Auto-Update: 2025-06-02T18:00:19.528740+00:00

This commit is contained in:
cad-safe-bot 2025-06-02 18:03:56 +00:00
parent 2e9238d0de
commit 0165621bcc
232 changed files with 3627 additions and 834 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-25111",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-31T01:15:19.123",
"lastModified": "2025-05-31T01:15:19.123",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -59,6 +59,10 @@
{
"url": "https://github.com/django-helpdesk/django-helpdesk/releases/tag/v1.0.0",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/django-helpdesk/django-helpdesk/pull/1120",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-24433",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:08.897",
"lastModified": "2024-11-21T05:53:03.863",
"lastModified": "2025-06-02T16:15:22.830",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-24869",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:09.103",
"lastModified": "2024-11-21T05:53:55.363",
"lastModified": "2025-06-02T16:15:23.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4227",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:09.270",
"lastModified": "2024-11-21T06:37:11.290",
"lastModified": "2025-06-02T16:15:23.187",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1609",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:09.530",
"lastModified": "2024-11-21T06:41:05.020",
"lastModified": "2025-06-02T16:15:23.357",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1760",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:09.680",
"lastModified": "2024-11-21T06:41:24.553",
"lastModified": "2025-06-02T16:15:23.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3194",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:09.883",
"lastModified": "2024-11-21T07:19:01.233",
"lastModified": "2025-06-02T16:15:23.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3899",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:10.180",
"lastModified": "2024-11-21T07:20:29.587",
"lastModified": "2025-06-02T16:15:23.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0079",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:10.323",
"lastModified": "2024-11-21T07:36:30.817",
"lastModified": "2025-06-02T16:15:24.043",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26226",
"sourceIdentifier": "browser-security@yandex-team.ru",
"published": "2025-05-30T18:15:32.283",
"lastModified": "2025-05-30T18:15:32.283",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2655",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:10.830",
"lastModified": "2024-11-21T07:59:00.920",
"lastModified": "2025-06-02T16:15:24.210",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3178",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:11.243",
"lastModified": "2024-11-21T08:16:38.017",
"lastModified": "2025-06-02T16:15:24.557",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-39691",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T22:15:37.520",
"lastModified": "2024-11-21T08:15:50.327",
"lastModified": "2025-06-02T16:15:24.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48926",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T21:15:08.220",
"lastModified": "2024-11-21T08:32:37.517",
"lastModified": "2025-06-02T16:15:24.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49351",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T19:15:08.120",
"lastModified": "2024-11-21T08:33:17.193",
"lastModified": "2025-06-02T16:15:24.973",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52100",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-01-16T10:15:07.600",
"lastModified": "2024-11-21T08:39:10.410",
"lastModified": "2025-06-02T16:15:25.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52104",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-01-16T10:15:07.830",
"lastModified": "2024-11-21T08:39:10.960",
"lastModified": "2025-06-02T16:15:25.350",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52108",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-01-16T09:15:07.840",
"lastModified": "2024-11-21T08:39:11.593",
"lastModified": "2025-06-02T16:15:25.507",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52109",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-01-16T08:15:08.763",
"lastModified": "2024-11-21T08:39:11.710",
"lastModified": "2025-06-02T16:15:25.667",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52116",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-01-16T09:15:08.017",
"lastModified": "2024-11-21T08:39:12.650",
"lastModified": "2025-06-02T16:15:25.853",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11857",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-06-02T04:15:26.000",
"lastModified": "2025-06-02T04:15:26.000",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11941",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-05T15:15:08.340",
"lastModified": "2024-12-05T16:15:23.893",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:18:43.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,51 @@
"value": "CWE-835"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "10.1.8",
"matchCriteriaId": "43E7EF37-A4A4-48E1-98ED-2B067040E6A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.2.0",
"versionEndExcluding": "10.2.2",
"matchCriteriaId": "C54B2D7C-928E-4A5A-AE73-F6F5BF39D057"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-001",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11942",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-05T15:15:08.457",
"lastModified": "2024-12-05T16:15:24.033",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:20:21.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-390"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.2.10",
"matchCriteriaId": "7A119536-4D7B-4383-BD3E-CC38F0BE31F0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-002",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12168",
"sourceIdentifier": "browser-security@yandex-team.ru",
"published": "2025-06-02T13:15:20.517",
"lastModified": "2025-06-02T13:15:20.517",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12393",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-10T00:15:22.197",
"lastModified": "2024-12-11T17:15:14.657",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:21:01.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,58 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.8.0",
"versionEndExcluding": "10.2.11",
"matchCriteriaId": "3DDCBDDA-D2A4-486E-AEFD-E24DF1FBE249"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3.0",
"versionEndExcluding": "10.3.9",
"matchCriteriaId": "444B0D25-710A-400B-9161-75B4A00F7648"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.0.8",
"matchCriteriaId": "5DF1AC15-FA7D-467D-8AF0-8FB86D854CB6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-003",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-1440",
"sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"published": "2025-06-02T17:15:21.153",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site.\n\nBy exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3171/",
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21672",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-01-16T05:15:08.537",
"lastModified": "2024-11-21T08:54:50.480",
"lastModified": "2025-06-02T16:15:26.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -71,6 +71,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22628",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T18:15:11.220",
"lastModified": "2024-11-21T08:56:30.040",
"lastModified": "2025-06-02T16:15:26.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-3509",
"sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"published": "2025-06-02T17:15:22.090",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section.\nTo exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users.\n\nWhile this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701",
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40112",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T16:15:26.880",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Local File Inclusion (LFI) vulnerability exists in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before, which allows an attacker to manipulate the \"language\" cookie to include arbitrary files from the server. This vulnerability can be exploited to disclose sensitive information."
}
],
"metrics": {},
"references": [
{
"url": "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40112",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40113",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T16:15:27.010",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sitecom WLX-2006 Wall Mount Range Extender N300 v.1.5 and before is vulnerable to Use of Default Credentials."
}
],
"metrics": {},
"references": [
{
"url": "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40113",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40114",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T16:15:27.127",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross Site Scripting (XSS) vulnerability in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before allows an attacker to manipulate the language cookie to inject malicious JavaScript code."
}
],
"metrics": {},
"references": [
{
"url": "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40114",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41511",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T18:15:08.090",
"lastModified": "2025-03-26T15:15:51.120",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T17:41:35.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:4pace:cadclick:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.11.0",
"matchCriteriaId": "40A4BAC9-73D7-4D10-BE1B-C888D2DFA14D"
}
]
}
]
}
],
"references": [
{
"url": "http://cadclick.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://kimweb.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41512",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T18:15:08.153",
"lastModified": "2024-10-07T19:37:09.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T17:40:46.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:4pace:cadclick:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "270145EF-7E3C-46B6-B9F4-2243C56F26E9"
}
]
}
]
}
],
"references": [
{
"url": "http://cadclick.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://kimweb.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41513",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T18:15:08.220",
"lastModified": "2024-10-07T19:37:10.700",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T17:40:41.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:4pace:cadclick:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "270145EF-7E3C-46B6-B9F4-2243C56F26E9"
}
]
}
]
}
],
"references": [
{
"url": "http://cadclick.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://kimweb.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41514",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T18:15:08.297",
"lastModified": "2024-10-07T19:37:11.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T17:40:35.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:4pace:cadclick:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "270145EF-7E3C-46B6-B9F4-2243C56F26E9"
}
]
}
]
}
],
"references": [
{
"url": "http://cadclick.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://kimweb.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41515",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T18:15:08.347",
"lastModified": "2024-10-07T19:37:12.283",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T17:40:29.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:4pace:cadclick:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.11.0",
"matchCriteriaId": "40A4BAC9-73D7-4D10-BE1B-C888D2DFA14D"
}
]
}
]
}
],
"references": [
{
"url": "http://cadclick.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://kimweb.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41516",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T18:15:08.410",
"lastModified": "2024-10-07T19:37:13.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T17:40:24.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:4pace:cadclick:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.11.0",
"matchCriteriaId": "40A4BAC9-73D7-4D10-BE1B-C888D2DFA14D"
}
]
}
]
}
],
"references": [
{
"url": "http://cadclick.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://kimweb.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46325",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T13:15:15.873",
"lastModified": "2024-10-08T19:35:19.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T17:35:01.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:wr740n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE51163-C290-4C5D-A187-5AC3933CCD93"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:wr740n:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "465AB188-638B-4070-85DA-A8E90A2F06D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TP-LINK/WR740N/popupSiteSurveyRpm.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48877",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:32.200",
"lastModified": "2025-06-02T15:15:32.200",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,6 +51,10 @@
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2128",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52035",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:32.377",
"lastModified": "2025-06-02T15:15:32.377",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,6 +51,10 @@
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2131",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2131",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54028",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:32.537",
"lastModified": "2025-06-02T15:15:32.537",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,6 +51,10 @@
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2132",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2132",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55634",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-10T00:15:22.323",
"lastModified": "2024-12-11T17:15:21.243",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:21:42.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -53,12 +53,58 @@
"value": "CWE-289"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-178"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "10.2.11",
"matchCriteriaId": "29A04440-F97A-4813-AD9E-88C0BD1C5989"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3.0",
"versionEndExcluding": "10.3.9",
"matchCriteriaId": "444B0D25-710A-400B-9161-75B4A00F7648"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.0.8",
"matchCriteriaId": "5DF1AC15-FA7D-467D-8AF0-8FB86D854CB6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-004",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55635",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-10T00:15:22.433",
"lastModified": "2024-12-10T22:15:28.190",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:22:31.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.102",
"matchCriteriaId": "B615DBF4-30B6-49D5-BD59-749C1D1EFE19"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-005",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55636",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-10T00:15:22.540",
"lastModified": "2024-12-16T18:15:11.463",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:23:09.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,58 @@
"value": "CWE-915"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "10.2.11",
"matchCriteriaId": "29A04440-F97A-4813-AD9E-88C0BD1C5989"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3.0",
"versionEndExcluding": "10.3.9",
"matchCriteriaId": "444B0D25-710A-400B-9161-75B4A00F7648"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.0.8",
"matchCriteriaId": "5DF1AC15-FA7D-467D-8AF0-8FB86D854CB6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-006",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55637",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-10T00:15:22.650",
"lastModified": "2024-12-16T18:15:11.673",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:23:28.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,58 @@
"value": "CWE-915"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "10.2.11",
"matchCriteriaId": "29A04440-F97A-4813-AD9E-88C0BD1C5989"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3.0",
"versionEndExcluding": "10.3.9",
"matchCriteriaId": "444B0D25-710A-400B-9161-75B4A00F7648"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.0.8",
"matchCriteriaId": "5DF1AC15-FA7D-467D-8AF0-8FB86D854CB6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-007",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55638",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2024-12-10T00:15:22.770",
"lastModified": "2024-12-16T18:15:11.840",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:23:56.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,58 @@
"value": "CWE-915"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.102",
"matchCriteriaId": "B615DBF4-30B6-49D5-BD59-749C1D1EFE19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "10.2.11",
"matchCriteriaId": "29A04440-F97A-4813-AD9E-88C0BD1C5989"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3.0",
"versionEndExcluding": "10.3.9",
"matchCriteriaId": "444B0D25-710A-400B-9161-75B4A00F7648"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2024-008",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-57459",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T16:15:27.390",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A time-based SQL injection vulnerability exists in mydetailsstudent.php in the CloudClassroom PHP Project 1.0. The myds parameter does not properly validate user input, allowing an attacker to inject arbitrary SQL commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/b0mk35h/921cfa00f9ea1af66645574537d38587",
"source": "cve@mitre.org"
},
{
"url": "https://owasp.org/www-community/attacks/SQL_Injection",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57783",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T14:15:21.170",
"lastModified": "2025-06-02T14:15:21.170",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7073",
"sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"published": "2025-06-02T17:15:36.083",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A server-side request forgery (SSRF) vulnerability exists in multiple WSO2 products due to improper input validation in SOAP admin services. This flaw allows unauthenticated attackers to manipulate server-side requests, enabling access to internal and external resources available through the network or filesystem.\n\nExploitation of this vulnerability could lead to unauthorized access to sensitive data and systems, including resources within private networks, as long as they are reachable by the affected product."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3562",
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7074",
"sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"published": "2025-06-02T17:15:36.250",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\n\nBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/",
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-8008",
"sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"published": "2025-06-02T17:15:36.407",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability exists in multiple [Vendor Name] products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted payload into the request, causing the browser to execute arbitrary JavaScript in the context of the vulnerable page.\n\nThis vulnerability may allow UI manipulation, redirection to malicious websites, or data exfiltration from the browser. However, since all session-related sensitive cookies are protected with the httpOnly flag, session hijacking is not possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/",
"source": "ed10eef1-636d-4fbe-9993-6890dfa878f8"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8997",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-18T14:15:41.400",
"lastModified": "2025-03-18T14:15:41.400",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:14:10.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vestel:evc04_configuration_interface:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18.03.2025",
"matchCriteriaId": "8B85FBBE-94C7-46D7-91C2-4A55908D13AF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0070",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0073",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.067",
"lastModified": "2025-06-02T15:15:32.967",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0324",
"sourceIdentifier": "product-security@axis.com",
"published": "2025-06-02T08:15:20.560",
"lastModified": "2025-06-02T08:15:20.560",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0325",
"sourceIdentifier": "product-security@axis.com",
"published": "2025-06-02T08:15:20.767",
"lastModified": "2025-06-02T08:15:20.767",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0358",
"sourceIdentifier": "product-security@axis.com",
"published": "2025-06-02T08:15:20.917",
"lastModified": "2025-06-02T08:15:20.917",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0819",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.707",
"lastModified": "2025-06-02T14:15:22.580",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1235",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-02T07:15:21.450",
"lastModified": "2025-06-02T07:15:21.450",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1246",
"sourceIdentifier": "arm-security@arm.com",
"published": "2025-06-02T11:15:21.823",
"lastModified": "2025-06-02T14:15:22.753",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1479",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2025-05-30T20:15:32.080",
"lastModified": "2025-05-30T20:15:32.080",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1485",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-06-02T06:15:20.267",
"lastModified": "2025-06-02T06:15:20.267",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Real Cookie Banner: GDPR & ePrivacy Cookie Consent WordPress plugin before 5.1.6, real-cookie-banner-pro WordPress plugin before 5.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/0158eb67-cd36-4406-bf70-6f2be849ec52/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1499",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:24.230",
"lastModified": "2025-06-01T12:15:24.230",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1750",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-06-02T10:15:20.557",
"lastModified": "2025-06-02T10:15:20.557",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20001",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2025-06-02T15:15:33.110",
"lastModified": "2025-06-02T15:15:33.110",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,6 +51,10 @@
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2157",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2157",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20672",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-06-02T03:15:24.443",
"lastModified": "2025-06-02T03:15:24.443",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,34 @@
"value": "In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00412257; Issue ID: MSV-3292."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20673",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-06-02T03:15:24.613",
"lastModified": "2025-06-02T03:15:24.613",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,34 @@
"value": "In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413200; Issue ID: MSV-3304."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20674",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-06-02T03:15:24.737",
"lastModified": "2025-06-02T03:15:24.737",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,34 @@
"value": "In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20675",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-06-02T03:15:24.863",
"lastModified": "2025-06-02T03:15:24.863",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,34 @@
"value": "In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413201; Issue ID: MSV-3302."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20676",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-06-02T03:15:24.987",
"lastModified": "2025-06-02T03:15:24.987",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20677",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-06-02T03:15:25.103",
"lastModified": "2025-06-02T03:15:25.103",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-20678",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-06-02T03:15:25.230",
"lastModified": "2025-06-02T03:15:25.230",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,34 @@
"value": "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-23247",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2025-05-27T17:15:25.813",
"lastModified": "2025-05-28T15:01:30.720",
"lastModified": "2025-06-02T17:15:37.097",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5643",
"source": "psirt@nvidia.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2151",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25044",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.317",
"lastModified": "2025-06-01T12:15:25.317",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25179",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-06-02T05:15:20.160",
"lastModified": "2025-06-02T15:15:33.260",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2501",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2025-05-30T20:15:42.187",
"lastModified": "2025-05-30T20:15:42.187",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2502",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2025-05-30T20:15:42.373",
"lastModified": "2025-05-30T20:15:42.373",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2503",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2025-05-30T20:15:42.563",
"lastModified": "2025-05-30T20:15:42.563",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26396",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2025-06-02T13:15:21.367",
"lastModified": "2025-06-02T13:15:21.367",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2896",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.483",
"lastModified": "2025-06-01T12:15:25.483",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29785",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T11:15:21.953",
"lastModified": "2025-06-02T11:15:21.953",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30466",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:21.603",
"lastModified": "2025-05-30T22:15:21.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T16:00:47.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,80 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.4",
"matchCriteriaId": "45D15738-9AE3-4CB5-8755-A67F6E09EAC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.4",
"matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.4",
"matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.4",
"matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4",
"matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31189",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:21.737",
"lastModified": "2025-05-30T22:15:21.533",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T16:00:37.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.5",
"matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.5",
"matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.4",
"matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31198",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:21.840",
"lastModified": "2025-05-30T22:15:21.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T16:00:30.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.5",
"matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.5",
"matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.4",
"matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31199",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:21.937",
"lastModified": "2025-05-30T22:15:21.843",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T16:00:21.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.4",
"matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.4",
"matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.4",
"matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4",
"matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31231",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:22.050",
"lastModified": "2025-05-30T22:15:22.000",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T16:00:08.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.4",
"matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31261",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-05-29T22:15:22.147",
"lastModified": "2025-05-30T22:15:22.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-02T16:00:02.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.5",
"matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.5",
"matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.4",
"matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31673",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-03-31T22:15:19.773",
"lastModified": "2025-04-29T16:15:31.317",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:25:04.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,65 @@
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "10.3.13",
"matchCriteriaId": "61A4CA72-F83D-442A-9139-A2181856DBA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0",
"versionEndExcluding": "10.4.3",
"matchCriteriaId": "995C04AD-296A-458A-B7BF-D23212E152E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.0.12",
"matchCriteriaId": "249BE2B2-4C47-471B-99C4-F9E88984E13E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1.0",
"versionEndExcluding": "11.1.3",
"matchCriteriaId": "3C6BF080-5C8B-4047-9EB2-1983E49C3744"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2025-002",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31675",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-03-31T22:15:20.003",
"lastModified": "2025-04-29T16:15:31.470",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T16:25:25.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,65 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "10.3.14",
"matchCriteriaId": "5203ABED-9A31-41A8-9A2E-51114DB3806C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0",
"versionEndExcluding": "10.4.5",
"matchCriteriaId": "3A7811E7-6793-4CE0-B866-B72B59415A5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.0.13",
"matchCriteriaId": "CDD587C1-9A62-4104-92B3-65B6E04BDC95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1.0",
"versionEndExcluding": "11.1.5",
"matchCriteriaId": "13E1698C-D69F-4B55-B7B9-1E0F0A7888D6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-core-2025-004",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31682",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-03-31T22:15:20.767",
"lastModified": "2025-04-29T16:15:32.527",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T17:52:42.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,60 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google_tag_project:google_tag:*:*:*:*:drupal:*:*:*",
"versionEndExcluding": "8.x-1.8",
"matchCriteriaId": "6AE6A395-8531-4561-8690-00CDDC55377F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google_tag_project:google_tag:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.0.8",
"matchCriteriaId": "E2653C18-55AA-425B-8E04-F73926BD4F8C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-011",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31683",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-03-31T22:15:20.890",
"lastModified": "2025-04-29T16:15:32.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-02T17:52:11.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,60 @@
"value": "CWE-352"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google_tag_project:google_tag:*:*:*:*:drupal:*:*:*",
"versionEndExcluding": "8.x-1.8",
"matchCriteriaId": "6AE6A395-8531-4561-8690-00CDDC55377F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google_tag_project:google_tag:*:*:*:*:*:drupal:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.0.8",
"matchCriteriaId": "E2653C18-55AA-425B-8E04-F73926BD4F8C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-012",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3260",
"sourceIdentifier": "security@grafana.com",
"published": "2025-06-02T10:15:21.740",
"lastModified": "2025-06-02T10:15:21.740",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-33004",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.643",
"lastModified": "2025-06-01T12:15:25.643",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-33005",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.807",
"lastModified": "2025-06-01T12:15:25.807",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3454",
"sourceIdentifier": "security@grafana.com",
"published": "2025-06-02T11:15:22.167",
"lastModified": "2025-06-02T11:15:22.167",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3475",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-04-09T18:15:51.170",
"lastModified": "2025-05-01T14:38:09.863",
"lastModified": "2025-06-02T17:23:36.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -74,9 +74,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:web-t:*:*:*:*:*:drupal:*:*",
"criteria": "cpe:2.3:a:europa:web-t:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "D0851B54-7003-4CA4-B8EC-461ED13160CD"
"matchCriteriaId": "497F866A-35B5-4BAD-907E-BDDFA33B1459"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-37089",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:22.993",
"lastModified": "2025-06-02T15:15:33.653",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-37090",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.163",
"lastModified": "2025-06-02T15:15:33.767",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-37091",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.310",
"lastModified": "2025-06-02T14:15:23.310",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-37092",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-06-02T14:15:23.467",
"lastModified": "2025-06-02T15:15:33.947",
"vulnStatus": "Received",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US",

Some files were not shown because too many files have changed in this diff Show More