-1e816b1fad19/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13828.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13828.json index 2ffd0574270..d18f2f00c8e 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13828.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13828.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13828", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:40.167", - "lastModified": "2025-05-20T20:15:36.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:02:39.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:danielpowney:badgearoo:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.14", + "matchCriteriaId": "40E0D1DF-5D2D-4B09-A5CB-5394DEA2E8F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/0f901807-9ef2-4cd3-969a-9fd23a8da371/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/0f901807-9ef2-4cd3-969a-9fd23a8da371/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3062.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3062.json index e326612dfab..590def49ba1 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3062.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3062", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:53.747", - "lastModified": "2025-05-19T15:15:22.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:57:42.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.2", + "matchCriteriaId": "AC5FA3FE-851E-4F21-8C7E-D9D24B51483E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1526985d-2f8f-4b2a-97f3-633c51d024b8/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/1526985d-2f8f-4b2a-97f3-633c51d024b8/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json index 50ab6f12849..2b457c83b3d 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37262.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37262", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T09:15:06.623", - "lastModified": "2024-11-21T09:23:29.650", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.4.3", - "matchCriteriaId": "6D841E0E-5D9D-4B92-971B-553D8BA51178" + "matchCriteriaId": "3F92F8DE-B8C4-4ACA-AC83-048EFD245485" } ] } diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4004.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4004.json index 7d5ef3c7bfa..53716acdd4e 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4004.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4004", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:54.300", - "lastModified": "2025-05-16T16:15:28.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:42:33.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bracketspace:advanced_cron_manager:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "2.5.7", + "matchCriteriaId": "936A20FE-C8FA-4CA5-9AA9-A6904ABA9696" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/8e5e7040-b824-4af7-90a1-90801d12abb6/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5026.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5026.json index d1a90179c6f..f1f42c7d7f4 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5026.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5026.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5026", "sourceIdentifier": "contact@wpscan.com", "published": "2025-05-15T20:15:54.640", - "lastModified": "2025-05-20T20:15:36.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T13:36:54.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cminds:cm_tooltip_glossary:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.3.4", + "matchCriteriaId": "19DF65F6-64C7-4E7B-8F87-DC3567099F61" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/a86584f6-119b-45c3-bc6e-dc18e3501db7/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/a86584f6-119b-45c3-bc6e-dc18e3501db7/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5791.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5791.json index 5a3b760336d..026705a7363 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5791.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5791.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5791", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-22T02:15:45.523", - "lastModified": "2024-11-21T09:48:20.453", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.4.3", - "matchCriteriaId": "6D841E0E-5D9D-4B92-971B-553D8BA51178" + "matchCriteriaId": "3F92F8DE-B8C4-4ACA-AC83-048EFD245485" } ] } diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5859.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5859.json index 5d0d4b35fc3..d201959cf99 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5859.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5859", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-21T09:15:09.657", - "lastModified": "2024-11-21T09:48:29.377", + "lastModified": "2025-06-10T12:45:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.2.3", - "matchCriteriaId": "7026BCAB-2BBA-473C-8B89-3F2E8BCA3739" + "matchCriteriaId": "1F76774B-9168-4EF6-B9BB-BA79541E0AF9" } ] } diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22122.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22122.json index abf3e615cba..283fda1b254 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22122.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22122.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22122", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:16:06.363", - "lastModified": "2025-04-17T20:22:16.240", + "lastModified": "2025-06-10T12:15:23.090", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/0c60158ff14df04c92792dd9b1809372b095040f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/26064d3e2b4d9a14df1072980e558c636fb023ea", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22123.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22123.json index 2ed04ad2f05..c65162b623a 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22123.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22123.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22123", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:16:06.450", - "lastModified": "2025-04-17T20:22:16.240", + "lastModified": "2025-06-10T12:15:23.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -24,6 +24,10 @@ { "url": "https://git.kernel.org/stable/c/986c50f6bca109c6cf362b4e2babcb85aba958f6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bf49527089ec1ba894c6e587affabbfb2329f52e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2918.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2918.json new file mode 100644 index 00000000000..d1bc78a23bc --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2918.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-2918", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-10T12:15:23.867", + "lastModified": "2025-06-10T12:15:23.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ultimate Blocks \u2013 WordPress Blocks Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/content-filter/block.php#L14", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/content-toggle/block.php#L133", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/how-to/block.php#L335", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/tabbed-content/block.php#L136", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41b2a4cc-fb23-41eb-b1a4-d793ae924d9a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31019.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31019.json index 286b1a806d4..c4c0767db61 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31019.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31019.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31019", "sourceIdentifier": "audit@patchstack.com", "published": "2025-06-09T16:15:36.450", - "lastModified": "2025-06-09T16:15:36.450", + "lastModified": "2025-06-10T13:15:21.477", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in miniOrange Password Policy Manager allows Authentication Abuse. This issue affects Password Policy Manager: from n/a through 2.0.4." + "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in miniOrange Password Policy Manager password-policy-manager allows Authentication Abuse.This issue affects Password Policy Manager: from n/a through 2.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en miniOrange Password Policy Manager permite el abuso de autenticaci\u00f3n. Este problema afecta al Administrador de Pol\u00edticas de Contrase\u00f1as desde la versi\u00f3n n/d hasta la 2.0.4." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-436xx/CVE-2025-43697.json b/CVE-2025/CVE-2025-436xx/CVE-2025-43697.json new file mode 100644 index 00000000000..899f9b31add --- /dev/null +++ b/CVE-2025/CVE-2025-436xx/CVE-2025-43697.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-43697", + "sourceIdentifier": "security@salesforce.com", + "published": "2025-06-10T12:15:24.097", + "lastModified": "2025-06-10T12:15:24.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (DataMapper) allows exposure of encrypted data.\nThis impacts OmniStudio: before Spring 2025" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@salesforce.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://help.salesforce.com/s/articleView?id=004980323&type=1", + "source": "security@salesforce.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-436xx/CVE-2025-43698.json b/CVE-2025/CVE-2025-436xx/CVE-2025-43698.json new file mode 100644 index 00000000000..a5d01fe38bb --- /dev/null +++ b/CVE-2025/CVE-2025-436xx/CVE-2025-43698.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-43698", + "sourceIdentifier": "security@salesforce.com", + "published": "2025-06-10T12:15:24.227", + "lastModified": "2025-06-10T12:15:24.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for Salesforce objects. \nThis impacts OmniStudio: before Spring 2025" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@salesforce.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://help.salesforce.com/s/articleView?id=004980323&type=1", + "source": "security@salesforce.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-436xx/CVE-2025-43699.json b/CVE-2025/CVE-2025-436xx/CVE-2025-43699.json new file mode 100644 index 00000000000..b8528cdb8d2 --- /dev/null +++ b/CVE-2025/CVE-2025-436xx/CVE-2025-43699.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-43699", + "sourceIdentifier": "security@salesforce.com", + "published": "2025-06-10T12:15:24.357", + "lastModified": "2025-06-10T12:15:24.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for OmniUICard objects.\u00a0\n\nThis impacts OmniStudio: before Spring 2025" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@salesforce.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://help.salesforce.com/s/articleView?id=004980323&type=1", + "source": "security@salesforce.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-437xx/CVE-2025-43700.json b/CVE-2025/CVE-2025-437xx/CVE-2025-43700.json new file mode 100644 index 00000000000..fe1fc2d8985 --- /dev/null +++ b/CVE-2025/CVE-2025-437xx/CVE-2025-43700.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-43700", + "sourceIdentifier": "security@salesforce.com", + "published": "2025-06-10T12:15:24.483", + "lastModified": "2025-06-10T12:15:24.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data.\u00a0\n\nThis impacts OmniStudio: before Spring 2025." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@salesforce.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://help.salesforce.com/s/articleView?id=004980323&type=1", + "source": "security@salesforce.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-437xx/CVE-2025-43701.json b/CVE-2025/CVE-2025-437xx/CVE-2025-43701.json new file mode 100644 index 00000000000..72ef4cbc51b --- /dev/null +++ b/CVE-2025/CVE-2025-437xx/CVE-2025-43701.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-43701", + "sourceIdentifier": "security@salesforce.com", + "published": "2025-06-10T12:15:24.607", + "lastModified": "2025-06-10T12:15:24.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data.\u00a0\n\nThis impacts OmniStudio: before version 254." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@salesforce.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://help.salesforce.com/s/articleView?id=004980323&type=1", + "source": "security@salesforce.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4577.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4577.json new file mode 100644 index 00000000000..25702098def --- /dev/null +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4577.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-4577", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-10T12:15:24.737", + "lastModified": "2025-06-10T12:15:24.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Smash Balloon Social Post Feed \u2013 Simple Social Feeds for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-color attribute in all versions up to, and including, 4.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/custom-facebook-feed/tags/4.3.0/assets/js/cff-scripts.js#L245", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/custom-facebook-feed/tags/4.3.0/assets/js/cff-scripts.js#L254", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec3de7e2-4a29-401f-af2c-0ce78d768eae?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4774.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4774.json new file mode 100644 index 00000000000..69c8db20cc0 --- /dev/null +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4774.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-4774", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-10T12:15:24.917", + "lastModified": "2025-06-10T12:15:24.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-countdown attribute of Countdown widget in all versions up to, and including, 4.11.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/tags/4.11.6/assets/frontend/js/jquery-countdown.js#L97", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/024af9de-d4c7-43ec-a602-c45ded3ddad3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49454.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49454.json new file mode 100644 index 00000000000..29fbdacb381 --- /dev/null +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49454.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49454", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-10T13:15:22.733", + "lastModified": "2025-06-10T13:15:22.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LoftOcean TinySalt allows PHP Local File Inclusion.This issue affects TinySalt: from n/a before 3.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/tinysalt/vulnerability/wordpress-tinysalt-3-10-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49455.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49455.json new file mode 100644 index 00000000000..4cb6db25704 --- /dev/null +++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49455", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-10T13:15:23.107", + "lastModified": "2025-06-10T13:15:23.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in LoftOcean TinySalt allows Object Injection.This issue affects TinySalt: from n/a before 3.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/tinysalt/vulnerability/wordpress-tinysalt-3-10-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49507.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49507.json new file mode 100644 index 00000000000..5a623ba7a79 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49507.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49507", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-10T13:15:23.283", + "lastModified": "2025-06-10T13:15:23.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in LoftOcean CozyStay allows Object Injection.This issue affects CozyStay: from n/a before 1.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/cozystay/vulnerability/wordpress-cozystay-1-7-1-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49509.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49509.json new file mode 100644 index 00000000000..b89ae7117f4 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49509.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49509", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-10T13:15:23.427", + "lastModified": "2025-06-10T13:15:23.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Roland Beaussant Audio Editor & Recorder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Audio Editor & Recorder: from n/a through 2.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/audio-editor-recorder/vulnerability/wordpress-audio-editor-recorder-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49510.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49510.json new file mode 100644 index 00000000000..a0650e824a1 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49510.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49510", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-10T13:15:23.583", + "lastModified": "2025-06-10T13:15:23.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPFactory Min Max Step Quantity Limits Manager for WooCommerce allows Cross Site Request Forgery.This issue affects Min Max Step Quantity Limits Manager for WooCommerce: from n/a through 5.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/product-quantity-for-woocommerce/vulnerability/wordpress-min-max-step-quantity-limits-manager-for-woocommerce-plugin-5-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49511.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49511.json new file mode 100644 index 00000000000..2fbac28426c --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49511.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49511", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-06-10T13:15:23.747", + "lastModified": "2025-06-10T13:15:23.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in uxper Civi Framework allows Cross Site Request Forgery.This issue affects Civi Framework: from n/a through 2.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/civi-framework/vulnerability/wordpress-civi-framework-plugin-2-1-6-cross-site-request-forgery-csrf-to-user-deactivation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5912.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5912.json index 0030cfe740b..6ca2016da4d 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5912.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5912.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5912", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T04:15:49.300", - "lastModified": "2025-06-10T04:15:49.300", + "lastModified": "2025-06-10T13:15:24.117", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DIR-632 FW103B08. It has been declared as critical. This vulnerability affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-632 FW103B08. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n do_file del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer en la pila. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -151,6 +155,14 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink#poc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5913.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5913.json index 0a681fe4517..ffc8a2747cc 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5913.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5913.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5913", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T04:15:54.063", - "lastModified": "2025-06-10T04:15:54.063", + "lastModified": "2025-06-10T13:15:24.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Vehicle Record Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/search-vehicle.php. The manipulation of the argument searchinputdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Vehicle Record Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/search-vehicle.php. La manipulaci\u00f3n del argumento searchinputdata provoca una inyecci\u00f3n SQL. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.592310", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/kakalalaww/CVE/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5934.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5934.json index 8ee63e02e3f..845154c9fa0 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5934.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5934.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5934", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T04:15:55.327", - "lastModified": "2025-06-10T04:15:55.327", + "lastModified": "2025-06-10T13:15:24.570", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in Netgear EX3700 up to 1.0.0.88. It has been classified as critical. Affected is the function sub_41619C of the file /mtd. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0.98 is able to address this issue. It is recommended to upgrade the affected component. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad en Netgear EX3700 hasta la versi\u00f3n 1.0.0.88. Se ha clasificado como cr\u00edtica. La funci\u00f3n sub_41619C del archivo /mtd est\u00e1 afectada. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer en la pila. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 1.0.0.98 puede solucionar este problema. Se recomienda actualizar el componente afectado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -151,6 +155,14 @@ { "url": "https://www.netgear.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear#poc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 30fed368577..785bcde283e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-10T12:00:22.759068+00:00 +2025-06-10T14:00:19.863824+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-10T11:56:01.460000+00:00 +2025-06-10T13:57:42.330000+00:00 ``` ### Last Data Feed Release @@ -33,43 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297255 +297269 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `14` -- [CVE-2024-13089](CVE-2024/CVE-2024-130xx/CVE-2024-13089.json) (`2025-06-10T11:15:52.113`) -- [CVE-2024-13090](CVE-2024/CVE-2024-130xx/CVE-2024-13090.json) (`2025-06-10T11:15:52.477`) -- [CVE-2025-40654](CVE-2025/CVE-2025-406xx/CVE-2025-40654.json) (`2025-06-10T10:15:26.990`) -- [CVE-2025-40655](CVE-2025/CVE-2025-406xx/CVE-2025-40655.json) (`2025-06-10T10:15:27.620`) -- [CVE-2025-40656](CVE-2025/CVE-2025-406xx/CVE-2025-40656.json) (`2025-06-10T10:15:27.843`) -- [CVE-2025-40657](CVE-2025/CVE-2025-406xx/CVE-2025-40657.json) (`2025-06-10T10:15:28.043`) -- [CVE-2025-40658](CVE-2025/CVE-2025-406xx/CVE-2025-40658.json) (`2025-06-10T10:15:28.237`) -- [CVE-2025-40659](CVE-2025/CVE-2025-406xx/CVE-2025-40659.json) (`2025-06-10T10:15:28.430`) -- [CVE-2025-40660](CVE-2025/CVE-2025-406xx/CVE-2025-40660.json) (`2025-06-10T10:15:28.627`) -- [CVE-2025-40661](CVE-2025/CVE-2025-406xx/CVE-2025-40661.json) (`2025-06-10T10:15:28.827`) -- [CVE-2025-40662](CVE-2025/CVE-2025-406xx/CVE-2025-40662.json) (`2025-06-10T10:15:29.103`) -- [CVE-2025-41657](CVE-2025/CVE-2025-416xx/CVE-2025-41657.json) (`2025-06-10T11:15:53.150`) +- [CVE-2025-2918](CVE-2025/CVE-2025-29xx/CVE-2025-2918.json) (`2025-06-10T12:15:23.867`) +- [CVE-2025-43697](CVE-2025/CVE-2025-436xx/CVE-2025-43697.json) (`2025-06-10T12:15:24.097`) +- [CVE-2025-43698](CVE-2025/CVE-2025-436xx/CVE-2025-43698.json) (`2025-06-10T12:15:24.227`) +- [CVE-2025-43699](CVE-2025/CVE-2025-436xx/CVE-2025-43699.json) (`2025-06-10T12:15:24.357`) +- [CVE-2025-43700](CVE-2025/CVE-2025-437xx/CVE-2025-43700.json) (`2025-06-10T12:15:24.483`) +- [CVE-2025-43701](CVE-2025/CVE-2025-437xx/CVE-2025-43701.json) (`2025-06-10T12:15:24.607`) +- [CVE-2025-4577](CVE-2025/CVE-2025-45xx/CVE-2025-4577.json) (`2025-06-10T12:15:24.737`) +- [CVE-2025-4774](CVE-2025/CVE-2025-47xx/CVE-2025-4774.json) (`2025-06-10T12:15:24.917`) +- [CVE-2025-49454](CVE-2025/CVE-2025-494xx/CVE-2025-49454.json) (`2025-06-10T13:15:22.733`) +- [CVE-2025-49455](CVE-2025/CVE-2025-494xx/CVE-2025-49455.json) (`2025-06-10T13:15:23.107`) +- [CVE-2025-49507](CVE-2025/CVE-2025-495xx/CVE-2025-49507.json) (`2025-06-10T13:15:23.283`) +- [CVE-2025-49509](CVE-2025/CVE-2025-495xx/CVE-2025-49509.json) (`2025-06-10T13:15:23.427`) +- [CVE-2025-49510](CVE-2025/CVE-2025-495xx/CVE-2025-49510.json) (`2025-06-10T13:15:23.583`) +- [CVE-2025-49511](CVE-2025/CVE-2025-495xx/CVE-2025-49511.json) (`2025-06-10T13:15:23.747`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `30` -- [CVE-2022-4653](CVE-2022/CVE-2022-46xx/CVE-2022-4653.json) (`2025-06-10T11:44:28.910`) -- [CVE-2023-0378](CVE-2023/CVE-2023-03xx/CVE-2023-0378.json) (`2025-06-10T11:44:28.910`) -- [CVE-2023-22707](CVE-2023/CVE-2023-227xx/CVE-2023-22707.json) (`2025-06-10T11:44:28.910`) -- [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2025-06-10T11:56:01.460`) -- [CVE-2023-6636](CVE-2023/CVE-2023-66xx/CVE-2023-6636.json) (`2025-06-10T11:44:28.910`) -- [CVE-2024-12397](CVE-2024/CVE-2024-123xx/CVE-2024-12397.json) (`2025-06-10T11:15:21.283`) -- [CVE-2024-12743](CVE-2024/CVE-2024-127xx/CVE-2024-12743.json) (`2025-06-10T11:53:54.447`) -- [CVE-2024-12767](CVE-2024/CVE-2024-127xx/CVE-2024-12767.json) (`2025-06-10T11:53:16.670`) -- [CVE-2024-13916](CVE-2024/CVE-2024-139xx/CVE-2024-13916.json) (`2025-06-10T10:15:21.443`) -- [CVE-2024-13917](CVE-2024/CVE-2024-139xx/CVE-2024-13917.json) (`2025-06-10T10:15:26.553`) -- [CVE-2024-44005](CVE-2024/CVE-2024-440xx/CVE-2024-44005.json) (`2025-06-10T11:44:28.910`) -- [CVE-2025-2703](CVE-2025/CVE-2025-27xx/CVE-2025-2703.json) (`2025-06-10T11:15:52.680`) +- [CVE-2024-12770](CVE-2024/CVE-2024-127xx/CVE-2024-12770.json) (`2025-06-10T12:55:45.537`) +- [CVE-2024-12800](CVE-2024/CVE-2024-128xx/CVE-2024-12800.json) (`2025-06-10T12:52:18.020`) +- [CVE-2024-12808](CVE-2024/CVE-2024-128xx/CVE-2024-12808.json) (`2025-06-10T12:29:25.237`) +- [CVE-2024-12812](CVE-2024/CVE-2024-128xx/CVE-2024-12812.json) (`2025-06-10T12:22:08.690`) +- [CVE-2024-13313](CVE-2024/CVE-2024-133xx/CVE-2024-13313.json) (`2025-06-10T12:01:55.290`) +- [CVE-2024-13357](CVE-2024/CVE-2024-133xx/CVE-2024-13357.json) (`2025-06-10T13:31:40.840`) +- [CVE-2024-13383](CVE-2024/CVE-2024-133xx/CVE-2024-13383.json) (`2025-06-10T13:11:27.890`) +- [CVE-2024-13616](CVE-2024/CVE-2024-136xx/CVE-2024-13616.json) (`2025-06-10T13:10:20.170`) +- [CVE-2024-13619](CVE-2024/CVE-2024-136xx/CVE-2024-13619.json) (`2025-06-10T13:08:49.897`) +- [CVE-2024-13621](CVE-2024/CVE-2024-136xx/CVE-2024-13621.json) (`2025-06-10T13:06:41.540`) +- [CVE-2024-13727](CVE-2024/CVE-2024-137xx/CVE-2024-13727.json) (`2025-06-10T13:05:39.307`) +- [CVE-2024-13823](CVE-2024/CVE-2024-138xx/CVE-2024-13823.json) (`2025-06-10T13:04:43.860`) +- [CVE-2024-13828](CVE-2024/CVE-2024-138xx/CVE-2024-13828.json) (`2025-06-10T13:02:39.683`) +- [CVE-2024-3062](CVE-2024/CVE-2024-30xx/CVE-2024-3062.json) (`2025-06-10T13:57:42.330`) +- [CVE-2024-37262](CVE-2024/CVE-2024-372xx/CVE-2024-37262.json) (`2025-06-10T12:45:23.150`) +- [CVE-2024-4004](CVE-2024/CVE-2024-40xx/CVE-2024-4004.json) (`2025-06-10T13:42:33.290`) +- [CVE-2024-5026](CVE-2024/CVE-2024-50xx/CVE-2024-5026.json) (`2025-06-10T13:36:54.840`) +- [CVE-2024-5791](CVE-2024/CVE-2024-57xx/CVE-2024-5791.json) (`2025-06-10T12:45:23.150`) +- [CVE-2024-5859](CVE-2024/CVE-2024-58xx/CVE-2024-5859.json) (`2025-06-10T12:45:23.150`) +- [CVE-2025-22122](CVE-2025/CVE-2025-221xx/CVE-2025-22122.json) (`2025-06-10T12:15:23.090`) +- [CVE-2025-22123](CVE-2025/CVE-2025-221xx/CVE-2025-22123.json) (`2025-06-10T12:15:23.750`) +- [CVE-2025-31019](CVE-2025/CVE-2025-310xx/CVE-2025-31019.json) (`2025-06-10T13:15:21.477`) +- [CVE-2025-5912](CVE-2025/CVE-2025-59xx/CVE-2025-5912.json) (`2025-06-10T13:15:24.117`) +- [CVE-2025-5913](CVE-2025/CVE-2025-59xx/CVE-2025-5913.json) (`2025-06-10T13:15:24.380`) +- [CVE-2025-5934](CVE-2025/CVE-2025-59xx/CVE-2025-5934.json) (`2025-06-10T13:15:24.570`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3ad9c04db2e..77d39eb213f 100644 --- a/_state.csv +++ b/_state.csv @@ -211563,7 +211563,7 @@ CVE-2022-46505,0,0,556f68f80f426556fa441caaf3ece3247d1f844d1ca10adaa553eb4ec2d51 CVE-2022-4651,0,0,e7cf4a70afca20f66b5af34080804c6864be6d29e3a2f96826c8a4a51fcc2990,2025-03-27T16:15:17.703000 CVE-2022-4652,0,0,1095194f9f154259f49411f7dbb93d1a6c03863c10e1a5c3e3727f220f6e9465,2025-02-27T21:15:16.310000 CVE-2022-46527,0,0,d02de0aae02127d126346be665f04f296ca7c58b711b92b26e017819accbd88f,2024-11-21T07:30:40.330000 -CVE-2022-4653,0,1,fdf82423452f9f1fb82a2b67a45692e54bb1a5e54d616807d8d22fd37f4fe533,2025-06-10T11:44:28.910000 +CVE-2022-4653,0,0,fdf82423452f9f1fb82a2b67a45692e54bb1a5e54d616807d8d22fd37f4fe533,2025-06-10T11:44:28.910000 CVE-2022-46530,0,0,af2bb5ee46d936d244c92c467e760d00274999c52ba2494e2e4cdcdcdf8c1946,2025-04-16T18:15:59.500000 CVE-2022-46531,0,0,2ac78f73b3153ff5c8e9907f04f29148da22e1ff69025d5820fd91be844de458,2025-04-16T16:15:25.327000 CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf195023c,2025-04-16T16:15:25.507000 @@ -214767,7 +214767,7 @@ CVE-2023-0374,0,0,ae4f5db6eb936a3b818c45a588550c93b15d5a51af99d7e2373040cf12eb9f CVE-2023-0375,0,0,8948a3962bbed5c7e344609d7d5077346684df9a4b1ebdbb684540f03777e60c,2025-03-12T21:15:40.340000 CVE-2023-0376,0,0,a9f6de5e0668ec86ac889cde4b7f40c1edd842c95af7ba6f28a9a7a5f9cf4a27,2025-06-02T15:15:21.640000 CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e4447a,2024-11-21T07:37:04.600000 -CVE-2023-0378,0,1,7dc9c8b5c6c13deeff5b72af52f9f6595c5c49fc084d53f7ddaadbb20c2bfd1d,2025-06-10T11:44:28.910000 +CVE-2023-0378,0,0,7dc9c8b5c6c13deeff5b72af52f9f6595c5c49fc084d53f7ddaadbb20c2bfd1d,2025-06-10T11:44:28.910000 CVE-2023-0379,0,0,45a21024b71eac3a3ff03943f6ddf52c72280bcd61f1cdeff5ae8ab462791d33,2025-03-21T15:15:39.677000 CVE-2023-0380,0,0,e199a00c1e1579f86574b186fac08be1b5ee641379e96e857389051cc7026e5d,2025-03-14T19:15:40.897000 CVE-2023-0381,0,0,fb963192539a86802660cecf1f4984bcbc8442d3688b92930e1e773c336353cb,2025-03-18T15:15:42.723000 @@ -218726,7 +218726,7 @@ CVE-2023-22703,0,0,b11cbe66777334b92d49ab1285216c2daf10bc1ade9e60e348ec608d69ec7 CVE-2023-22704,0,0,3391b5e9fe8cfdb113a4335180cf222b3480dc9186971ddf99b9d7c23f514db4,2024-11-21T07:45:15.363000 CVE-2023-22705,0,0,af778e225555747df5c233219acb78451206239cdbd1890f1bc52e0b4eff1577,2025-02-20T18:34:50.990000 CVE-2023-22706,0,0,ebe261333ec94aa8d06d2c8f8fa51152653338e9e5613bd8d3569a6f53cb90e2,2024-11-21T07:45:15.623000 -CVE-2023-22707,0,1,0bb7c425aded4142ebbe2c9be8b3883425d1ae75e2be1d4c2d9e6d8ce6aee24b,2025-06-10T11:44:28.910000 +CVE-2023-22707,0,0,0bb7c425aded4142ebbe2c9be8b3883425d1ae75e2be1d4c2d9e6d8ce6aee24b,2025-06-10T11:44:28.910000 CVE-2023-22708,0,0,0bda0fb09283863451e953094b448349ab539148689b6d150d6367fafec54d48,2024-12-09T13:15:20.260000 CVE-2023-22709,0,0,b97092a949b7838108594a0e4a6775ddf43d90533b1340d5130b127236ed7e78,2024-11-21T07:45:15.890000 CVE-2023-2271,0,0,82a1b193d56a689b6f14541ed8547a7aebaefaa1fa98350a6f5d11be1c01604a,2024-11-21T07:58:17.063000 @@ -218969,10 +218969,10 @@ CVE-2023-22972,0,0,f05d147ac8f549c33bf31d335750bdd6abea73c5816d27056d8bd89f0a743 CVE-2023-22973,0,0,bccd4224a2674dd63e0124de23cc4e87a3108e0d057eac9cd1e127622ac2de6c,2024-11-21T07:45:44.790000 CVE-2023-22974,0,0,85415b262be91cde3a112e04d995d9163e65d13b859bc6dfd72ba4fee38ce393,2024-11-21T07:45:44.937000 CVE-2023-22975,0,0,eb8873b34352e4a3cc09ef54ad0d7ccdd681ae65fd1d5bde5e48e17ea477cee6,2024-11-21T07:45:45.080000 -CVE-2023-2298,0,0,989f644c1451c5a67e467bb23faffc2f4e6cbf5ba286ec24661d092839141574,2024-11-21T07:58:20.190000 +CVE-2023-2298,0,1,6b28b31419f1834cd068f4fc950be7991937e24c71506065f925cd0461af5a59,2025-06-10T12:45:23.150000 CVE-2023-22984,0,0,5871116efec6ac4d9f92dbbbffd11ed2b4439b834a7278dcd05b96a53714146d,2024-11-21T07:45:45.220000 CVE-2023-22985,0,0,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000 -CVE-2023-2299,0,0,824be6896313aecbc62521262d1f5fc045b92285be3005bb7b42b30619bee831,2024-11-21T07:58:20.323000 +CVE-2023-2299,0,1,dd788c2e66752404ea540e37b83a284a125ff3de5f00dcbe8f646ade59be6e39,2025-06-10T12:45:23.150000 CVE-2023-22995,0,0,cf55f9c688d8b67971320ae996f28074061285e48a808803fa692301cea77089,2025-05-05T16:15:29.947000 CVE-2023-22996,0,0,e25b38188607ad82adeaa3e5fc2927767f1b99c04c678932009b45c69faac575,2025-03-20T20:15:28.137000 CVE-2023-22997,0,0,176dbba2a3eee885cb5145bce397d689cea3e2f666028a506b2a5274252c23b0,2025-03-20T20:15:28.333000 @@ -219876,7 +219876,7 @@ CVE-2023-24146,0,0,f408e8268f417d8f723a52d9ab25e857eaeacbce1b75fc7921ff0db95b4e3 CVE-2023-24147,0,0,b92c8e9f3d88cd77b31f782f5baca627927919928373f5a4e85846846fb72538,2025-03-26T19:15:25.273000 CVE-2023-24148,0,0,674fcc1ba994dcc53f4b1b2739b50f2a07dd6c1a6a960c9b2ad892fe2760138b,2025-03-26T15:15:46.813000 CVE-2023-24149,0,0,66a85b28be069e7a828e596d9ee9e4eeb5c531dd78d2e0ad02bb4912ec7fa8ad,2025-03-26T16:15:17.513000 -CVE-2023-2415,0,0,9158d528c422e52dc579bb111359d9138c64face63f6ce0130f26f3114b23994,2024-11-21T07:58:34.373000 +CVE-2023-2415,0,1,39e81d39ac9a12ff81ce75656edd1c99433224cdb5f01c711c70a59e1d3c0a96,2025-06-10T12:45:23.150000 CVE-2023-24150,0,0,1978898d6cf410b25d039428bb9737f50542bd2686ecbc60274b16a854707519,2025-03-26T16:15:17.793000 CVE-2023-24151,0,0,46a02063b1cc678e5b41e6a9210a4878d97df355a6783b6ce7880e871dab2c99,2025-03-26T16:15:18.033000 CVE-2023-24152,0,0,0b774f6418b33460f6bdefed5229af905060e1d2ef5ecff57c55e910dab13da3,2025-03-26T16:15:18.273000 @@ -219886,7 +219886,7 @@ CVE-2023-24155,0,0,64de41923a85e49241b8a1b4174c0b66f36a9b352d7968e7119bce55e950b CVE-2023-24156,0,0,fbfbacd0d95c7c78fe2944649f4e3da8ffd28603a028d8536389a6fc85d8bb5f,2025-03-26T15:15:47.047000 CVE-2023-24157,0,0,603fbe9137c0740f9081f35b76cad146834fc9872cfe2eed2412a269598f9a06,2025-03-26T15:15:47.267000 CVE-2023-24159,0,0,7760eaf985df74413d84fd1de8669f9eb5b9e5befb0b84de1f1b3892c8d7d513,2025-03-20T18:15:16.760000 -CVE-2023-2416,0,0,acdf5b4886c4297fef66ae568a61d37a4ec99430d66c160077e079aaabd2a5d8,2024-11-21T07:58:34.510000 +CVE-2023-2416,0,1,4a826227b459f9bc810291cd15e046c67fc13bdba7efb6a803291c2f901761a2,2025-06-10T12:45:23.150000 CVE-2023-24160,0,0,65cc2c933fa4f55a423a0b03c6f5849c561d8a239b685c27ac6c141c47ef1803,2025-03-20T21:15:18.357000 CVE-2023-24161,0,0,19907029bb78340b5658af7b04f0eca42537863c710b03f7f44f2a555d9f52e0,2025-03-20T21:15:18.530000 CVE-2023-24162,0,0,11863c535687637ee2dbdfe25ccb72b7486dd57b5d0f5f801e123d162a733798,2025-03-27T15:15:45.360000 @@ -227388,7 +227388,7 @@ CVE-2023-33439,0,0,f3af0a0427500f94c6b3b138f4e3fa36fb9bfc88f5c6b1efc27138be8bba0 CVE-2023-3344,0,0,be98701b195b53def24896f087665cc45329af9abedde7087f97191910e5fedc,2025-05-05T16:15:45.150000 CVE-2023-33440,0,0,6eb23ef764cdc1e6f8c91c5365c2450f157a6eae9d074cfe3f802aeee1be7620,2025-01-14T21:15:08.377000 CVE-2023-33443,0,0,6c4ad59b45035b5c88ac135965bacacb2dedc93413c60d04ce25fba05f45224c,2025-01-06T21:15:10.830000 -CVE-2023-3345,0,1,e53d94e79d9c9c1cb78413356db8a04c067360ae09c43cc3b085129675d26070,2025-06-10T11:56:01.460000 +CVE-2023-3345,0,0,e53d94e79d9c9c1cb78413356db8a04c067360ae09c43cc3b085129675d26070,2025-06-10T11:56:01.460000 CVE-2023-33457,0,0,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000 CVE-2023-3346,0,0,09f68a6670d4a69cff8e11fa4ad9eea39d73cc8d7fe0a2dacd2a911bbd61aee1,2024-11-21T08:17:04.037000 CVE-2023-33460,0,0,6e418258c1a2b91b79efff9c4f69791d5894d1876ad79ba0f82b40a9644edd3e,2025-01-08T17:15:12.020000 @@ -232387,7 +232387,7 @@ CVE-2023-39989,0,0,726f571ee9bcf5dc47f2c24a51abc27b099f3763e764b9376d48d987eb909 CVE-2023-3999,0,0,e82adc70575076927945c28ec9abdcb884177ca58c4faef374d14bbf4ef780e1,2024-11-21T08:18:29.967000 CVE-2023-39990,0,0,3d24dc67301ab8a4ce38cf028e16fae81661c2b569698bc948f7c9813a3501e7,2025-01-24T16:08:44.243000 CVE-2023-39991,0,0,74a383be9c4ebbeb72cb131d996b41f84dd1c8560e8c672b2e4694a32709fa2f,2024-11-21T08:16:11.923000 -CVE-2023-39992,0,0,7ee9edbf56e39b17fe5662eaa21a6513fdaf7509e9723465071698fc41ff63a9,2024-11-21T08:16:12.073000 +CVE-2023-39992,0,1,629414a3127aa07d4c3f92dd6eb3b676e6c2a4c2575c5601eba846302ed3da11,2025-06-10T12:45:23.150000 CVE-2023-39993,0,0,62534729c9f89409d47994443940c98799306b492c23b2930a522cb2cdd76001,2025-04-09T15:53:24.323000 CVE-2023-39994,0,0,87a029e29660aeb8f1b2be7e27e623b955ac0289fc3112ecce957361865e016e,2025-01-02T15:15:19.093000 CVE-2023-39995,0,0,fdf718e8170352e73d81bc89750099463548f40b6d848c31e93139491cdf59de,2024-12-13T15:15:20.463000 @@ -243531,7 +243531,7 @@ CVE-2023-6632,0,0,b1c54670c8f8c580830f651c478abdde4fbaf49444ee1158170f1e733bd098 CVE-2023-6633,0,0,8de7c9ebad96e1b1e63f7ee0917437d9c45b07d67508fbd0e4ab2d9fea33ad99,2024-11-21T08:44:15.430000 CVE-2023-6634,0,0,4af0f8971e0f53e2ae5ef41811e9e37b2a73aed3245e588807fa0f78f7b0d874,2025-06-03T14:15:38.520000 CVE-2023-6635,0,0,b930d159660c5d2dffbcce188a715975fef9441e89d59344c487a6ad08f8bfaa,2025-05-15T20:15:29.143000 -CVE-2023-6636,0,1,0f338d074e17636e80ea5e1670bcee09c12c45a9dacacebb343d78dfc70dbbc9,2025-06-10T11:44:28.910000 +CVE-2023-6636,0,0,0f338d074e17636e80ea5e1670bcee09c12c45a9dacacebb343d78dfc70dbbc9,2025-06-10T11:44:28.910000 CVE-2023-6637,0,0,7c52b1639bf05012c19eced66616ae6b856e66a997b8457370ac22577ad50c58,2025-06-03T14:15:38.693000 CVE-2023-6638,0,0,8202a3e7efa91557985af40a6a0d3f94586e929450e1bc51f40a6c7f47210d9b,2025-06-03T14:15:39.293000 CVE-2023-6640,0,0,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000 @@ -247531,7 +247531,7 @@ CVE-2024-12392,0,0,a8156bd94e9672d4635a84a6a0bddbfa7b852dc1cc5b768dabdbd22341a78 CVE-2024-12393,0,0,0bb58765d8feb8f28285c647b089ee899cbf94b23d666e28361039e2bb2522cf,2025-06-02T16:21:01.907000 CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000 -CVE-2024-12397,0,1,0f39153bc1d1ac0d13fae9e507b21fa619e36a6fa865060fa716d3d92d7c36e3,2025-06-10T11:15:21.283000 +CVE-2024-12397,0,0,0f39153bc1d1ac0d13fae9e507b21fa619e36a6fa865060fa716d3d92d7c36e3,2025-06-10T11:15:21.283000 CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000 CVE-2024-12399,0,0,52bff9c41a163f77665f2da9fc0a8dd83c998cfb340cf3f1d77c6844e18524bb,2025-01-17T10:15:06.697000 CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000 @@ -247880,7 +247880,7 @@ CVE-2024-1274,0,0,f1db1f9b98565ee12acd91ee04a48a5ea9d9022420902832299251e567dee9 CVE-2024-12740,0,0,e6c4d03a8c2935c7f946e2ddf8fb2efb52eeb4b7b990af277f1511faff48b8c0,2025-01-27T18:15:36.743000 CVE-2024-12741,0,0,8d4c06d6204bde3983a442ab297408366d3d8d84bd77eb948d96a8745c52828f,2024-12-18T20:15:22.390000 CVE-2024-12742,0,0,d58ef6138e359837d0633f7d853b532ab5b996d40e60c1b8567bd5b194ec44e0,2025-03-06T17:15:17.740000 -CVE-2024-12743,0,1,d47e3f3c79c8d0a3041386d9c423398edff04065d61dbea54e5f1c9b09640b4b,2025-06-10T11:53:54.447000 +CVE-2024-12743,0,0,d47e3f3c79c8d0a3041386d9c423398edff04065d61dbea54e5f1c9b09640b4b,2025-06-10T11:53:54.447000 CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000 CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000 @@ -247903,11 +247903,11 @@ CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda1 CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000 CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000 CVE-2024-12766,0,0,9649c1c42978a503b019c31f940763a525ea514d4d13ceba23be095167719680,2025-03-20T14:15:18.387000 -CVE-2024-12767,0,1,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cbeac,2025-06-10T11:53:16.670000 +CVE-2024-12767,0,0,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cbeac,2025-06-10T11:53:16.670000 CVE-2024-12768,0,0,cbf9ff20e80bb09942852fa2e956342eb17e9d4f27cf212ff4c0d8344126a292,2025-05-12T01:04:06.597000 CVE-2024-12769,0,0,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000 CVE-2024-1277,0,0,2a6d3c94fab76f050717b5ee760be8ca9b7ac565da514f487f74b0cc7aeb5545,2025-03-04T12:34:06.490000 -CVE-2024-12770,0,0,bc2ca1ddd4c6e3cea3bfd4ab8a88057f1e0625786fdea1f52ba0b35a35c11266,2025-05-20T20:15:32.887000 +CVE-2024-12770,0,1,7c294a16dec2ca96b0f943d13b7ba253be9231034f57bc16710f1103bc10f749,2025-06-10T12:55:45.537000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12772,0,0,70f859d44122fb4ca5be07280e50277d8d4fcf200f73d5f17311f294bd9e06f4,2025-03-28T18:08:42.730000 CVE-2024-12773,0,0,e4c359204f9fafa24c82030ab3b6680e9aaf23ac06487063dcc758fca506c446,2025-05-07T18:54:52.500000 @@ -247936,18 +247936,18 @@ CVE-2024-12794,0,0,6bb67958621fa403e9f361b5ad08b405e435c9a95ea0caa583a82467bdddc CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000 CVE-2024-12798,0,0,488a2c4e7527f89aadf88a0b958da900c0b1ca920e367bf77296a8bbc1acc4e9,2025-01-03T14:15:24.370000 CVE-2024-12799,0,0,2976aea12fe9362d7bb71c750c2a0ebe37adb6e63168167418978285d30443c8,2025-03-05T15:15:13.127000 -CVE-2024-12800,0,0,88e7db987d05c7176b6f24501d50381df8d7ca9258841ca92fab83ec0ae42ff3,2025-05-20T20:15:33.027000 +CVE-2024-12800,0,1,52d7321dba0b059fffc06c0f8e721123c42614e9b957c99f62ba4166549289d9,2025-06-10T12:52:18.020000 CVE-2024-12801,0,0,8847bb4162cad8847e95f5d549749935a98cd5eaeb3583ac43cc5f1acc6c369c,2025-01-03T14:15:24.500000 CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000 CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000 CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000 CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12807,0,0,38bfdc769ff100a4db3a7e03118441bc3ec526327716b0b998fa92bc88a5e26b,2025-05-11T23:32:35.923000 -CVE-2024-12808,0,0,487fa0843071b105b1edb7fdf90bedaefb0bd871e31471f7b9274f1d7e7327a6,2025-05-20T20:15:33.160000 +CVE-2024-12808,0,1,c2bbaa9c21df8f37ad99655da6b944046c7039fd80bd61ad996f98d1a65117a0,2025-06-10T12:29:25.237000 CVE-2024-12809,0,0,612259b2cda97c5061140929bc611da24ff06e8922b144348f21ead0b174d40b,2025-03-07T07:15:21.380000 CVE-2024-12810,0,0,bc7dd94c64fdb6b3a597ed11abbe18e14edfa7b16233c983106a27c836dd0fee,2025-03-27T01:33:31.260000 CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000 -CVE-2024-12812,0,0,f76d179d97d3d8be0e3c3e45a0e8f164d6f1d9f7e27030b771c65b7efaeb497b,2025-05-20T20:15:33.297000 +CVE-2024-12812,0,1,daecb938e4f98947476ce265ac5bb33ddb666a154961b8642c0962448cd915cb,2025-06-10T12:22:08.690000 CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12815,0,0,98810fcf8648fec64bca31a85741fc1bbd90e62f5f053a778963e64e02a51f3a,2025-03-05T10:15:13.563000 @@ -248227,9 +248227,9 @@ CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40f CVE-2024-13086,0,0,7ac42c524055e40fca53eb99442db6298fae490b3d2a5b9bd9dde151851588be,2025-03-07T17:15:18.430000 CVE-2024-13087,0,0,de9220c2f3228338d6992a72f028e115aecfe3e99735d21a56e1a464c6d673c9,2025-06-09T12:15:47.880000 CVE-2024-13088,0,0,f092e286d50e3d3e98d13de53109368260b6d1e8323f34fd9cce2a144359b3de,2025-06-09T12:15:47.880000 -CVE-2024-13089,1,1,f5454d17f3f57010b12e68642616d13cb796efaa305513504b071cad5533df66,2025-06-10T11:15:52.113000 +CVE-2024-13089,0,0,f5454d17f3f57010b12e68642616d13cb796efaa305513504b071cad5533df66,2025-06-10T11:15:52.113000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 -CVE-2024-13090,1,1,f59bcd6fcdd4929ff55844b6e1f081fff64cd2cd1ab56a6fb30361561be373be,2025-06-10T11:15:52.477000 +CVE-2024-13090,0,0,f59bcd6fcdd4929ff55844b6e1f081fff64cd2cd1ab56a6fb30361561be373be,2025-06-10T11:15:52.477000 CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000 CVE-2024-13093,0,0,cb18337e8ee0e8d57eaca2c3b85d5fad081ebf6db3df956f09ca020aa48a7de0,2025-04-03T14:43:53.770000 @@ -248465,7 +248465,7 @@ CVE-2024-1331,0,0,9d173e21c9dc37e78754849b6df46eb1d20847c006b8fdd8b08b4a7feac03d CVE-2024-13310,0,0,c7d7f61ed943995654d2d7f670a6eebe7c0fd61f9032347d9fa323e6d73361eb,2025-01-31T16:15:33.080000 CVE-2024-13311,0,0,8f1f9a5d171f95a7ba0f9eaa7d2951798d439c8a220f4f2f7df62ba50bf29d83,2025-01-31T16:15:33.280000 CVE-2024-13312,0,0,816e38c6c7477b967986b1dc1563e84c09b9a93286b16913543c3869e5b6d36c,2025-01-31T16:15:33.413000 -CVE-2024-13313,0,0,edad7973d874ee2239fd6d15559df50e1be783f384a229c15671c50ef32a5369,2025-05-20T20:15:34.017000 +CVE-2024-13313,0,1,079fd654c18a6cebb8d8d0d6a399f2d4969e982022fa570f48eac0c412ba26e4,2025-06-10T12:01:55.290000 CVE-2024-13314,0,0,372cc18bdde9568e747e9e5be6901c6bb60d9908e4175478f94091087fbbca48,2025-05-07T17:54:43.590000 CVE-2024-13315,0,0,4230d16584ac54504af61ee61aeb80a96b9eb3fae8091facc2f2a8a9c284a210,2025-02-21T15:44:49.533000 CVE-2024-13316,0,0,cec4f855bc43e4856aaa5b46385f299eca1eb3b2bc1537232953f2705c25950a,2025-02-21T15:28:43.690000 @@ -248512,7 +248512,7 @@ CVE-2024-13353,0,0,81d2cc0d68c32fbd9c01652b235787fa907c22cf877db2ecf0577a18d5178 CVE-2024-13354,0,0,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000 CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-13356,0,0,222db37e69d6bffbe0958d093aa878adcd6606bc1c04e8c193a83d53214c4890,2025-05-23T17:21:00.780000 -CVE-2024-13357,0,0,30d9a66e12b97b83e0efc58916c32e9085479123559078ad828399653d523695,2025-05-20T20:15:34.153000 +CVE-2024-13357,0,1,771f9dc4d9355d4789e50f59190d0576323480a67c9b7a290b12bfaa52772dc4,2025-06-10T13:31:40.840000 CVE-2024-13358,0,0,325a3459d833e21ffea1778bf8000f6b383d5acd1ca06d76e78326d2ceba8c2e,2025-05-26T01:38:44.270000 CVE-2024-13359,0,0,bf6b475e08141f78e88398d59a595da02605e3ff52fdb9b04f37415a17f66af3,2025-03-13T15:15:40.237000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 @@ -248540,7 +248540,7 @@ CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462 CVE-2024-13380,0,0,fedf57869c030ff4f3637f3803a39ecc31ada14291471686481185c2393e5fb5,2025-02-18T19:15:13.623000 CVE-2024-13381,0,0,21f32b00e20a9ff4c60932bb7a0f4c78bfd66d210946c18787eab987546a4d37,2025-05-07T20:09:19.373000 CVE-2024-13382,0,0,e5fb92b7994cf896ff2c80fe04a324c17851ebf2e57fd19d81fb00d48a02bccf,2025-05-23T18:51:39.150000 -CVE-2024-13383,0,0,47c5a45792b56ff8b3a87654ab39367a9f84b5654515ef32196a0c8a3ba37164,2025-05-20T20:15:34.507000 +CVE-2024-13383,0,1,aa4d541fdadc3555a8d8a03d1edf06eb5b5dafca4f4080ebe7c8ac768bc11cab,2025-06-10T13:11:27.890000 CVE-2024-13384,0,0,c34ca1e73904819dc81eb56a50d929bdf2eae3fddfa57cb2b3d436fb77a648b0,2025-06-05T14:25:59.603000 CVE-2024-13385,0,0,341bf9c15400cae53ddc0851921970fc70795f9f5473739da6d466eaaa0f96aa,2025-01-18T07:15:08.463000 CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000 @@ -248793,12 +248793,12 @@ CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce2 CVE-2024-13613,0,0,76c50a61ea778d8b0fdc92dfa7bd753d24fe469b73d74853265b17aab9b6338e,2025-06-04T20:14:35.327000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 CVE-2024-13615,0,0,9746659970ae7b6453af10041d79de6b54c63744ad607b0ae9659991c32bafa3,2025-05-06T16:08:14.600000 -CVE-2024-13616,0,0,fbc77b4740e67bab85861e165056e54066141c3145a64d23bd926b770da18543,2025-05-20T20:15:35.373000 +CVE-2024-13616,0,1,f8a0258e3ee12546fa2d7aaf7c7240747b469deeae2631884a74ca2766cdd91f,2025-06-10T13:10:20.170000 CVE-2024-13617,0,0,eedac14ea6678606200bdc8caad10d687a435a479f513663e25ce802d6aabce2,2025-03-27T16:45:46.410000 CVE-2024-13618,0,0,c24fcd6e7987a85a9bf82460747ca3cafa3c24879596b69df592922370d4e1b9,2025-03-27T16:45:46.410000 -CVE-2024-13619,0,0,e92aca597399784d3b8b962354145dac23980424ab0a3a6fc6b0f6ce107ed048,2025-05-20T20:15:35.533000 +CVE-2024-13619,0,1,228dd097ae834fa4157341812220ab33466207a66baf632c8fe318488c915fc9,2025-06-10T13:08:49.897000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 -CVE-2024-13621,0,0,e992555db291fa067c2055e94f81e0c1465f058c342fa59c0f6a21b56aeb869c,2025-05-20T20:15:35.743000 +CVE-2024-13621,0,1,41e79a4554aff842641457268cf2ac14befc9bb974cd2028b732d9f40b02d2de,2025-06-10T13:06:41.540000 CVE-2024-13622,0,0,9eed0ba9ebfb0e518b42a2712cf92dae96162849ad9816e57eacc260ba8214a4,2025-03-17T14:11:30.240000 CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000 CVE-2024-13624,0,0,576164fc25ab192aae939d08abeb1d440de242329edf58adc5208a0aa5a99240,2025-05-15T20:53:23.813000 @@ -248914,7 +248914,7 @@ CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f CVE-2024-13724,0,0,34258747489035a04daa87bb04b1bc5e6e5e637f7e7b83271cb1adb05cf56adb,2025-03-04T20:50:01.793000 CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000 CVE-2024-13726,0,0,880bc6c2fe8613f07af78120693f246cb058ccb785a555fa5e0708829e92edbd,2025-05-21T16:04:50.690000 -CVE-2024-13727,0,0,bc0af90eaa3ac27469a3c5ce1d7f12df903594a04e36c808d134dcaaf3dc0169,2025-05-20T20:15:35.927000 +CVE-2024-13727,0,1,299231c8d4ee4a2fed2c2248b33b4b9b92a70368aa28206e65648d0090c75ff4,2025-06-10T13:05:39.307000 CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac5789f5,2025-02-23T06:15:08.710000 CVE-2024-13729,0,0,43f455d9551e899d69ddf74a933692c26ac1a517409084ab5f20c0f1a53c6197,2025-05-23T18:46:33.653000 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 @@ -249002,12 +249002,12 @@ CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a CVE-2024-13820,0,0,3f47e2346a0959c05c93a153ce340ec2fa8ffde91098f5b8973269a0c75cf098,2025-04-08T18:13:53.347000 CVE-2024-13821,0,0,fa63e95562fe6d0f5424bef06c66fc83e2349c34bd54ad7786c2856fc307ac82,2025-02-25T19:37:29.223000 CVE-2024-13822,0,0,82ccf0fd7722bab25c24e6416ed907e575f02c81b1df43a838280131bbe2a224,2025-05-07T17:26:08.580000 -CVE-2024-13823,0,0,5d2ca7c91d432a559f974647e3aa94614d02a1e0cfa4e1fe4e6f01e334641f58,2025-05-20T20:15:36.347000 +CVE-2024-13823,0,1,5eac694d58919decf6228c2e6601b3f2df5b97cae3d8db9a30e0cccd2367364e,2025-06-10T13:04:43.860000 CVE-2024-13824,0,0,9a24e697ac549f7d4674f794b4484e44cf4c976711aeb4120a01b1e2df50cb0b,2025-03-21T14:55:08.103000 CVE-2024-13825,0,0,c439e603890b8aabcb647bfe30ce08233b4b5913ceafec654aae98c44084238b,2025-05-06T16:17:38.650000 CVE-2024-13826,0,0,5e6f0c7bd24b8c34be283a1fe05744be6d6d50773749f98d4b5fa4f53914f6d9,2025-05-06T16:16:19.067000 CVE-2024-13827,0,0,5c4067cb862f24413fc68125bcc709e40867b80ad9cccc45000563f036236cec,2025-03-05T09:15:09.390000 -CVE-2024-13828,0,0,ddcc9f179bb1df1597445e580deaecf78f63628f476c9fb5c6a7f6ffea0b2475,2025-05-20T20:15:36.503000 +CVE-2024-13828,0,1,7358b1e4e39a9a2009775aa970c78fe81a767e1d2202043fc9189fa9622bb823,2025-06-10T13:02:39.683000 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,831f4398bca1f1e598b6ff4c23b6b849c16ee98f247d954693e5349168e8ad80,2025-02-28T15:10:48.447000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 @@ -249101,8 +249101,8 @@ CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b CVE-2024-13913,0,0,97e9263ea64a11bf1d9dd911c989e4107d7a928b53ec2e2ca6bd3929a0fde8a1,2025-03-14T06:15:24.490000 CVE-2024-13914,0,0,2af344b4b59c1a7104b4453c8c333847114f5fbef4676b0e1849066fad060e76,2025-05-16T14:43:26.160000 CVE-2024-13915,0,0,6fe2f006afc76e62529cad238e1d7c5fa1e81ebbb017ddd7987d1601087231ea,2025-06-10T09:15:22.463000 -CVE-2024-13916,0,1,616a3a974a6f01de2c87e25818465d874537e8e70683ef59a680af8227940de2,2025-06-10T10:15:21.443000 -CVE-2024-13917,0,1,d7f074eb3bc2e28f3b38b1720523e72dbce348ba1de7ad8e965baa1b1f59ff10,2025-06-10T10:15:26.553000 +CVE-2024-13916,0,0,616a3a974a6f01de2c87e25818465d874537e8e70683ef59a680af8227940de2,2025-06-10T10:15:21.443000 +CVE-2024-13917,0,0,d7f074eb3bc2e28f3b38b1720523e72dbce348ba1de7ad8e965baa1b1f59ff10,2025-06-10T10:15:26.553000 CVE-2024-13918,0,0,42b43ee8cd03c685390e4720249fe990efc04f95289c224e1def5175db4f83ef,2025-03-24T14:15:59 CVE-2024-13919,0,0,e47cf885ddbb3552eadad29313f1bea2b10cd197fed90bc6c347d954f876d2b0,2025-03-24T14:14:53.337000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 @@ -258112,7 +258112,7 @@ CVE-2024-30616,0,0,f690cd9281b12c84866f69af289ad659f87a7bf5a21c0a047e9555ca2a6e1 CVE-2024-30617,0,0,4e4fab9894739cd86b0fa43a3c5304a82b4f65fc3da8a9f40643b10883f8203d,2025-04-18T13:55:07.440000 CVE-2024-30618,0,0,aa74e0bc9460fafdc195f142a91d754bf82056e989f3724a7675a82e5a3c7ef5,2025-04-18T13:54:12.313000 CVE-2024-30619,0,0,aa15af9ede2760db72cc5dd099d038bba420b382cc365ab4a3fc268ddecec6f5,2025-04-18T13:52:46.940000 -CVE-2024-3062,0,0,235a5377d98b848a5c19ce39b1979ab030e25c0caf0feb28a8a478bb4d2a5c7e,2025-05-19T15:15:22.133000 +CVE-2024-3062,0,1,c4e871a4083e5222f18402b09159d962fa761d0b939797a1b677f2b78a18fe11,2025-06-10T13:57:42.330000 CVE-2024-30620,0,0,1b3e51295647ffd13564c7714ebaea0b045e75f1b544faff2d143fb94e342877,2025-03-25T15:15:20.967000 CVE-2024-30621,0,0,0dc11285619aa51aaccf5ba8a6dfa55feacfd678728e357f9c88d654c4236d9b,2024-11-21T09:12:19.600000 CVE-2024-30622,0,0,c184a925147888a48a43c2ebde524eaabf19c129f37a11429143c92e8bcfca27,2025-03-13T21:23:14.273000 @@ -263203,7 +263203,7 @@ CVE-2024-37259,0,0,b111a5473f46b1bb41290b6efdd564593ab17a36d078c9670b5dbe3c86120 CVE-2024-3726,0,0,9dbd42b932087fa2a65c5516bc71599cb9f7f46ce6c10aecc20bfa3f28ed9d2c,2024-11-21T09:30:15.237000 CVE-2024-37260,0,0,5e9706c77eb49e146468bb0f09d58d0f11318eeda87c7a1ff0d1efbb33f5fb54,2024-11-21T09:23:29.377000 CVE-2024-37261,0,0,7707a4ef346df834825f33497933b4b7045bbe979c2af643480a7b2e1b3fa9dc,2024-11-21T09:23:29.517000 -CVE-2024-37262,0,0,59421a4567abf98dbaf885157f34fcfb756b288839576fb187fc8bff99ccfcb9,2024-11-21T09:23:29.650000 +CVE-2024-37262,0,1,09385f5f7e0e03772e56b28e8a6293dce8825176f5948736af1694f23f000ee0,2025-06-10T12:45:23.150000 CVE-2024-37263,0,0,4c0f9b0146e7eea4096ad389b48dc7041fb78e43d90694e2c8b0f0808a0bc3ba,2024-11-21T09:23:29.790000 CVE-2024-37264,0,0,f1bebcc6a6a0f693ac1a2045228d795b947e81bf997e3c96a81d1dc7c6394ae6,2024-11-21T09:23:29.927000 CVE-2024-37265,0,0,33ac5001e3ce913d6259b7e706c199e5216dbab4c34d5a1f92004146060dd2c2,2024-11-21T09:23:30.083000 @@ -265516,7 +265516,7 @@ CVE-2024-40036,0,0,7ada3b0848f443c38ddf205d8d8de522c0823c689aa06344378a06c3b86ab CVE-2024-40037,0,0,c9d7ad11595234c7fc00a96565c10bcc451b262271af0b09e15e7a97f1e5ab5d,2024-11-21T09:30:53.433000 CVE-2024-40038,0,0,1e018dbdc79d7848d568a5bae781c1ebbdf6def4b78631d9d14756762dc294f2,2025-04-15T17:01:21.050000 CVE-2024-40039,0,0,10bb82b9a485d9a30d97534c1565b71b69e7d2b8a8d12d3cebe34d27e8391f10,2025-03-13T18:15:42.207000 -CVE-2024-4004,0,0,c9fa24b0a4779125c8e00884562ad42c98d666a28ee7675bd2f581f91a8420d4,2025-05-16T16:15:28.143000 +CVE-2024-4004,0,1,fb6657f16cf3e3db6c5306af2c2d52123b155d11529b185e39b5426df66d88fb,2025-06-10T13:42:33.290000 CVE-2024-4005,0,0,10ce0801262283a3acf259593f5122037af4b3f2afe41d97e0d5130b74a0b3ba,2025-03-13T22:15:14.523000 CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000 CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000 @@ -268589,7 +268589,7 @@ CVE-2024-44001,0,0,175a5c76eaa0c47ffbee0289add49207844bb4c67d99ffcbaaa126343821b CVE-2024-44002,0,0,fb0f9d9f4deabfd4ae1435b962e7db8b5241e501eddbb5d325e8dc3232296abc,2024-09-25T20:06:13.100000 CVE-2024-44003,0,0,23e0564b892dd423e7259e31c83d1277fbb7208f6d70fd5f18df7ac3fcafb2ea,2024-09-25T20:03:29.867000 CVE-2024-44004,0,0,bbc19a7af2ebbf830c254cf451b28c5ea08ca0da1e15859da6b1d1952425238b,2024-09-24T19:22:14.760000 -CVE-2024-44005,0,1,96a48922146014b4096b0e3da854976801051d3d24069d441538abeeacd253ac,2025-06-10T11:44:28.910000 +CVE-2024-44005,0,0,96a48922146014b4096b0e3da854976801051d3d24069d441538abeeacd253ac,2025-06-10T11:44:28.910000 CVE-2024-44006,0,0,07a7b2d93672ddd0e2d64af483cf570ba63f1e65d2ff5fdafe3c8385cb34625a,2024-11-08T21:08:38.960000 CVE-2024-44007,0,0,eb31863e8cc5fd1d114916effb9a6848710b326ebc0b4750aa792a8d30574b0c,2024-09-24T22:08:52.857000 CVE-2024-44008,0,0,f7af8bcf24d7662d22f83ecd74e944dec78b8e1307eefd0e495f38cb1e19aae0,2024-09-24T22:08:01.060000 @@ -273176,7 +273176,7 @@ CVE-2024-50256,0,0,da7409ea6f37017b9509db8e1d03cd79451c987d7cba2b77a28f3790c1801 CVE-2024-50257,0,0,709c952c23f6f2c85756fa281ef4d4539da93958904cb8b8a9d399dd5e519f97,2024-12-11T15:15:13.913000 CVE-2024-50258,0,0,fab4b733ec19089854abd2b485c2e0835c2194d06a6d8e3284c9718a9dec4d9d,2025-05-02T07:15:56.490000 CVE-2024-50259,0,0,677e0e1bbe84ed4ab3644382c3f2533d28ae11f50a1fc23ec0092a6601ed2d49,2024-11-14T18:24:11.470000 -CVE-2024-5026,0,0,4427b41ba4a1ab32fffdc954200325ecacf644272ce2aad9c3cb2b82001ce650,2025-05-20T20:15:36.837000 +CVE-2024-5026,0,1,319631cb04e347abbc33aa984d631d9ee475096557f70387f0c314898438bfa4,2025-06-10T13:36:54.840000 CVE-2024-50260,0,0,eebfa27953e35b054c12e5e328e8666a82e16db3076b6aad7980b056c6faa68b,2024-11-13T18:47:43.830000 CVE-2024-50261,0,0,859333bc625e392047b9a3e1685efd1bbebb6888814fd4e4b6c9cb690add0bd4,2024-12-11T15:15:14.133000 CVE-2024-50262,0,0,98db827853cb172853751d52de2f37b7074faf6606a02ce0073bf6eea45e8797,2024-12-11T16:15:12.513000 @@ -278214,7 +278214,7 @@ CVE-2024-57906,0,0,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f CVE-2024-57907,0,0,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000 CVE-2024-57908,0,0,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000 CVE-2024-57909,0,0,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000 -CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000 +CVE-2024-5791,0,1,6aec4f8b08417a8c035d35f38de1d43216110222760f5106aca921f21a31bac0,2025-06-10T12:45:23.150000 CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000 CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000 CVE-2024-57912,0,0,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000 @@ -278489,7 +278489,7 @@ CVE-2024-5855,0,0,e3b94dbd38c6c583563ce8d4a64fe4513b9c4930c0a9defeba9b12ad8934e6 CVE-2024-5856,0,0,f409ca778bc3503ba0953dabe4d8c60a3ff3078514214d270804de662f27ffeb,2024-11-21T09:48:29.060000 CVE-2024-5857,0,0,d2e8fdc28fe3c9c38fbaa264706e0b39e123de000f9b115383c398aef67773e9,2024-10-04T12:59:27.290000 CVE-2024-5858,0,0,f11336185195d9a02c4221a561cac24b91c76fc2cf1b5733db9d2c5e08e67568,2024-11-21T09:48:29.270000 -CVE-2024-5859,0,0,29152b99e632ab0129b4a9a5392c31d2700fec464aea253a3a907443889af9a4,2024-11-21T09:48:29.377000 +CVE-2024-5859,0,1,5a1495b9b4816d523738499f778adb7eae3a8263c0133e1641efb1997e3513df,2025-06-10T12:45:23.150000 CVE-2024-5860,0,0,095c77da0715fbf43c36d830a751eef0ac354ee45546507c445de80de5c7f86c,2024-11-21T09:48:29.490000 CVE-2024-5861,0,0,79551c286ea0a60702a4e040a1d82751b2d9172a05b7fd4efa55d3a6a7ec9037,2024-11-21T09:48:29.607000 CVE-2024-5862,0,0,5a2b1c4235948f0d50051344c640c2e071e5b5598bc997f246c1be662c3a9c8e,2024-11-21T09:48:29.733000 @@ -285470,8 +285470,8 @@ CVE-2025-22119,0,0,2f09d65d442eb8e910f07964987dcbbe390d5a22774502925136f0f5e2432 CVE-2025-2212,0,0,347acd7cefc790885b47aec20e274251fda79a418815081e1cb51978df1bcde5,2025-03-11T23:15:38.253000 CVE-2025-22120,0,0,56b604066f8d00919ad540ee4d7bb8d05d7f16e6e7e47b03157a55c7abcc60af,2025-05-02T07:15:59.640000 CVE-2025-22121,0,0,0fb672ef784beaceffd7562b0d835f70da34c25516b143ecaaff12a8d6fe22c8,2025-04-17T20:22:16.240000 -CVE-2025-22122,0,0,0c59a6fd110c2c79b78a10a96735fb481b59795e3867f8b63bfa018f56e4b421,2025-04-17T20:22:16.240000 -CVE-2025-22123,0,0,61bfdc366c8e5a41eb6424d4cbbb75050b9631c4c26b66c3ae5aae59f022e017,2025-04-17T20:22:16.240000 +CVE-2025-22122,0,1,58f26540291b22254e813ab1085c8cb38b9e0486f52ad4fd26ddb58def241157,2025-06-10T12:15:23.090000 +CVE-2025-22123,0,1,e7155b6b5bc9d26722a323043bf77467a8d9709d9f4036f7cf072a26365f974c,2025-06-10T12:15:23.750000 CVE-2025-22124,0,0,09a256b2c17dbd18800ac7e1feaad9e930636f4d0b9fc0ef1d0f63fe3b204244,2025-04-17T20:22:16.240000 CVE-2025-22125,0,0,4e16b6bb1574e3a218f15739af16c15ef140ff8d253a467b4d70d5fb76ed7c28,2025-04-17T20:22:16.240000 CVE-2025-22126,0,0,d69a5c7dd72e14d4efa2f34c1be80ca5e4fba4822f184eaebcbe35636daca26c,2025-04-25T11:15:45.880000 @@ -289113,7 +289113,7 @@ CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0b CVE-2025-27018,0,0,48d58c9e9c902b1eaa7722cd7e4f3337c69ebc3fec7269de4a4a5a702e3570f7,2025-06-03T21:11:28.860000 CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000 CVE-2025-27029,0,0,f19508e0628f7c772651f93e1b12fe9874fd4060cecec22f220c71602c00f8da,2025-06-04T14:54:33.783000 -CVE-2025-2703,0,1,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6df,2025-06-10T11:15:52.680000 +CVE-2025-2703,0,0,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6df,2025-06-10T11:15:52.680000 CVE-2025-27031,0,0,9fa4d5238e55dfabc5a9becc0748532469d6008767dbc00fd4050a94f50be84d,2025-06-04T14:54:33.783000 CVE-2025-27038,0,0,fe0578cb45b48dbd7571220d905a674d9df1e67d36609a2b08ca2656fb74b6b8,2025-06-04T17:23:58.387000 CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000 @@ -290150,6 +290150,7 @@ CVE-2025-29153,0,0,d8eeeb715e26f12c35487b55680a3c0a724084732ee5fd50de67d20533f23 CVE-2025-29154,0,0,7fdc59b1b8b3db49c174aefb6a6ba9c008546e8b1db8a06cac0366e7a5c5b909,2025-05-08T19:16:02.437000 CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 CVE-2025-2917,0,0,5e954b3dd80aa4a930dbaedde7b70b19fc8b0dc93229912d7b3d305f418d7302,2025-06-09T17:30:31.340000 +CVE-2025-2918,1,1,613909e2a51855b95045031b84bec6fc7a6aea8b022ee5876305ee5459590153,2025-06-10T12:15:23.867000 CVE-2025-29180,0,0,ff32a6c0b8ae6bd7bd11047aabd317a8e135e12cfa97f8616621804c50d97fba,2025-04-23T18:44:06.733000 CVE-2025-29181,0,0,8ae82d2203a155eaf3356642ff55a59d1f6c904778c798cb5b17b83f75821ff9,2025-04-23T18:21:15.327000 CVE-2025-29189,0,0,acad0707e84ed6f6034c389318c16d4a284ae555c697c4e5480dcb98a0326eea,2025-04-22T17:11:10.127000 @@ -291324,7 +291325,7 @@ CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8 CVE-2025-31016,0,0,9f9353b55280d52026be79b202ae8bc2b442e0024607fdee2a6c539bec9857cb,2025-04-01T20:26:30.593000 CVE-2025-31017,0,0,4d15e426e44fc80241be23dec538166170b7e58fdf6f1e6ffe3f4a6bbdf70361,2025-04-09T20:02:41.860000 CVE-2025-31018,0,0,9405833e484baccbf4a372ae14b5b3c897f0fd637b0228286c0af34a95c332bd,2025-04-17T20:21:05.203000 -CVE-2025-31019,0,0,cf0eb8d0fc3a4e395ce8cfd725e30645b941cdcc96fa70d4706eaa033a98182d,2025-06-09T16:15:36.450000 +CVE-2025-31019,0,1,3d4b8e548615b0c7592279712067028f00a3393e212453365cd3f5b4ebfdecaf,2025-06-10T13:15:21.477000 CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000 CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000 CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000 @@ -294231,16 +294232,16 @@ CVE-2025-40650,0,0,b06bd04057578be69f52c26cfd738aa4aa83676839010f4d9f35ce7436a21 CVE-2025-40651,0,0,1dd3c6768789fd8cb58af27a11d14826bfd53d1b5bf2d2d5309827d197f9e05c,2025-05-28T15:01:30.720000 CVE-2025-40652,0,0,3ed1e73ca0af4a402b191efa99599865fb897bbf50a3feb00af29861487f2b95,2025-05-28T15:01:30.720000 CVE-2025-40653,0,0,952d6149fd41bb3446d99ef1d9980a07fed39db01b9836f114bc421cd10405d3,2025-05-28T15:01:30.720000 -CVE-2025-40654,1,1,70021833c5d4fccb4cbab7f376b6dbbbb5eeb1659b7238abf2213972c41ec464,2025-06-10T10:15:26.990000 -CVE-2025-40655,1,1,13fc8c330d3ba042b4fb0ff74338f42d57b0e0f02cdf25fc26d82ac7a7f3d5c3,2025-06-10T10:15:27.620000 -CVE-2025-40656,1,1,445d56d9e8b8681815d2b427356cf93650e73d35491684b06c257d23b1914704,2025-06-10T10:15:27.843000 -CVE-2025-40657,1,1,1fdd7fa0fa4630dcad1d0ec16e781e4cf9a241d066312193320c856179404876,2025-06-10T10:15:28.043000 -CVE-2025-40658,1,1,9e0dd0bf5f4d48d3430e2ac214ac9f11499f92444af36de6b77d763cbd260454,2025-06-10T10:15:28.237000 -CVE-2025-40659,1,1,5ab65d9a1e9e8fe6f49a660ca7b98dbb76f21ef7918c07bd366a37006d8c05b2,2025-06-10T10:15:28.430000 +CVE-2025-40654,0,0,70021833c5d4fccb4cbab7f376b6dbbbb5eeb1659b7238abf2213972c41ec464,2025-06-10T10:15:26.990000 +CVE-2025-40655,0,0,13fc8c330d3ba042b4fb0ff74338f42d57b0e0f02cdf25fc26d82ac7a7f3d5c3,2025-06-10T10:15:27.620000 +CVE-2025-40656,0,0,445d56d9e8b8681815d2b427356cf93650e73d35491684b06c257d23b1914704,2025-06-10T10:15:27.843000 +CVE-2025-40657,0,0,1fdd7fa0fa4630dcad1d0ec16e781e4cf9a241d066312193320c856179404876,2025-06-10T10:15:28.043000 +CVE-2025-40658,0,0,9e0dd0bf5f4d48d3430e2ac214ac9f11499f92444af36de6b77d763cbd260454,2025-06-10T10:15:28.237000 +CVE-2025-40659,0,0,5ab65d9a1e9e8fe6f49a660ca7b98dbb76f21ef7918c07bd366a37006d8c05b2,2025-06-10T10:15:28.430000 CVE-2025-4066,0,0,6b866ef67faa41ec2689ec4b83aa9ca62c69a8051911732f639e5179e5df1a9e,2025-05-12T19:35:25.097000 -CVE-2025-40660,1,1,29911c79c9521fcfb5c5e7a057e47c4234cb1dee864fe0c64a3a17305c4c417a,2025-06-10T10:15:28.627000 -CVE-2025-40661,1,1,0f28040d1797055ea2a2b8beac85a17e088e312b347c25778f9cefcc8d55c4cf,2025-06-10T10:15:28.827000 -CVE-2025-40662,1,1,2d08d93cd316b56d55652ae4d161fcc5bf4f67c333a3b98aa7ec6815f72b2464,2025-06-10T10:15:29.103000 +CVE-2025-40660,0,0,29911c79c9521fcfb5c5e7a057e47c4234cb1dee864fe0c64a3a17305c4c417a,2025-06-10T10:15:28.627000 +CVE-2025-40661,0,0,0f28040d1797055ea2a2b8beac85a17e088e312b347c25778f9cefcc8d55c4cf,2025-06-10T10:15:28.827000 +CVE-2025-40662,0,0,2d08d93cd316b56d55652ae4d161fcc5bf4f67c333a3b98aa7ec6815f72b2464,2025-06-10T10:15:29.103000 CVE-2025-40663,0,0,4aa8c64bc18f7e33ebb6be208f9cd3156bb0660dc9a760545e0a74283cf88190,2025-05-28T15:01:30.720000 CVE-2025-40664,0,0,e366ae4d0edc3020bccb4958e82dfc623d961bfd022fb180a3be2259f2bb55f6,2025-05-28T15:01:30.720000 CVE-2025-40665,0,0,80c9d614a0e728f77e8ffb6c772411e08f1a3422b53c0225c9a2a3eda1f363a3,2025-05-28T15:01:30.720000 @@ -294400,7 +294401,7 @@ CVE-2025-41652,0,0,61b56e820debad0d6ed87e53925b75193550ab4911ec76df587d7530bd8f7 CVE-2025-41653,0,0,450cb90166822151ca98533cba100a0f07716a6f9e2e385d8b8766038d4b0cb2,2025-05-28T15:01:30.720000 CVE-2025-41654,0,0,c22856a515f49ccd204a32143b656fc257abf14e343863bdec0d026ca010bcd0,2025-05-28T15:01:30.720000 CVE-2025-41655,0,0,d4e55c0bf8ee1b4fb7f9a5a70eabfb748935a97fe6cc917be3646a99349642c3,2025-05-28T15:01:30.720000 -CVE-2025-41657,1,1,fe785a8a271a8bfed9a8574477bebed4f54bcc892e6c96de3103c865106136b3,2025-06-10T11:15:53.150000 +CVE-2025-41657,0,0,fe785a8a271a8bfed9a8574477bebed4f54bcc892e6c96de3103c865106136b3,2025-06-10T11:15:53.150000 CVE-2025-4166,0,0,5bfebbee34c2356ee039434bb4ac7a8705ff7fab6fe8d313f7df39c4661cee90,2025-05-05T20:54:45.973000 CVE-2025-4168,0,0,a6468df4f7a2597ad76d3cb7aeb08566a4877cfddb2b3e40039e98441ddbce5f,2025-05-05T20:54:19.760000 CVE-2025-4169,0,0,bfc728158ddf7f1a565291bbe3bc05c4816fdb9cc64adedded01a1b86d632adf,2025-05-16T14:42:18.700000 @@ -294634,6 +294635,11 @@ CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8f CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000 CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000 CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000 +CVE-2025-43697,1,1,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000 +CVE-2025-43698,1,1,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000 +CVE-2025-43699,1,1,1d39cab8eb945db8a47c3cddf7010f12f0acd959ee68a355398abdd3563ec5f6,2025-06-10T12:15:24.357000 +CVE-2025-43700,1,1,c2cc58f0e604eee544996cc7d907ffb95b0541f1f14e0033ad5f656f887ab519,2025-06-10T12:15:24.483000 +CVE-2025-43701,1,1,fe2e34423b7eb971d6d18dd04633ff9c2283f50df1b163605e07e8bc0d13083a,2025-06-10T12:15:24.607000 CVE-2025-43703,0,0,d6625a868be77b8d7893d215165a3a98f3361eec5aed450c8d69ce3a9dfaf391,2025-04-17T20:21:48.243000 CVE-2025-43704,0,0,e4a4f68c1c515be2555ad90b5dc0fde58f5ff1d76445660f48da718ee733becf,2025-04-17T20:21:48.243000 CVE-2025-43708,0,0,d38c003beeae09584e47fb48659652128bc4a5d2c5ae13da147de319358e0588,2025-04-17T20:21:48.243000 @@ -295021,6 +295027,7 @@ CVE-2025-45752,0,0,bb720a75a25153c4b67014caa45a3f9b58d2b0bec0c849f14f25b8ea2041a CVE-2025-45753,0,0,214d28714b713bde0d2189fb494c4cf3b7e4c41bc036574809186d613ce4c8d3,2025-05-23T15:55:02.040000 CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000 CVE-2025-45755,0,0,caf4a0a5971f4cf5680b0cad2b710bbea10da89f97ba8578c52219a358cfcd66,2025-05-21T20:24:58.133000 +CVE-2025-4577,1,1,4a91aca368e2246a8d948570e9d07d7ca1b03157298c3f0691b2680d7569c16e,2025-06-10T12:15:24.737000 CVE-2025-45779,0,0,c093a7d91bfb997294cab32f2ebe8a712075ae66c80f7c18bdd9520e3509f542,2025-05-12T22:15:26.173000 CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000 CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000 @@ -295871,6 +295878,7 @@ CVE-2025-47733,0,0,8ca49357b50ecb80722b97ab3f7e121e8dcb83e490a4a143991ae1fbc243a CVE-2025-47735,0,0,2f52e7c2d058d86629cac68f734c0774cf880fe4e8f98eedcaeede1d23aa6eff,2025-05-12T17:32:52.810000 CVE-2025-47736,0,0,2f11e9b0a9d748da2f6ce9c62d30862cdd6596c7ac96ac5f1028db67479c00c6,2025-05-12T17:32:52.810000 CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b389d1,2025-05-12T17:32:52.810000 +CVE-2025-4774,1,1,1e75afc071802c869ba75e3e2c7fee49a6dc26e98ae9abafaae710b45ad59a5a,2025-06-10T12:15:24.917000 CVE-2025-47748,0,0,6d3db12d37c958bc3ed0c3a8085a815af32d574707d63e9cde8e957a0c1f87c1,2025-05-30T17:15:29.117000 CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000 CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000 @@ -296578,11 +296586,17 @@ CVE-2025-49449,0,0,cb55c78573e475586bf5898df8e2e4f1b569914e0d162e1db1433500aa43a CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000 CVE-2025-49450,0,0,fb4f52dbcabe6d10a7029fe4e63b7637345c171e5ff856e151d99f1496446ba0,2025-06-06T14:06:58.193000 CVE-2025-49453,0,0,66b7e122d30d583eff84e0f9157cb5663586cb3b5d97be1749136fd19a39911b,2025-06-06T14:06:58.193000 +CVE-2025-49454,1,1,2433f7f8de0001ca2d2da6c54dc979f31dcf2d414e8300db8b62359b19da3345,2025-06-10T13:15:22.733000 +CVE-2025-49455,1,1,9a47f583a263d3e3186cf1ae35041291e53c027322199aab4d219fcdcc74ab9a,2025-06-10T13:15:23.107000 CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 CVE-2025-4948,0,0,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000 +CVE-2025-49507,1,1,24312343f4e2c01b89d0c4e095f704954733d42a1386c6354cb85aa7eb38383f,2025-06-10T13:15:23.283000 +CVE-2025-49509,1,1,1518f93f1ee224f1f100bcee71d6ba948043b73035e7eb346a997192f9c2edc4,2025-06-10T13:15:23.427000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 +CVE-2025-49510,1,1,380506e2ae8c03ebf1a0d58576260eadb6379c51baddcca2c48765ccd61fe5a4,2025-06-10T13:15:23.583000 +CVE-2025-49511,1,1,89f9e9e06a92ee36a7fcee42b322bef8df2556399087804f516e0b0f17a65447,2025-06-10T13:15:23.747000 CVE-2025-4954,0,0,4f8b18e50e35fbfc0cb799c772c703df1c5ec3452b90f5bc7c961ccbbcb5c026,2025-06-10T06:15:22.403000 CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000 @@ -297242,15 +297256,15 @@ CVE-2025-5908,0,0,37a781f179b1660861001bee4d6c7fb2b67dae046e6af7975b6ededfbac21b CVE-2025-5909,0,0,ab669f12f4fae3bd2f0735d7b1e7ccb7a4a13f9471f08d5428635b990107078e,2025-06-10T02:15:21.007000 CVE-2025-5910,0,0,715eda73591903f377a983344c94f5b98f27bef425aa0c6a6a65f0932e6208e0,2025-06-10T03:15:38.583000 CVE-2025-5911,0,0,d7e3dcb7d9bb0675f96fabf6f38549f2456bb2d26953b2e2b03a3110da86f3a8,2025-06-10T03:15:39.060000 -CVE-2025-5912,0,0,b4a379b730919f23bbfd564747bb9b00dbf90200eb93653aaa62f644e11ed9f6,2025-06-10T04:15:49.300000 -CVE-2025-5913,0,0,c61460384b72cb88f96178b08fff9f8b0ce36776535ad07f09e982e6f3eaba0a,2025-06-10T04:15:54.063000 +CVE-2025-5912,0,1,fc829098fb36c572f42bd3ad43b84104ffd43f9edbc3a07bb8f8f65b641b7584,2025-06-10T13:15:24.117000 +CVE-2025-5913,0,1,f23d22995ace860f4eedc70184b3f124f503628f51322e84608328c1fe143107,2025-06-10T13:15:24.380000 CVE-2025-5914,0,0,ca2950efdb51e21bbb1b52a25d765df8575e0ffa29446d96c03c3ef2bb78c27f,2025-06-09T20:15:26.123000 CVE-2025-5915,0,0,0e67ccac333c7a11c03869b01cbfabaf1cb283cb5a64338a4f2ca5aab164415e,2025-06-09T20:15:26.317000 CVE-2025-5916,0,0,de33dac47619c4e1d912727e7eb0e9fccd9c7c67167013ac3aa335bd776c0a9e,2025-06-09T20:15:27.170000 CVE-2025-5917,0,0,479e3dcc90af3e8467020be4388f622f5adbb9e240dc38ecb4cf9119d478c05a,2025-06-09T20:15:27.330000 CVE-2025-5918,0,0,5fae4533f01b7c4f6585a87e7b2331625bf70aa585af023c3c09519081c4b2f9,2025-06-09T20:15:27.493000 CVE-2025-5925,0,0,573daaf55ea018a58bf2bd7e92cad13cf577779f7064f5ad7d1f8de96931b737,2025-06-10T04:15:54.330000 -CVE-2025-5934,0,0,1ba42daaa63d058bbd118ea21d90f49dd5a949e0cf3049fe0f8f381cc6ec4483,2025-06-10T04:15:55.327000 +CVE-2025-5934,0,1,6e6b56247e88c88b3883e91849581fe9fb4286ffb99dfd632c90d49eafeb498f,2025-06-10T13:15:24.570000 CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2cd,2025-06-10T05:15:22.780000 CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 CVE-2025-5952,0,0,f3a4e649f505b0fd93baf65191971ffe21485a7c802124ab53f303aeb8bcf467,2025-06-10T05:15:23.023000