From d9e62349493e84c573719a4d60449c64d7c2ce2b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 3 Jun 2025 04:03:54 +0000 Subject: [PATCH] Auto-Update: 2025-06-03T04:00:21.393124+00:00 --- CVE-2023/CVE-2023-43xx/CVE-2023-4387.json | 6 +- CVE-2023/CVE-2023-486xx/CVE-2023-48645.json | 32 +++++++++- CVE-2023/CVE-2023-488xx/CVE-2023-48842.json | 32 +++++++++- CVE-2023/CVE-2023-488xx/CVE-2023-48863.json | 32 +++++++++- CVE-2025/CVE-2025-230xx/CVE-2025-23099.json | 39 +++++++++++- CVE-2025/CVE-2025-231xx/CVE-2025-23105.json | 39 +++++++++++- CVE-2025/CVE-2025-29xx/CVE-2025-2939.json | 68 +++++++++++++++++++++ CVE-2025/CVE-2025-35xx/CVE-2025-3576.json | 6 +- CVE-2025/CVE-2025-409xx/CVE-2025-40909.json | 6 +- CVE-2025/CVE-2025-40xx/CVE-2025-4047.json | 64 +++++++++++++++++++ CVE-2025/CVE-2025-42xx/CVE-2025-4224.json | 60 ++++++++++++++++++ CVE-2025/CVE-2025-50xx/CVE-2025-5068.json | 37 ++++++++++- CVE-2025/CVE-2025-54xx/CVE-2025-5419.json | 39 +++++++++++- README.md | 33 +++++----- _state.csv | 39 ++++++------ 15 files changed, 485 insertions(+), 47 deletions(-) create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2939.json create mode 100644 CVE-2025/CVE-2025-40xx/CVE-2025-4047.json create mode 100644 CVE-2025/CVE-2025-42xx/CVE-2025-4224.json diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4387.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4387.json index 4bde78c1267..3407db21d43 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4387.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4387.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4387", "sourceIdentifier": "secalert@redhat.com", "published": "2023-08-16T19:15:10.087", - "lastModified": "2024-12-15T21:15:15.583", + "lastModified": "2025-06-03T03:15:25.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -180,6 +180,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2022:7683", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2022:8267", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48645.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48645.json index 6d7509054b7..ac337ccd271 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48645.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48645.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48645", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T09:15:37.420", - "lastModified": "2025-05-30T16:15:35.430", + "lastModified": "2025-06-03T03:15:24.817", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48842.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48842.json index 83bf0f76efc..51bf52a5690 100644 --- a/CVE-2023/CVE-2023-488xx/CVE-2023-48842.json +++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48842.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48842", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-01T16:15:07.550", - "lastModified": "2024-11-21T08:32:32.853", + "lastModified": "2025-06-03T03:15:25.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48863.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48863.json index 92cd7060139..a213b43236d 100644 --- a/CVE-2023/CVE-2023-488xx/CVE-2023-48863.json +++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48863.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48863", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T13:15:07.753", - "lastModified": "2024-11-21T08:32:34.003", + "lastModified": "2025-06-03T03:15:25.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json index e5363410a79..1c29dfd8dd5 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23099.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23099", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T19:15:26.213", - "lastModified": "2025-06-02T19:15:26.213", + "lastModified": "2025-06-03T03:15:26.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json index 3944bf1992b..1d25eccba0d 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23105.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23105", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T19:15:26.913", - "lastModified": "2025-06-02T19:15:26.913", + "lastModified": "2025-06-03T03:15:26.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2939.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2939.json new file mode 100644 index 00000000000..f5ac7302ba9 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2939.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-2939", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T03:15:27.137", + "lastModified": "2025-06-03T03:15:27.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ninja Tables \u2013 Easy Data Table Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.0.18 via deserialization of untrusted input from the args[callback] parameter . This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary functions, though it does not allow user supplied parameters only single functions can be called so the impact is limited." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.18/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.19/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ninja-tables/trunk/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e38553d-5dba-4c84-95f7-43420245c770?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3576.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3576.json index 3ed16905177..32d52793c48 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3576.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3576.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3576", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-15T06:15:44.047", - "lastModified": "2025-05-30T17:15:28.940", + "lastModified": "2025-06-03T03:15:27.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:8411", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-3576", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-409xx/CVE-2025-40909.json b/CVE-2025/CVE-2025-409xx/CVE-2025-40909.json index fe36fddd46d..5666d5d0af9 100644 --- a/CVE-2025/CVE-2025-409xx/CVE-2025-40909.json +++ b/CVE-2025/CVE-2025-409xx/CVE-2025-40909.json @@ -2,7 +2,7 @@ "id": "CVE-2025-40909", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-05-30T13:15:22.350", - "lastModified": "2025-06-02T20:15:22.463", + "lastModified": "2025-06-03T02:15:19.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -103,6 +103,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/06/02/6", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/02/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4047.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4047.json new file mode 100644 index 00000000000..ccb5870e13b --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4047.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-4047", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T03:15:27.910", + "lastModified": "2025-06-03T03:15:27.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Broken Link Checker plugin for WordPress is vulnerable to unauthorized data access due to a missing capability check on the ajax_full_status and ajax_dashboard_status functions in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view the plugin's status." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/broken-link-checker/tags/2.4.2/legacy/core/core.php#L3272", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3294992/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/33ac910c-9531-45ea-84cf-1d379233f7d3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-42xx/CVE-2025-4224.json b/CVE-2025/CVE-2025-42xx/CVE-2025-4224.json new file mode 100644 index 00000000000..b48c9d8b307 --- /dev/null +++ b/CVE-2025/CVE-2025-42xx/CVE-2025-4224.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-4224", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T03:15:28.093", + "lastModified": "2025-06-03T03:15:28.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wpForo + wpForo Advanced Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via media upload names in all versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gvectors.com/product/wpforo-advanced-attachments/#tab-changelog", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e634dafc-8eb0-406f-93b1-ee1d2b44171d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json index f5659293da7..588a3e6a8d1 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5068.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5068", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-03T00:15:20.907", - "lastModified": "2025-06-03T00:15:20.907", + "lastModified": "2025-06-03T03:15:28.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +45,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json index 37308889904..d568d1dd7e1 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5419", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-03T00:15:21.043", - "lastModified": "2025-06-03T00:15:21.043", + "lastModified": "2025-06-03T03:15:28.460", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html", diff --git a/README.md b/README.md index 59357ba376f..3b300e8a2b7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-03T02:00:19.487226+00:00 +2025-06-03T04:00:21.393124+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-03T01:00:01.953000+00:00 +2025-06-03T03:15:28.460000+00:00 ``` ### Last Data Feed Release @@ -33,29 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296263 +296266 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `3` -- [CVE-2025-49162](CVE-2025/CVE-2025-491xx/CVE-2025-49162.json) (`2025-06-03T00:15:20.103`) -- [CVE-2025-49163](CVE-2025/CVE-2025-491xx/CVE-2025-49163.json) (`2025-06-03T00:15:20.583`) -- [CVE-2025-49164](CVE-2025/CVE-2025-491xx/CVE-2025-49164.json) (`2025-06-03T00:15:20.740`) -- [CVE-2025-5068](CVE-2025/CVE-2025-50xx/CVE-2025-5068.json) (`2025-06-03T00:15:20.907`) -- [CVE-2025-5419](CVE-2025/CVE-2025-54xx/CVE-2025-5419.json) (`2025-06-03T00:15:21.043`) +- [CVE-2025-2939](CVE-2025/CVE-2025-29xx/CVE-2025-2939.json) (`2025-06-03T03:15:27.137`) +- [CVE-2025-4047](CVE-2025/CVE-2025-40xx/CVE-2025-4047.json) (`2025-06-03T03:15:27.910`) +- [CVE-2025-4224](CVE-2025/CVE-2025-42xx/CVE-2025-4224.json) (`2025-06-03T03:15:28.093`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `10` -- [CVE-2021-32030](CVE-2021/CVE-2021-320xx/CVE-2021-32030.json) (`2025-06-03T01:00:01.953`) -- [CVE-2023-39780](CVE-2023/CVE-2023-397xx/CVE-2023-39780.json) (`2025-06-03T01:00:01.953`) -- [CVE-2024-56145](CVE-2024/CVE-2024-561xx/CVE-2024-56145.json) (`2025-06-03T01:00:01.953`) -- [CVE-2025-35939](CVE-2025/CVE-2025-359xx/CVE-2025-35939.json) (`2025-06-03T01:00:01.953`) -- [CVE-2025-3935](CVE-2025/CVE-2025-39xx/CVE-2025-3935.json) (`2025-06-03T01:00:01.953`) +- [CVE-2023-4387](CVE-2023/CVE-2023-43xx/CVE-2023-4387.json) (`2025-06-03T03:15:25.913`) +- [CVE-2023-48645](CVE-2023/CVE-2023-486xx/CVE-2023-48645.json) (`2025-06-03T03:15:24.817`) +- [CVE-2023-48842](CVE-2023/CVE-2023-488xx/CVE-2023-48842.json) (`2025-06-03T03:15:25.490`) +- [CVE-2023-48863](CVE-2023/CVE-2023-488xx/CVE-2023-48863.json) (`2025-06-03T03:15:25.703`) +- [CVE-2025-23099](CVE-2025/CVE-2025-230xx/CVE-2025-23099.json) (`2025-06-03T03:15:26.790`) +- [CVE-2025-23105](CVE-2025/CVE-2025-231xx/CVE-2025-23105.json) (`2025-06-03T03:15:26.957`) +- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-06-03T03:15:27.320`) +- [CVE-2025-40909](CVE-2025/CVE-2025-409xx/CVE-2025-40909.json) (`2025-06-03T02:15:19.980`) +- [CVE-2025-5068](CVE-2025/CVE-2025-50xx/CVE-2025-5068.json) (`2025-06-03T03:15:28.280`) +- [CVE-2025-5419](CVE-2025/CVE-2025-54xx/CVE-2025-5419.json) (`2025-06-03T03:15:28.460`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 649a337090a..6c5d4d879b0 100644 --- a/_state.csv +++ b/_state.csv @@ -176307,7 +176307,7 @@ CVE-2021-32025,0,0,be1366e60cdc64085a7ca3378dd8b2945646288a6056d66d9eaf86e564481 CVE-2021-32027,0,0,5ee2aa7a5aa3fa8bb911c577fd863dbdb076a0ad3ef0512d7dd32317414b22da,2024-11-21T06:06:44.467000 CVE-2021-32028,0,0,84c85cca513953c25777bc582de148d107114d46d9b13227dc0a8bf544f4d415,2024-11-21T06:06:44.593000 CVE-2021-32029,0,0,56c471bfaedf8eeeae330cda0d2954472dbd44261f536849dbc437841365a531,2024-11-21T06:06:44.717000 -CVE-2021-32030,0,1,fb42eba0d5078ccd62daf76a1bd219077d18e5d3bb0a5ca36cf00edadf221729,2025-06-03T01:00:01.953000 +CVE-2021-32030,0,0,fb42eba0d5078ccd62daf76a1bd219077d18e5d3bb0a5ca36cf00edadf221729,2025-06-03T01:00:01.953000 CVE-2021-32032,0,0,d4a228b8d3584c392915c1306de9b4891f451e0bcc887a1a2c922b4efeafaf40,2024-11-21T06:06:44.993000 CVE-2021-32033,0,0,9d53a703f8e89930e795f200116050cb1538597c59d5f4de2f68d4733f37ec27,2024-11-21T06:06:45.167000 CVE-2021-32036,0,0,5f2cf3c6d2205a2b02a642da73b2e1978439d07a378edd4a500d10314baf33fc,2024-11-21T06:06:45.330000 @@ -232244,7 +232244,7 @@ CVE-2023-3977,0,0,84902e819982af0b9f065234a0836a81763e8b0f2e4e907e1bbbe68d767e81 CVE-2023-39776,0,0,9b60b215af8c2d67e87c6d5b391a0df3e7a6b70a40e3e4b39dc5a5ea32f92ba1,2024-11-21T08:15:55.693000 CVE-2023-39777,0,0,9dfd7018882af2d3838b8e1f388c9f433b085bd7ce4432cda211f24935c024c7,2024-11-21T08:15:55.840000 CVE-2023-3978,0,0,b7e7bb1677040677e1bec81f12358ded6ce067b6554a2a9c8d6bc2995d761ab4,2024-11-21T08:18:27.680000 -CVE-2023-39780,0,1,8aaed17abfac7db92590434a92337bfd56a791d751f41ed2901c6a306cf85009,2025-06-03T01:00:01.953000 +CVE-2023-39780,0,0,8aaed17abfac7db92590434a92337bfd56a791d751f41ed2901c6a306cf85009,2025-06-03T01:00:01.953000 CVE-2023-39784,0,0,fa5e5f530f2111747230342eb0d98696d09982b69a86e9944049f9a5b35467fc,2024-11-21T08:15:56.160000 CVE-2023-39785,0,0,ab6675e15398e8b1e39aac3c2e69cd38a033f5e2b023ff7bee7de08be10cd49f,2024-11-21T08:15:56.323000 CVE-2023-39786,0,0,bba41e5480cecce81d7e21ffe2ac3ddfc75f323f9c4619f972d540cef32fc36b,2024-11-21T08:15:56.473000 @@ -235378,7 +235378,7 @@ CVE-2023-43866,0,0,ebf03074293379587f7609720d91553532b05176813b28fefe2c355c22a1b CVE-2023-43867,0,0,842e70b3499864839d018b32f7c4d1eb981e53fa554060e7b1172f67105881d3,2024-11-21T08:24:55.360000 CVE-2023-43868,0,0,355b5d787c34573eba9c8cbd596ba4fc21185320e4e57082845f0c6054f9609e,2024-11-21T08:24:55.510000 CVE-2023-43869,0,0,c26bd2d2ce9de349c7c081fc34f08c5d461ce7953c4d4fe2150650b0fabfdcf8,2024-11-21T08:24:55.667000 -CVE-2023-4387,0,0,ae52646967a59ad688de1610634a6c85b462d3f249fda219a83d643cfe61af25,2024-12-15T21:15:15.583000 +CVE-2023-4387,0,1,1c9872c3599b2378a8c0c5f74333d0eb1cf6ec4a15f1e499527068eea8763c90,2025-06-03T03:15:25.913000 CVE-2023-43870,0,0,b0d3e092274d7c5697df5b0d058f09d25c39bdf97516b2fc70310ef4f3c07edf,2024-11-21T08:24:55.823000 CVE-2023-43871,0,0,be1d80b1f974300aff33bd57027a11205af80ba254b5a86c25c62d3e9d102197,2024-11-21T08:24:55.957000 CVE-2023-43872,0,0,24d5a634d9c8ce2c391d87beaf7efcada6fb1abc3aab25fbe3f2373d6bd68334,2024-11-21T08:24:56.097000 @@ -238839,7 +238839,7 @@ CVE-2023-48641,0,0,c24041bef291d2c67ab0547c0c7156f6d11f3f2bfbdec99a5ee5d6990d28d CVE-2023-48642,0,0,b4b49c8b101d698803959efb2563613bab33612aa31700913a87a94a8ea73893,2024-11-21T08:32:10.027000 CVE-2023-48643,0,0,2838e9b9ca60bb275452350e91ce2548d693e9b81880e886462f4139c20e5e57,2024-11-21T08:32:10.197000 CVE-2023-48644,0,0,70935b5e1a6496a8d5262a2a9657894b2ba775ae0d586e510eb3bd9d294d04c1,2025-05-30T16:15:35.230000 -CVE-2023-48645,0,0,35928ac27fc6c53c9ec7e79085a4bb571d89398ff88be793d363e9c995c88ef8,2025-05-30T16:15:35.430000 +CVE-2023-48645,0,1,e7eff98b35f3760b95fb297869efa093fbbbdd862e0fec203f9302f60f4c67df,2025-06-03T03:15:24.817000 CVE-2023-48646,0,0,d8d44a25061fe6648386811c26e32dfa15cbf4ade54b0e2f313e86e77e068aeb,2024-11-21T08:32:10.810000 CVE-2023-48648,0,0,400529bac8d85308ebcf902245fbc1a5339515f7c784c020b227fde6296562f0,2024-11-21T08:32:10.960000 CVE-2023-48649,0,0,d1d86fedc0dd2c0f49f249f69bac57a864c3ba4488104cef2738133899417fec,2024-11-21T08:32:11.190000 @@ -239031,7 +239031,7 @@ CVE-2023-48839,0,0,e8e30eb84ef1188a5aee5060102f56ab910aca63bcd26ef14781e36fc52f2 CVE-2023-4884,0,0,1daa1aa188058e958bbc5c2d9c09934d0a0771b48b2e20697431fbf27698801f,2024-11-21T08:36:11.070000 CVE-2023-48840,0,0,5017064be181620ce29c4b80d639cf7feaed1215a2dbdee80fe280df89a2c170,2024-11-21T08:32:32.473000 CVE-2023-48841,0,0,4bc429f23fb95a2f9513d2f4a3a8e26007bd0fab68e34421a6b1bcb96206afcb,2024-11-21T08:32:32.630000 -CVE-2023-48842,0,0,d7d1454819f1dcdd14528a1d9f62c6c0ce99da0350570de551d8614dfc285171,2024-11-21T08:32:32.853000 +CVE-2023-48842,0,1,95688c098a154cac664361d5220f856394298213e102027ca3ed943d5cbc4bc9,2025-06-03T03:15:25.490000 CVE-2023-48848,0,0,833c54e750b28847a055f211313ad917d61a7c10771960d3ca25918d56e67af5,2024-11-21T08:32:33.003000 CVE-2023-48849,0,0,966a1549d30c886b6324a18fa1c5e2305f618ff5ac3cff3211d2d6884236edce,2024-11-21T08:32:33.227000 CVE-2023-4885,0,0,20d51472315535f916beba5b70efac40bd64ba77bb70a5c4a1070eff5650bcb9,2024-11-21T08:36:11.207000 @@ -239040,7 +239040,7 @@ CVE-2023-48859,0,0,9ac2603fca4a5ab31df2b9156386a46c755a85f515a18a4e785544aaeb000 CVE-2023-4886,0,0,8f2d70647d8c027fd6ff5469d2fc104d09830f4fc19038f5e962ea02566dc513,2024-11-21T08:36:11.347000 CVE-2023-48860,0,0,af1254a0cba48df114b71f85053e187c5308de39d1f8346f841d080a150ff4e1,2024-11-21T08:32:33.713000 CVE-2023-48861,0,0,571a3e7ddec5c06aadbc62f72801b18ec4f356731ccdf6eb6e71e6ea16abacdc,2024-11-21T08:32:33.857000 -CVE-2023-48863,0,0,96c649c3b3966f74efdf2a739ec57747c26dd9081c51366e2161fc54dcbf9a0b,2024-11-21T08:32:34.003000 +CVE-2023-48863,0,1,1ae61be64013ef0eab00cb9dccde3d835e8ca37020ed5b6b9fe00ac85a923194,2025-06-03T03:15:25.703000 CVE-2023-48864,0,0,4271455018fc109a756046144a3b9013c32e0e975c36a0c23ee9bfb0994de8f0,2024-11-21T08:32:34.160000 CVE-2023-48865,0,0,47093d97d4d864ef5d290032e9ee95f309585e3a36162ffa6151ca39e74f0dca,2024-11-21T08:32:34.300000 CVE-2023-48866,0,0,36d6615e3d9bd48bb2137e1a9943fbfa1dfdb0fe2348c26aa112b18cb06c7d48,2024-11-21T08:32:34.510000 @@ -277023,7 +277023,7 @@ CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacb CVE-2024-56140,0,0,5e773e07d0eed57889259343301d38e685c0a1811e50189d4f1636233600aa01,2024-12-18T21:15:08.353000 CVE-2024-56142,0,0,d0863d2f76899d0c75d2dc51b8dc37ad0a79fde1963b9a5230e4e213f062dcd8,2024-12-18T16:15:15.433000 CVE-2024-56144,0,0,5a8f246b3ee58fe0b6aa1f12215528f9f3e515638bc6c966a2d94ef6b9b54d81,2025-04-28T16:44:52.353000 -CVE-2024-56145,0,1,36b843b9c003d84de13f0344899a81985eb990f4db3f7ba77c9941df859ba5ce,2025-06-03T01:00:01.953000 +CVE-2024-56145,0,0,36b843b9c003d84de13f0344899a81985eb990f4db3f7ba77c9941df859ba5ce,2025-06-03T01:00:01.953000 CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000 CVE-2024-56156,0,0,cae65d20ed1341191924655de46d8c441aafee12637a5c5ce19d1dfd5a9e24e6,2025-04-29T13:52:28.490000 CVE-2024-56157,0,0,d2e733cd7775d29d2be4bb2e0ae8acc158ce5f62f3bbfa722ba2bdf2f22359ff,2025-05-16T14:43:56.797000 @@ -286164,10 +286164,10 @@ CVE-2025-23090,0,0,db1a04b33215738ef9ff89e7dd3243ce6839535b0728d9bb0d1927af1170a CVE-2025-23091,0,0,52be052e818e282e438c6b1d873e178494e11252bb26056a7aa314d364167b02,2025-03-13T13:15:57.990000 CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000 CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000 -CVE-2025-23099,0,0,638d95b47287a72c94e295b1bb0dbb38db027eebe544a83587c4d889951065a7,2025-06-02T19:15:26.213000 +CVE-2025-23099,0,1,2c5f8647f6b1da5927512d94bb2c685c4b7491802e2e8ca1a9f5368402ddc658,2025-06-03T03:15:26.790000 CVE-2025-2310,0,0,1254bedeef285364d4ce4cc304a3b27319f0e76b0b0498fd69d05aba0b6f3806,2025-05-28T18:12:42.130000 CVE-2025-23104,0,0,6610497cadc4747ca925b32a7c9cf6b309d77c571ee095b8f68729e046c6562d,2025-06-02T21:15:21.473000 -CVE-2025-23105,0,0,ea8519742f6d9e4a6c3120609be4fc42d17a4e5304581e9e5b5347d0a4007a99,2025-06-02T19:15:26.913000 +CVE-2025-23105,0,1,76af3a585a1106927951b0a08d54a00fd760a17c06bf43c56a5b0473237f5cb9,2025-06-03T03:15:26.957000 CVE-2025-23108,0,0,43dfea536f21c7dddc3256c2f1e274765fe5955541d1af65c01a12871277b7ff,2025-04-03T18:58:00.940000 CVE-2025-23109,0,0,dab09ed4e1fbec86e8afd75398d8d3c5a65ca2a268fa35cb5d3a1b5459dc4d18,2025-04-03T18:52:57.410000 CVE-2025-2311,0,0,0549a26ae70964117a933b4c0694a85dc38e847ae92918cf4a69583f79013968,2025-03-21T07:15:36.820000 @@ -290015,6 +290015,7 @@ CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000 CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000 CVE-2025-29389,0,0,b6e910417322f02be556ac9b548f6e8b6c35848d660fba9931faab004d75355d,2025-04-15T13:42:23.447000 +CVE-2025-2939,1,1,56ca324058fe3e567f41612a0636860d8ad888c64ad6d6ad9522cfc15a5b8bde,2025-06-03T03:15:27.137000 CVE-2025-29390,0,0,2af3ceeb0b0e4ec487468d0265cf4f9bf7105f9f26e650a3615e67390bc16783,2025-04-22T17:06:50.490000 CVE-2025-29391,0,0,3957a6f12658ba0f8a64a4509b31e9cff0f721c7269083a2c5583c8497158773,2025-04-22T17:02:50.427000 CVE-2025-29394,0,0,4090687a0b04adebceb5be059956dcab0a952bc601580bcce43cec2c0d6a13ba,2025-04-22T21:15:45.123000 @@ -292917,7 +292918,7 @@ CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fd CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000 CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000 CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000 -CVE-2025-3576,0,0,8c6e95ba882b09773047cea5529fb4a4b7fe62db2a80b9c393182abf0b56e929,2025-05-30T17:15:28.940000 +CVE-2025-3576,0,1,9b3aa58189686705418209c5611fd3289a98feb13dc788c78e80ec6eb48d7124,2025-06-03T03:15:27.320000 CVE-2025-3577,0,0,dfdef997e669866588ab8eb7c1ca73b6cf2cbe16fcb69f43d2b34abd27af8076,2025-04-23T14:08:13.383000 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 @@ -292931,7 +292932,7 @@ CVE-2025-3590,0,0,4a0453d8b3689d6f2e7dcbfdf29c48f9e72ed335c884f8c177d44093a3f9f8 CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e68a,2025-04-15T18:39:27.967000 CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000 CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000 -CVE-2025-35939,0,1,4e32c39745c4da1f208b25109a0e587dd57fd0b27edd782ef59c3261d88e897e,2025-06-03T01:00:01.953000 +CVE-2025-35939,0,0,4e32c39745c4da1f208b25109a0e587dd57fd0b27edd782ef59c3261d88e897e,2025-06-03T01:00:01.953000 CVE-2025-35965,0,0,4aa642d84377cde687111c4598cf1eaeacbb56cf1c939bfc9602ea66c09fbf1f,2025-04-29T13:52:47.470000 CVE-2025-3597,0,0,929499c3aa76135ea39f425514ee0364a89d92a5d37194846e80b60b696e4a4b,2025-05-12T18:15:44.970000 CVE-2025-35975,0,0,ff6f53919e1d0edd41e3d119f9454f71c4e7dd5f4908d853817e3fb24cd36fe2,2025-05-02T13:52:51.693000 @@ -293489,7 +293490,7 @@ CVE-2025-3931,0,0,1df28a65d58b1b11dd55fb48e21c28c39df5dac9e59f3f4980170b9f3362a2 CVE-2025-3932,0,0,bb3142c71f5eed4ff8b3f0ae9b64a77d14b97d1793be58115a0c31b67d9c7e11,2025-05-16T14:43:56.797000 CVE-2025-39348,0,0,9d07c4215885d09159fcdb803c06dd845d20d8b7211f21c96080caa574b77db4,2025-05-29T21:25:34.930000 CVE-2025-39349,0,0,1c1c3f689b711b2f96c461587a438e532d44de8ec5f06cddb3eceb6d5faa7f0f,2025-05-29T21:27:24.223000 -CVE-2025-3935,0,1,94b13f4d383136a73e9447f741a0249a7178bdf0338705079576c82a6a153caf,2025-06-03T01:00:01.953000 +CVE-2025-3935,0,0,94b13f4d383136a73e9447f741a0249a7178bdf0338705079576c82a6a153caf,2025-06-03T01:00:01.953000 CVE-2025-39350,0,0,1f2a18c3df50c0c8581af9839dea436f1bfbc81b9f75b37ec3a415a12e0f7cb9,2025-05-21T20:25:16.407000 CVE-2025-39351,0,0,453b615dce99e3118800c3b3ed1ff1e8978999aa77e5900459827bf7cc51d266,2025-05-21T20:25:16.407000 CVE-2025-39352,0,0,f176b617e367ad8432a233cf334fc673d4423789a2e58b98ee771101c071d706,2025-05-21T20:25:16.407000 @@ -293827,6 +293828,7 @@ CVE-2025-4038,0,0,811046a13e982bc58a873e9f3dcdd8f0924b9962b393b0dcd42ae969573255 CVE-2025-4039,0,0,82997abe4f3d1a06f2c0c0c7affe39718ef0820c54c5fc54b87a7722e7f87a51,2025-04-29T21:08:47.950000 CVE-2025-4041,0,0,81f238f672f184f46ddf27c78435ddee43bf5343b5983877b97d104b8691f898,2025-05-07T14:13:20.483000 CVE-2025-4043,0,0,c5f411ffc1c0bfefdd17b991af2ebe0c8e5cb9dbd004f8186edb3edb010429e3,2025-05-08T16:15:28.283000 +CVE-2025-4047,1,1,836a95dd65686d0d682016e6fd63c4ead0b69b0b35553658665e8685f649c276,2025-06-03T03:15:27.910000 CVE-2025-4050,0,0,ccfe15f2834569ec41cc4a482172c37e9ee278c6a1d3b20eba7b56bd00075454,2025-05-28T20:08:51.557000 CVE-2025-4051,0,0,ff804ba52545392d7d95b067994000fe8637ebe480f1a272e743d510a5634584,2025-05-28T20:08:14.553000 CVE-2025-4052,0,0,517c90a400d1c4a1769ad78093028d80e32695c5738c9e0a5933de416f48d31d,2025-05-28T20:07:45.097000 @@ -293922,7 +293924,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000 CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000 CVE-2025-40908,0,0,722712dc5b770bb0a13e0d20171378b8e4b0cbd179a3c72e1857a82c7cd5d920,2025-06-02T17:32:17.397000 -CVE-2025-40909,0,0,7950328de3aad73bd86d6f5635c46a4f7c6c027e20f309b9c54252d6efa794fa,2025-06-02T20:15:22.463000 +CVE-2025-40909,0,1,c6ab9968b5d5edb9c49ad2b15eade556bdef9e0c266f60618cb84e9aea133d14,2025-06-03T02:15:19.980000 CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000 CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000 CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000 @@ -294076,6 +294078,7 @@ CVE-2025-4220,0,0,5c86caee7e1d137cda1341728be0ecf7fbbff93f4260af3080c92a642cb601 CVE-2025-4221,0,0,0fd12a0e5b55ee42c307389a259ec1bd53c25a7a1b0cd952ead8bf19842b795b,2025-05-21T20:24:58.133000 CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208bc3,2025-05-13T18:15:41.657000 CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000 +CVE-2025-4224,1,1,bacedcc2a915ca9baa74deee54ca1a1e788f8cb42cf9f1bfafe6bf4f19529220,2025-06-03T03:15:28.093000 CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000 CVE-2025-4236,0,0,4a998b3d009e2e5b8d6c745dec0a05483fadfb16e9111b778387c6694f340a68,2025-05-16T15:04:03.170000 CVE-2025-4237,0,0,6e9102316b2d9622f5dbc1640c375fa9a5bfea77a1257bb79b559d426c098991,2025-05-16T15:03:54.820000 @@ -295916,9 +295919,9 @@ CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 -CVE-2025-49162,1,1,0934e3250beffc21d4128bb1746955a06a20fce021d510d38b414f5358ff0814,2025-06-03T00:15:20.103000 -CVE-2025-49163,1,1,5ac2d3b4d109a877de24814e58aa1ebc7f91f2d2486be5a5e8624be49a6e92d9,2025-06-03T00:15:20.583000 -CVE-2025-49164,1,1,33e54d3e5b62607b96537468811ac3d84c787f83ce5aa0f13b239f92b783fa04,2025-06-03T00:15:20.740000 +CVE-2025-49162,0,0,0934e3250beffc21d4128bb1746955a06a20fce021d510d38b414f5358ff0814,2025-06-03T00:15:20.103000 +CVE-2025-49163,0,0,5ac2d3b4d109a877de24814e58aa1ebc7f91f2d2486be5a5e8624be49a6e92d9,2025-06-03T00:15:20.583000 +CVE-2025-49164,0,0,33e54d3e5b62607b96537468811ac3d84c787f83ce5aa0f13b239f92b783fa04,2025-06-03T00:15:20.740000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 CVE-2025-4919,0,0,d317e3bd578018ad84a455f2232992db1a6397292bb6496f6e9135fa366be8bd,2025-05-28T14:08:29.293000 @@ -296010,7 +296013,7 @@ CVE-2025-5064,0,0,87518e9ed6daee720522048748a5340f904ec1b27742821c54fbc97a801d9e CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818fac,2025-05-29T15:50:57.497000 CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000 CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000 -CVE-2025-5068,1,1,cb23e839b384b1284072d0ade7f5dcffd3065cb3e4b8c8eb438ab2a591d0d4b7,2025-06-03T00:15:20.907000 +CVE-2025-5068,0,1,2a2857b51afe406d8cfa48681676a3b448add552b1d8ba221cb6e1bf08b8548e,2025-06-03T03:15:28.280000 CVE-2025-5073,0,0,baf1c84b4e2167692053943d4c0fd05e8f8f1a1d5bd906b6480eed1245a366ce,2025-05-23T15:55:02.040000 CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000 CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000 @@ -296232,7 +296235,7 @@ CVE-2025-5409,0,0,209b521ab5ccc30904997673163794c81e8bbcd661514ad5d6db90496c692a CVE-2025-5410,0,0,8f6aec665b1901bf160e99989f915904c0b12f976e27a46b4117cb6a4d26984d,2025-06-02T17:32:17.397000 CVE-2025-5411,0,0,bda57e821f06e7acb04b67298784cbbe1631c5e86f17b6a45cfc7ca79da6e664,2025-06-02T17:32:17.397000 CVE-2025-5412,0,0,753b4152a593f449df2c00057cf330d4f98993025991e4c159242de574477a9d,2025-06-02T17:32:17.397000 -CVE-2025-5419,1,1,f582126ca32a3b4c3d4d78f22963347e1d49c0b6f7928950ed86e2b93e5d50e2,2025-06-03T00:15:21.043000 +CVE-2025-5419,0,1,7c182b9e1d8229ac433b17b025bf2a361a490b3acf344a00cf760ddbe7a51b03,2025-06-03T03:15:28.460000 CVE-2025-5420,0,0,febb25c16bce360c4a759b2a4127c671c1e4f8d4aafbd5e7bf731b1578cd725f,2025-06-02T17:32:17.397000 CVE-2025-5421,0,0,aaf7308ceb57221ad68dbb7db22ba2000af542ccf461039f6c7d796fca57cef7,2025-06-02T17:32:17.397000 CVE-2025-5422,0,0,9e450c046e1f91b7dd55771f187d3de2563113f044a3b50f5e4e98096355fb9a,2025-06-02T17:32:17.397000