diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34732.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34732.json index f6ca49dc439..46e5f317a2e 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34732.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34732.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34732", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-12T18:15:43.840", - "lastModified": "2025-05-13T19:35:25.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:41:24.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flytxt:neon-dx:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.0.1", + "matchCriteriaId": "36DA3554-4C52-4A85-8A81-420B28FCC941" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/saykino/CVE-2023-34732", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55466.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55466.json index e5d2deff47a..04bfbe829f9 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55466.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55466", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-12T19:15:48.417", - "lastModified": "2025-05-13T19:35:25.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:38:44.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thingsboard:thingsboard:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.8.1", + "matchCriteriaId": "E3E27E86-AB27-4574-BDE4-4C843815E7EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cybsecsid/ThingsBoard-IoT-Platform-CVE-2024-55466", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/thingsboard/thingsboard/releases/tag/v3.8.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2231.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2231.json index 922d8c01d0e..4e405eda91f 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2231.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2231.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2231", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-03-24T20:15:18.370", - "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T00:49:38.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.5.1.394:*:*:*:*:*:*:*", + "matchCriteriaId": "DFA79113-CFFE-492E-89D6-2B39BCD678E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.5.1.394:*:*:*:*:*:*:*", + "matchCriteriaId": "93D9B03E-8FF3-4B46-964A-7CF8119F5C81" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.pdf-xchange.com/support/security-bulletins.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-129/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json index 5d2af1021fb..78648fbfb02 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2659", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T19:15:14.570", - "lastModified": "2025-03-23T19:15:14.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:23:44.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_time_table_generator:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "89AF98EE-9983-48E4-B200-212717C6C739" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ydnd/cve/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300675", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300675", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.520482", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json index e5cca473fa3..294ca479f80 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2660", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T19:15:14.770", - "lastModified": "2025-03-23T19:15:14.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:19:58.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_time_table_generator:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "89AF98EE-9983-48E4-B200-212717C6C739" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ydnd/cve/issues/8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300676", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300676", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.520483", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json index a469805f985..d121a9f4de7 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2661", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T20:15:12.500", - "lastModified": "2025-03-23T20:15:12.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:11:30.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_time_table_generator:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "89AF98EE-9983-48E4-B200-212717C6C739" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ydnd/cve/issues/9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300677", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300677", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.520484", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json index b0acc86026a..28a1be11dbc 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2662", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T20:15:12.697", - "lastModified": "2025-03-23T20:15:12.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:02:12.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_time_table_generator:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "89AF98EE-9983-48E4-B200-212717C6C739" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ydnd/cve/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300678", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300678", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.520503", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2707.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2707.json index 76e8f51a7e7..c100f781670 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2707.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2707.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2707", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T19:15:50.963", - "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T00:56:28.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zhijiantianya:ruoyi-vue-pro:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "113B16B0-0B80-473E-B6F7-D3D7E2214CBF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#3file-path-traversal-front-end", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300728", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300728", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.517029", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2708.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2708.json index c379ebc8b33..5db9e6a96c0 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2708.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2708.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2708", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T20:15:18.950", - "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T00:42:06.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zhijiantianya:ruoyi-vue-pro:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "113B16B0-0B80-473E-B6F7-D3D7E2214CBF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#4file-path-traversal-back-end", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.517030", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#4file-path-traversal-back-end", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json index 54ec47548f8..248d6ee0d44 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2709", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T20:15:19.133", - "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T00:32:30.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yonyou:ufida_erp-nc:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8DFAD3FF-D4D2-4278-89F3-7D7041F7B31F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/84", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300730", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300730", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.517305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] }, { "url": "https://github.com/Hebing123/cve/issues/84", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json index 941d93c0463..61f26789d2a 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2710", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T21:15:18.547", - "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T00:27:13.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,26 +144,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yonyou:ufida_erp-nc:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8DFAD3FF-D4D2-4278-89F3-7D7041F7B31F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/85", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.300731", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300731", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.517306", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Hebing123/cve/issues/85", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28055.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28055.json index 927c7178bcd..e36969d2f74 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28055.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28055.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28055", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-13T16:15:28.903", - "lastModified": "2025-05-14T14:15:28.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:58:56.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shinnku:upset-gal-web:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E2F8D606-7213-4885-A617-9AE9371A2E63" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/LTLTLXEY/eb5e07436e0fcaca9747cd4467055f14", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/shinnku-nikaidou/upset-gal-web/issues/132", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29152.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29152.json index 2201b3f2e19..15db6af5028 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29152.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29152.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29152", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-07T14:15:41.250", - "lastModified": "2025-05-08T14:39:18.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T01:31:33.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lemeconsultoria:galera:4.58.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8804A6B8-AD9F-4A16-858B-AA9DA282675B" + } + ] + } + ] + } + ], "references": [ { "url": "https://medium.com/@worzyus/poc-2fd1d2ec1eb9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wellington-almeida.medium.com/poc-2fd1d2ec1eb9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wellington-almeida.medium.com/poc-2fd1d2ec1eb9", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29153.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29153.json index 50f4a7aa3ac..4217f3da856 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29153.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29153.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29153", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-07T14:15:42.493", - "lastModified": "2025-05-08T14:39:18.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T01:30:45.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lemeconsultoria:galera:4.58.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8804A6B8-AD9F-4A16-858B-AA9DA282675B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wellington-almeida.medium.com/poc-sql-391c437c3960", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://worzyus.medium.com/391c437c3960", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wellington-almeida.medium.com/poc-sql-391c437c3960", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29448.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29448.json index f274132b0c9..e434aae1904 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29448.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29448.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29448", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-07T15:15:57.320", - "lastModified": "2025-05-12T19:15:49.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T01:28:45.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easyappointments:easy\\!appointments:1.5.1:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "C1BFE743-1A78-4C9B-B334-C0EC67AEE7D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Abdullah4eb/CVE-2025-29448", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34077.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34077.json new file mode 100644 index 00000000000..ad11fbccdb8 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34077.json @@ -0,0 +1,106 @@ +{ + "id": "CVE-2025-34077", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-09T01:15:49.780", + "lastModified": "2025-07-09T01:15:49.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authentication bypass vulnerability exists in the WordPress Pie Register plugin \u2264 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-306" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GTSolutions/Pie-Register", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_pie_register_bypass_rce.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://pieregister.com/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/wordpress-pie-register-plugin-rce", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://wordpress.org/plugins/pie-register/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/50395", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34083.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34083.json new file mode 100644 index 00000000000..69ec199caa9 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34083.json @@ -0,0 +1,114 @@ +{ + "id": "CVE-2025-34083", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-09T01:15:49.937", + "lastModified": "2025-07-09T01:15:49.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unrestricted file upload vulnerability exists in the WordPress AIT CSV Import/Export plugin \u2264 3.0.3. The plugin exposes an upload handler at upload-handler.php that allows arbitrary file upload via a multipart/form-data POST request. This endpoint does not enforce authentication or content-type validation, enabling attackers to upload malicious PHP code directly to the server. Although the upload may produce an error related to CSV parsing, the malicious file is still saved under wp-content/uploads/ and remains executable. Notably, the plugin does not need to be active for exploitation to succeed." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-306" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_ait_csv_rce.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://packetstorm.news/files/id/160918", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/wordpress-ait-csv-import-export-plugin-rce", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://wpscan.com/vulnerability/36e699a4-91f2-426d-ba14-26036fbfeaea/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-ait-themes-csv-import-export-arbitrary-file-upload-3-0-3/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.ait-themes.club/csv-import-export-wordpress-plugin/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.fortiguard.com/encyclopedia/ips/49754", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ait-csv-import-export/ait-csv-importexport-303-arbitrary-file-upload", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34084.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34084.json new file mode 100644 index 00000000000..525de7d959b --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34084.json @@ -0,0 +1,102 @@ +{ + "id": "CVE-2025-34084", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-09T01:15:50.087", + "lastModified": "2025-07-09T01:15:50.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated information disclosure vulnerability exists in the WordPress Total Upkeep plugin (also known as BoldGrid Backup) prior to version 1.14.10. The plugin exposes multiple endpoints that allow unauthenticated users to retrieve detailed server configuration (env-info.php) and discover backup metadata (restore-info.json). These backups, which may include full SQL database dumps, are accessible without authentication if their paths are known or guessed. The restore-info.json endpoint discloses the absolute filesystem path of the latest backup, which attackers can convert into a web-accessible URL under wp-content/uploads/ and download. Extracting the database archive may yield credential hashes from the wp_users table, facilitating offline password cracking or credential stuffing attacks." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/2439376/boldgrid-backup", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/wp_total_upkeep_downloader.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/wordpress-total-upkeep-boldgrid-backup-plugin-info-disclosure", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://wordpress.org/plugins/boldgrid-backup/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.boldgrid.com/wordpress-backup-plugin/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/49252", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34085.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34085.json new file mode 100644 index 00000000000..b700656ac8d --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34085.json @@ -0,0 +1,114 @@ +{ + "id": "CVE-2025-34085", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-07-09T01:15:50.233", + "lastModified": "2025-07-09T01:15:50.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unrestricted file upload vulnerability in the WordPress Simple File List plugin prior to version 4.2.3 allows unauthenticated remote attackers to achieve remote code execution. The plugin's upload endpoint (ee-upload-engine.php) restricts file uploads based on extension, but lacks proper validation after file renaming. An attacker can first upload a PHP payload disguised as a .png file, then use the plugin\u2019s ee-file-engine.php rename functionality to change the extension to .php. This bypasses upload restrictions and results in the uploaded payload being executable on the server." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://packetstorm.news/files/id/160221", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/2286920/simple-file-list", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_simple_file_list_rce.rb", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://simplefilelist.com/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/wordpress-simple-file-list-plugin-rce", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://web.archive.org/web/20220426044003/https://wpscan.com/vulnerability/10192/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://wordpress.org/plugins/simple-file-list/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cybersecurity-help.cz/vdb/SB2020042711", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/simple-file-list/simple-file-list-423-remote-code-execution", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-37xx/CVE-2025-3780.json b/CVE-2025/CVE-2025-37xx/CVE-2025-3780.json new file mode 100644 index 00000000000..84a4481048a --- /dev/null +++ b/CVE-2025/CVE-2025-37xx/CVE-2025-3780.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3780", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-07-09T00:15:39.570", + "lastModified": "2025-07-09T00:15:39.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WCFM \u2013 Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wcfm_redirect_to_setup function in all versions up to, and including, 6.7.16. This makes it possible for unauthenticated attackers to view and modify the plugin settings, including payment details and API keys" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wc-frontend-manager/tags/6.7.16/core/class-wcfm-admin.php#L74", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wc-frontend-manager/tags/6.7.16/core/class-wcfm-admin.php#L81", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26a82493-a6a5-4d8e-8322-942925a54cc3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45835.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45835.json index a414c6ac1af..1caeb2691ec 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45835.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45835.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45835", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-12T14:15:26.003", - "lastModified": "2025-05-12T22:15:26.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:57:10.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*", + "matchCriteriaId": "9FAE178F-B04C-4923-B029-F9AC7CA67819" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4C74CDB-877C-4ACD-B6C1-7543EF259899" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Null-Pointer-Dereference-Vulnerability/tree/main/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Null-Pointer-Dereference-Vulnerability/tree/main/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46717.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46717.json index 7fba403add9..6db6f82ccb7 100644 --- a/CVE-2025/CVE-2025-467xx/CVE-2025-46717.json +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46717.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46717", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-12T15:16:01.260", - "lastModified": "2025-05-12T22:15:26.957", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:51:08.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,20 +49,59 @@ "value": "CWE-497" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trifectatech:sudo:*:*:*:*:*:rust:*:*", + "versionEndExcluding": "0.2.6", + "matchCriteriaId": "FC98CE22-CA46-419B-ACDE-21E0AC76561B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/trifectatechfoundation/sudo-rs/releases/tag/v0.2.6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46718.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46718.json index 1a4a545c0df..21912f9d3d6 100644 --- a/CVE-2025/CVE-2025-467xx/CVE-2025-46718.json +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46718.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46718", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-12T15:16:01.397", - "lastModified": "2025-05-12T22:15:27.057", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-07-09T01:45:32.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,20 +49,59 @@ "value": "CWE-497" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trifectatech:sudo:*:*:*:*:*:rust:*:*", + "versionEndExcluding": "0.2.6", + "matchCriteriaId": "FC98CE22-CA46-419B-ACDE-21E0AC76561B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/trifectatechfoundation/sudo-rs/releases/tag/v0.2.6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-w9q3-g4p5-5q2r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-w9q3-g4p5-5q2r", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-476xx/CVE-2025-47682.json b/CVE-2025/CVE-2025-476xx/CVE-2025-47682.json index 0b0e3ab8be9..d0cd73d9434 100644 --- a/CVE-2025/CVE-2025-476xx/CVE-2025-47682.json +++ b/CVE-2025/CVE-2025-476xx/CVE-2025-47682.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47682", "sourceIdentifier": "audit@patchstack.com", "published": "2025-05-12T19:15:51.420", - "lastModified": "2025-05-13T19:35:25.503", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-07-09T01:36:27.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cozyvision:sms_alert_order_notifications:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.8.2", + "matchCriteriaId": "FC050880-F7A8-436C-AD72-5E4201199421" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/sms-alert/vulnerability/wordpress-sms-alert-order-notifications-woocommerce-3-8-1-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4828.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4828.json new file mode 100644 index 00000000000..f6214a0eecc --- /dev/null +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4828.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-4828", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-07-09T00:15:47.077", + "lastModified": "2025-07-09T00:15:47.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Support Board plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the sb_file_delete function in all versions up to, and including, 3.8.0. This makes it possible for attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). An attacker can leverage CVE-2025-4855 vulnerability to exploit this vulnerability unauthenticated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://codecanyon.net/item/support-board-help-desk-and-chat/20359943", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/33989611-8640-4c33-a34e-14f10cd7286d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4855.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4855.json new file mode 100644 index 00000000000..61c5e2c08a4 --- /dev/null +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4855.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-4855", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-07-09T00:15:47.243", + "lastModified": "2025-07-09T00:15:47.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in the sb_encryption() function in all versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to bypass authorization and execute arbitrary AJAX actions defined in the sb_ajax_execute() function. An attacker can use this vulnerability to exploit CVE-2025-4828 and various other functions unauthenticated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://codecanyon.net/item/support-board-help-desk-and-chat/20359943", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/afd48bc8-d490-4a3e-97fc-70cf008cbf66?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7206.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7206.json new file mode 100644 index 00000000000..36576877e11 --- /dev/null +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7206.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2025-7206", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-09T00:15:47.403", + "lastModified": "2025-07-09T00:15:47.403", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipulation of the argument Language leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/i-Corner/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315155", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315155", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607661", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7207.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7207.json new file mode 100644 index 00000000000..68a11b1ce92 --- /dev/null +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7207.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-7207", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-09T01:15:50.380", + "lastModified": "2025-07-09T01:15:50.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in mruby up to 3.4.0-rc2. Affected is the function scope_new of the file mrbgems/mruby-compiler/core/codegen.c of the component nregs Handler. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 1.7, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mruby/mruby/commit/1fdd96104180cc0fb5d3cb086b05ab6458911bb9", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mruby/mruby/issues/6509", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mruby/mruby/issues/6509#event-17145516649", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/19619499/mruby_crash.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315156", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315156", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607683", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7208.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7208.json new file mode 100644 index 00000000000..2a3fe6ae710 --- /dev/null +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7208.json @@ -0,0 +1,157 @@ +{ + "id": "CVE-2025-7208", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-09T01:15:50.573", + "lastModified": "2025-07-09T01:15:50.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in 9fans plan9port up to 9da5b44. It has been classified as critical. This affects the function edump in the library /src/plan9port/src/libsec/port/x509.c. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is b3e06559475b0130a7a2fb56ac4d131d13d2012f. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 5.2, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/drive/folders/1kedwNLNDiFQB2OAp7S-ZKYoF7nxfIZGO?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://git.9front.org/plan9front/plan9front/b3e06559475b0130a7a2fb56ac4d131d13d2012f/commit.html", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/9fans/plan9port/issues/710#issuecomment-2819906648", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/19698345/plan9port_crash_1.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259053", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259053", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.304567", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607684", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7209.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7209.json new file mode 100644 index 00000000000..d02cd77797b --- /dev/null +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7209.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-7209", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-09T01:15:50.773", + "lastModified": "2025-07-09T01:15:50.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in 9fans plan9port up to 9da5b44 and classified as problematic. Affected by this vulnerability is the function value_decode in the library src/libsec/port/x509.c. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is deae8939583d83fd798fca97665e0e94656c3ee8. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 1.7, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://git.9front.org/plan9front/plan9front/deae8939583d83fd798fca97665e0e94656c3ee8/commit.html", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/9fans/plan9port/issues/711", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/9fans/plan9port/issues/711#issuecomment-2819905220", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/user-attachments/files/19698361/plan9port_crash_2.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315157", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315157", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607685", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9b39f39900e..2d0ab26b659 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-08T23:55:11.663896+00:00 +2025-07-09T02:00:11.789127+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-08T23:15:26.757000+00:00 +2025-07-09T01:58:56.097000+00:00 ``` ### Last Data Feed Release @@ -27,51 +27,55 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-07-08T00:00:02.131304+00:00 +2025-07-09T00:00:02.112381+00:00 ``` ### Total Number of included CVEs ```plain -301150 +301161 ``` ### CVEs added in the last Commit -Recently added CVEs: `46` +Recently added CVEs: `11` -- [CVE-2025-47129](CVE-2025/CVE-2025-471xx/CVE-2025-47129.json) (`2025-07-08T23:15:25.757`) -- [CVE-2025-47130](CVE-2025/CVE-2025-471xx/CVE-2025-47130.json) (`2025-07-08T23:15:25.910`) -- [CVE-2025-47131](CVE-2025/CVE-2025-471xx/CVE-2025-47131.json) (`2025-07-08T23:15:26.073`) -- [CVE-2025-47132](CVE-2025/CVE-2025-471xx/CVE-2025-47132.json) (`2025-07-08T23:15:26.223`) -- [CVE-2025-47133](CVE-2025/CVE-2025-471xx/CVE-2025-47133.json) (`2025-07-08T23:15:26.390`) -- [CVE-2025-47134](CVE-2025/CVE-2025-471xx/CVE-2025-47134.json) (`2025-07-08T22:15:25.703`) -- [CVE-2025-47136](CVE-2025/CVE-2025-471xx/CVE-2025-47136.json) (`2025-07-08T22:15:25.857`) -- [CVE-2025-49524](CVE-2025/CVE-2025-495xx/CVE-2025-49524.json) (`2025-07-08T22:15:26.010`) -- [CVE-2025-49525](CVE-2025/CVE-2025-495xx/CVE-2025-49525.json) (`2025-07-08T22:15:26.183`) -- [CVE-2025-49526](CVE-2025/CVE-2025-495xx/CVE-2025-49526.json) (`2025-07-08T22:15:26.340`) -- [CVE-2025-49527](CVE-2025/CVE-2025-495xx/CVE-2025-49527.json) (`2025-07-08T22:15:26.500`) -- [CVE-2025-49528](CVE-2025/CVE-2025-495xx/CVE-2025-49528.json) (`2025-07-08T22:15:26.657`) -- [CVE-2025-49529](CVE-2025/CVE-2025-495xx/CVE-2025-49529.json) (`2025-07-08T22:15:26.810`) -- [CVE-2025-49530](CVE-2025/CVE-2025-495xx/CVE-2025-49530.json) (`2025-07-08T22:15:26.960`) -- [CVE-2025-49531](CVE-2025/CVE-2025-495xx/CVE-2025-49531.json) (`2025-07-08T22:15:27.113`) -- [CVE-2025-49532](CVE-2025/CVE-2025-495xx/CVE-2025-49532.json) (`2025-07-08T22:15:27.273`) -- [CVE-2025-49533](CVE-2025/CVE-2025-495xx/CVE-2025-49533.json) (`2025-07-08T22:15:27.423`) -- [CVE-2025-49534](CVE-2025/CVE-2025-495xx/CVE-2025-49534.json) (`2025-07-08T22:15:27.587`) -- [CVE-2025-49547](CVE-2025/CVE-2025-495xx/CVE-2025-49547.json) (`2025-07-08T22:15:27.737`) -- [CVE-2025-53547](CVE-2025/CVE-2025-535xx/CVE-2025-53547.json) (`2025-07-08T22:15:27.897`) -- [CVE-2025-6759](CVE-2025/CVE-2025-67xx/CVE-2025-6759.json) (`2025-07-08T22:15:28.213`) -- [CVE-2025-7197](CVE-2025/CVE-2025-71xx/CVE-2025-7197.json) (`2025-07-08T22:15:28.363`) -- [CVE-2025-7198](CVE-2025/CVE-2025-71xx/CVE-2025-7198.json) (`2025-07-08T22:15:28.563`) -- [CVE-2025-7199](CVE-2025/CVE-2025-71xx/CVE-2025-7199.json) (`2025-07-08T23:15:26.547`) -- [CVE-2025-7200](CVE-2025/CVE-2025-72xx/CVE-2025-7200.json) (`2025-07-08T23:15:26.757`) +- [CVE-2025-34077](CVE-2025/CVE-2025-340xx/CVE-2025-34077.json) (`2025-07-09T01:15:49.780`) +- [CVE-2025-34083](CVE-2025/CVE-2025-340xx/CVE-2025-34083.json) (`2025-07-09T01:15:49.937`) +- [CVE-2025-34084](CVE-2025/CVE-2025-340xx/CVE-2025-34084.json) (`2025-07-09T01:15:50.087`) +- [CVE-2025-34085](CVE-2025/CVE-2025-340xx/CVE-2025-34085.json) (`2025-07-09T01:15:50.233`) +- [CVE-2025-3780](CVE-2025/CVE-2025-37xx/CVE-2025-3780.json) (`2025-07-09T00:15:39.570`) +- [CVE-2025-4828](CVE-2025/CVE-2025-48xx/CVE-2025-4828.json) (`2025-07-09T00:15:47.077`) +- [CVE-2025-4855](CVE-2025/CVE-2025-48xx/CVE-2025-4855.json) (`2025-07-09T00:15:47.243`) +- [CVE-2025-7206](CVE-2025/CVE-2025-72xx/CVE-2025-7206.json) (`2025-07-09T00:15:47.403`) +- [CVE-2025-7207](CVE-2025/CVE-2025-72xx/CVE-2025-7207.json) (`2025-07-09T01:15:50.380`) +- [CVE-2025-7208](CVE-2025/CVE-2025-72xx/CVE-2025-7208.json) (`2025-07-09T01:15:50.573`) +- [CVE-2025-7209](CVE-2025/CVE-2025-72xx/CVE-2025-7209.json) (`2025-07-09T01:15:50.773`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `19` -- [CVE-2025-6550](CVE-2025/CVE-2025-65xx/CVE-2025-6550.json) (`2025-07-08T22:15:28.053`) +- [CVE-2023-34732](CVE-2023/CVE-2023-347xx/CVE-2023-34732.json) (`2025-07-09T01:41:24.110`) +- [CVE-2024-55466](CVE-2024/CVE-2024-554xx/CVE-2024-55466.json) (`2025-07-09T01:38:44.403`) +- [CVE-2025-2231](CVE-2025/CVE-2025-22xx/CVE-2025-2231.json) (`2025-07-09T00:49:38.953`) +- [CVE-2025-2659](CVE-2025/CVE-2025-26xx/CVE-2025-2659.json) (`2025-07-09T01:23:44.977`) +- [CVE-2025-2660](CVE-2025/CVE-2025-26xx/CVE-2025-2660.json) (`2025-07-09T01:19:58.203`) +- [CVE-2025-2661](CVE-2025/CVE-2025-26xx/CVE-2025-2661.json) (`2025-07-09T01:11:30.570`) +- [CVE-2025-2662](CVE-2025/CVE-2025-26xx/CVE-2025-2662.json) (`2025-07-09T01:02:12.363`) +- [CVE-2025-2707](CVE-2025/CVE-2025-27xx/CVE-2025-2707.json) (`2025-07-09T00:56:28.697`) +- [CVE-2025-2708](CVE-2025/CVE-2025-27xx/CVE-2025-2708.json) (`2025-07-09T00:42:06.787`) +- [CVE-2025-2709](CVE-2025/CVE-2025-27xx/CVE-2025-2709.json) (`2025-07-09T00:32:30.837`) +- [CVE-2025-2710](CVE-2025/CVE-2025-27xx/CVE-2025-2710.json) (`2025-07-09T00:27:13.447`) +- [CVE-2025-28055](CVE-2025/CVE-2025-280xx/CVE-2025-28055.json) (`2025-07-09T01:58:56.097`) +- [CVE-2025-29152](CVE-2025/CVE-2025-291xx/CVE-2025-29152.json) (`2025-07-09T01:31:33.547`) +- [CVE-2025-29153](CVE-2025/CVE-2025-291xx/CVE-2025-29153.json) (`2025-07-09T01:30:45.633`) +- [CVE-2025-29448](CVE-2025/CVE-2025-294xx/CVE-2025-29448.json) (`2025-07-09T01:28:45.923`) +- [CVE-2025-45835](CVE-2025/CVE-2025-458xx/CVE-2025-45835.json) (`2025-07-09T01:57:10.290`) +- [CVE-2025-46717](CVE-2025/CVE-2025-467xx/CVE-2025-46717.json) (`2025-07-09T01:51:08.943`) +- [CVE-2025-46718](CVE-2025/CVE-2025-467xx/CVE-2025-46718.json) (`2025-07-09T01:45:32.727`) +- [CVE-2025-47682](CVE-2025/CVE-2025-476xx/CVE-2025-47682.json) (`2025-07-09T01:36:27.727`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b1983342502..c3e27e6961a 100644 --- a/_state.csv +++ b/_state.csv @@ -228693,7 +228693,7 @@ CVE-2023-34723,0,0,f28e5fcdf85cdcb78360b6dd74de161f2a8b1728dcbb562d4fd2d0adf2ea2 CVE-2023-34724,0,0,3d38ce4621fbaea7ec434bfe03d94921e1586b8f4819c97844220eb40d8ce046,2024-11-21T08:07:31.957000 CVE-2023-34725,0,0,a91484a6618a003bf51be089e9f361f0616ab1001852503c404746a429459df5,2024-11-21T08:07:32.137000 CVE-2023-3473,0,0,073ce3b7be359fe995e70125be1542f9eadd3d0b6a79350525a873535aa59864,2024-11-21T08:17:20.693000 -CVE-2023-34732,0,0,b7dcf9d163942d85e27cac827b5cbad75e58e6d7f67d1c149213de8024678649,2025-05-13T19:35:25.503000 +CVE-2023-34732,0,1,b0c54412e92d0e52817d3a615e7e73c117754bd7f6fb3f7d4038fb6571a212fe,2025-07-09T01:41:24.110000 CVE-2023-34733,0,0,3bd092be3b6a1595e9d44ff667eb44131e3c643c021742b573615f7fa7dd5298,2024-11-21T08:07:32.293000 CVE-2023-34734,0,0,d404e0df09ba4e64dd5ca2912f332ecf9c79eb57f6944a9178a55119819cb357,2024-11-21T08:07:32.457000 CVE-2023-34735,0,0,b95bdce56748dbf170bc38843ad31877d1193c70634e77eece8a56a19dc73029,2024-11-21T08:07:32.610000 @@ -277179,7 +277179,7 @@ CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa9 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55460,0,0,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000 CVE-2024-55461,0,0,df958f7c00c8a8535af124b3f4fbfcd81a3726621b4e3eac8dd977dfbdb6bb10,2025-03-28T16:55:56.543000 -CVE-2024-55466,0,0,720dd90e6af8f6c74c796ed099a9cd9b81557523c656e5f22472cbfb58593e73,2025-05-13T19:35:25.503000 +CVE-2024-55466,0,1,cee2146560a35a08748ad001dd161bd567d123798a62bc11577100cd7fc5778f,2025-07-09T01:38:44.403000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000 CVE-2024-55471,0,0,53c8545095dcd233b02e5b5368ccdda8e9894ef3eef3c8dd7b456e3a987cf26a,2024-12-20T18:15:30.730000 @@ -277792,7 +277792,7 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 CVE-2024-56463,0,0,c91a97955e67636097d6c8d92cc78e5f006b9381a4b58d350ab149902990ae2e,2025-03-03T17:09:36.020000 CVE-2024-56467,0,0,a637c2bcf3b6a4a4b3f08718b44e1be4e289aad16c95ae9f9eab032a86fca295,2025-07-07T18:26:35.707000 -CVE-2024-56468,1,1,ff714809f0017608b02b1568a755730d7355f8721e1ec2e84d6131947b4e0bc8,2025-07-08T23:15:22.840000 +CVE-2024-56468,0,0,ff714809f0017608b02b1568a755730d7355f8721e1ec2e84d6131947b4e0bc8,2025-07-08T23:15:22.840000 CVE-2024-56469,0,0,8858433e3a23bbc4041cc9fa4ddadf0e8de10d95ea752f993edeb0505044f985,2025-03-27T16:45:12.210000 CVE-2024-5647,0,0,ab8dda8bbe1d15e33baced30b68dc6602e623ee999011776cef9f579e77b11cf,2025-07-03T15:13:53.147000 CVE-2024-56470,0,0,61c48c46be39e45171a09013b345ebbaf36a8d1a6bbca7b2ab400aedf5fb9ae6,2025-03-07T19:43:22.887000 @@ -286229,7 +286229,7 @@ CVE-2025-22306,0,0,8af5a742da3016cfaa42fd709b08ea73e49a5e792a33f8c80862b6d3eaad9 CVE-2025-22307,0,0,551dc24072f38079ff7384f32ecad5baae3d2cc5e837d9af57fca3b9f480fdc7,2025-01-09T16:16:25.347000 CVE-2025-22308,0,0,9a6d70724a98274c9d996d44a4871290056075b233769a030b30dce33c596be8,2025-01-07T11:15:15.043000 CVE-2025-22309,0,0,41a5649d9f063abc40e2323ec834921c50bb20c7c3f52cc1cbc06eac9caf5064,2025-01-07T11:15:15.190000 -CVE-2025-2231,0,0,9b4a7d3852b41a0003c765c9353d804bb02315942bab0fe2b1e413dfc76a3918,2025-03-27T16:45:46.410000 +CVE-2025-2231,0,1,cbf875113bef234e00b096825bbddb60e386d96a481ba7039f393f58cdc56fd1,2025-07-09T00:49:38.953000 CVE-2025-22310,0,0,01093bca114875827fdf0ce9f05a34c343d3d135e32d6b40cbb65ecb6d8c931c,2025-01-07T11:15:15.320000 CVE-2025-22311,0,0,f3107125f67d6afdd2daf1f3d9821f17e7fef881547bbc4e18ee7cd02715a195,2025-01-21T14:15:09.930000 CVE-2025-22312,0,0,a7bf6287b60e0e496be523a78cca84a7ead7f5ce4262b249df941bdb26960569,2025-01-07T11:15:15.480000 @@ -289479,7 +289479,7 @@ CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8c CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000 CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000 CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000 -CVE-2025-2659,0,0,fbf6b7428f5a2f31e77711a0c7541da7a333822ab93a6dd7f8fe575092acea75,2025-03-23T19:15:14.570000 +CVE-2025-2659,0,1,e4d2fbbc245dac9f48a809de33fcf48ba5b24612725deaeb87bcd8d1a7c937c3,2025-07-09T01:23:44.977000 CVE-2025-26590,0,0,69dd689006c8d139480f0d2fd99f2d72ce2fbb4e8fd019cab6563b501809f90a,2025-06-06T14:06:58.193000 CVE-2025-26591,0,0,9d7992a4562b103daca25bfecea96aa1fec5770c829761a3369af2c2c269bda6,2025-07-08T16:18:53.607000 CVE-2025-26592,0,0,1d78fdd090f1632b4ac4877f1ba3074af999e759435239a029d6b26bcc5060e7,2025-06-12T16:06:47.857000 @@ -289490,7 +289490,7 @@ CVE-2025-26596,0,0,a17498ce82f81023a0f2b24e6d1af93bc1dbab2803916b9da22b5d02a1213 CVE-2025-26597,0,0,4a1e2c1764d3c3ecae6d9be25cd902eff8756218a23f74ae79d03e58e86dbbb0,2025-05-13T20:15:26.630000 CVE-2025-26598,0,0,090369e9ea329fabd2e57f8decf6fcafdc839e44526725ba95a23391e74dd117,2025-05-13T20:15:26.763000 CVE-2025-26599,0,0,6d181c2ad44776319ccac1403e6490743dcdde5de92ea2375e26eccedee1e5e4,2025-05-13T20:15:26.920000 -CVE-2025-2660,0,0,2c42197968a1776f0de1d02d3e93937e35f83459e766c077a95db777f634c778,2025-03-23T19:15:14.770000 +CVE-2025-2660,0,1,6087f8604571e2edd5b4fb7354f28d42282f430e36df076e613b3dc024fd7402,2025-07-09T01:19:58.203000 CVE-2025-26600,0,0,67639ebcdb5a5b998b7092638db5614fb80d2f2f2fc7ecb86ed0ad396a6d7358,2025-05-16T23:15:19.853000 CVE-2025-26601,0,0,00f2ed45f19633bea13673602f181fec3f04ca870eac151a6105e105c54e94de,2025-05-16T23:15:20.047000 CVE-2025-26603,0,0,8ae2812ccc436075652a92b78482e86bdfeb5a0aad1aca77b0c194e6b06d7b51,2025-03-07T01:15:12.700000 @@ -289500,7 +289500,7 @@ CVE-2025-26606,0,0,01b5af963c67cf408a7951cd9b8b98d50967cbdbf454c26b5e90910449876 CVE-2025-26607,0,0,291c1923e751d4f4b2a1644be45e9e7de1e7e6cd3c80ee373b6c6da95438cfb9,2025-02-28T19:25:20.823000 CVE-2025-26608,0,0,23e0ed9709bbd76c2a02d0e08e94126650c3b9f7bc8cfa9e50bb0f088161261c,2025-02-28T19:25:47.290000 CVE-2025-26609,0,0,a15d6f9150fb06397c49462a6d14349c4a0c15d83ea9cebe5d5b3bc06bcc936b,2025-02-28T19:27:11.960000 -CVE-2025-2661,0,0,266b0b857c2ab458ae2478a9d56942921fd9d152c0e83435a086e1bda92eb9d0,2025-03-23T20:15:12.500000 +CVE-2025-2661,0,1,e61daf37535a30b6a40cb95c4671d1a36b1799859cf46359fa01f540297d53e0,2025-07-09T01:11:30.570000 CVE-2025-26610,0,0,a635cfdf379113812d8417729841fe07a56767b8db5cfd84dfe2c9339e92f367,2025-02-28T19:27:50.273000 CVE-2025-26611,0,0,4f1872977266673de20f7d49d73cb250f90a3084950ab2f9f19fb182dcc1ee64,2025-02-28T19:34:38.980000 CVE-2025-26612,0,0,2fd6788f00d4bfc2e196128f804aebb62824bbc70dbfa4343d95c794928d2734,2025-02-28T19:33:50.090000 @@ -289511,7 +289511,7 @@ CVE-2025-26616,0,0,aa8b06322884233bdec741ce3560375b4bc669c4a149407dc3d32b4c97ff0 CVE-2025-26617,0,0,3b7176f26db08538bdf0440350a3e948ab8223fd8f5e23f2dd98ab621e31f49e,2025-02-28T19:29:04.117000 CVE-2025-26618,0,0,e55d43c709a7be4f17ec37ae02e94300ec9dca0033ae04b455b3167cc26c9a52,2025-02-20T21:15:26.073000 CVE-2025-26619,0,0,107f6d0ef170a3e0c1017c5a72dac7e714adef75bb29d885b19b154f86e9e973,2025-04-11T16:12:33.110000 -CVE-2025-2662,0,0,198a6341c2a165dc85d135e7292714331f9924ebca3fefa86edae79af9279b41,2025-03-23T20:15:12.697000 +CVE-2025-2662,0,1,51c33948878e59b799446404fac62ded39c9d4d7db179076bae4389e73764d88,2025-07-09T01:02:12.363000 CVE-2025-26620,0,0,67bb16c31832fa279abf82fbaaa24277d7470c8a03c406771fcdd9b2a51688a5,2025-02-18T18:15:36.767000 CVE-2025-26621,0,0,b509c29bc5fd718c4cb3378498aa0340c5f8538441deab924705b5c63f4e333a,2025-05-21T20:25:16.407000 CVE-2025-26622,0,0,c297f9725cf2e7fc18943b0198c1b5f52cfc595c8df11ef8a0b53474761d107d,2025-03-28T20:06:00.130000 @@ -289874,10 +289874,10 @@ CVE-2025-27057,0,0,f9698c244dd87b353100a28b325ef4536dad1266aad495583718f748c4f31 CVE-2025-27058,0,0,dcf02459f9af7c84bbae6081fa4915c9cc24dc1ea9c87a7db856364afba98c78,2025-07-08T16:18:14.207000 CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000 CVE-2025-27061,0,0,72641bc5706ddcc7f6087506d7cde05bdba1896c532df6248f7a92bcecc00806,2025-07-08T16:18:14.207000 -CVE-2025-2707,0,0,69090f335640f6d7fd104233cf0819e1bcd7db7e6b1707e48e0f43beec6b95ee,2025-03-27T16:45:46.410000 +CVE-2025-2707,0,1,c11c9e80b36e6a3269d56ae5a2cbcd87958ba9775ac0b987c635e1a18a5f939b,2025-07-09T00:56:28.697000 CVE-2025-27078,0,0,d965af916f92d2db1a98213768345ac86ccaa481e270cc65e36339f5a02ca0fe,2025-04-08T18:13:53.347000 CVE-2025-27079,0,0,2e6807eb9db0ff0cab73307a945a3f280ecd9d2483ae144485c2a82083b449a4,2025-04-08T18:13:53.347000 -CVE-2025-2708,0,0,286e39194d1e18eb3e2db4790ba301f86c463eeffd9283503f17a7ea7a54db41,2025-03-27T16:45:46.410000 +CVE-2025-2708,0,1,9d397021a122b5d3da465b3d07c1eac58b1dca3f2d8c28ead2e9520c6735a8a2,2025-07-09T00:42:06.787000 CVE-2025-27080,0,0,42e0a7d70009a70996fc58eb7f4ee4c8d798d6b5d13faea5a93ec59abf435a8f,2025-03-18T20:15:26.300000 CVE-2025-27081,0,0,8593bea3f6e04dd79dcdb89b954788bba5e7424bd9baf03a721e3eba77e74da0,2025-04-11T15:39:52.920000 CVE-2025-27082,0,0,ffb20ffa027c4bd1d4d43e108dc1329f65254792bdc60837334e2fed50c76691,2025-04-08T21:15:50.273000 @@ -289888,7 +289888,7 @@ CVE-2025-27086,0,0,256f083256c153abe3e013c59563b4f1b7e087bbb7a0322f51ba048b72cf1 CVE-2025-27087,0,0,8fa44186a191b4cca72dbf2da971e1092d606e1b51d2bd1986f5a06f241d48c0,2025-04-23T14:15:28.173000 CVE-2025-27088,0,0,d9193e5f0462842bd77ae3f49c6f26383f6c8c332cf24e4e4afeb291b16e5504,2025-05-20T16:47:38.910000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 -CVE-2025-2709,0,0,9dd572c6b170348c77de9014fc1a8f6982e614f9db9b8b40d020366a034fded1,2025-03-27T16:45:46.410000 +CVE-2025-2709,0,1,22cf6094b11a07d859c409487bb1c492178127547a74d8286853b2c8cc7246c6,2025-07-09T00:32:30.837000 CVE-2025-27090,0,0,d649018651979639a7b1c8acf0eda3f6b93b0e44c8b2420240cdfb846024fd0b,2025-02-27T20:30:33.563000 CVE-2025-27091,0,0,dd6f6d23c60e25fe1b82657f93ac8a603cf86de65d3b605ef6ef73935a4f3a68,2025-05-06T15:19:15.470000 CVE-2025-27092,0,0,9aed7fdfc4c9e1280fc67359d9f3b896d01b5eabc18d15f22f08d950559385bb,2025-02-27T20:28:50.730000 @@ -289898,7 +289898,7 @@ CVE-2025-27096,0,0,b035fc053249cd7e8871d424805bbce3d771ae3f64c764848dba544b57235 CVE-2025-27097,0,0,e199953469681b5e92cc2168d6b4e4da9b471d9694c80dd2a45e6436dbabbaba,2025-02-27T20:27:24.720000 CVE-2025-27098,0,0,873fcb90264f4e04a047cee2cfc6d823db0b6142c91033a12829dbc6dd942122,2025-02-27T20:27:05.270000 CVE-2025-27099,0,0,f9265474bd0869bfa4860eb6054639ed094b78ee6b85b32989d1e21f3bc1763b,2025-03-03T17:15:15.533000 -CVE-2025-2710,0,0,ff64f7398cc0773daf00dbfce7c7fe13a0fc7de9eb662e806146bf8ce43494ce,2025-03-27T16:45:46.410000 +CVE-2025-2710,0,1,7ada47e85faa9ed5d58001e4cf0e0c1f435fd0213b42e6dbce63b73824da405b,2025-07-09T00:27:13.447000 CVE-2025-27100,0,0,e8e728a94b37df8d941f1021ffd1ce6798ea17728dd5164f5aca39df84532b59,2025-02-21T00:15:09.250000 CVE-2025-27101,0,0,ab8565243e455f0a24cdc3e6e0cd68e02ad81f50ec958a31940a9a3c43faa226,2025-03-12T14:15:16.203000 CVE-2025-27102,0,0,7c19e3d6a91184161366ebf21dd808a88591e7be0083fe1cf331cbb01ccf51f0,2025-03-17T14:15:21.867000 @@ -289955,7 +289955,7 @@ CVE-2025-27161,0,0,e2daf6461b200bca09da7de40a88d9c467451fb23187bd82948c062f9b5be CVE-2025-27162,0,0,b6d148bb543fa8cab2a2e14b6258dcc6bd02e7bfdcab4c409efcbc44ae504fb8,2025-04-28T16:48:39.727000 CVE-2025-27163,0,0,81f9699e5b11ea3842ffe9245801daecdb91eec74b0663ccf8976a83a7348e35,2025-04-28T16:48:36.780000 CVE-2025-27164,0,0,1e629a8207bea42d1358f357512432dc28b249a65ee22a83932b7b9ee7da9dde,2025-04-28T16:48:33.017000 -CVE-2025-27165,1,1,155ef390f669d6468b0102ed2c72d4380689dc4db0ed799a4f6608e79cc30933,2025-07-08T22:15:24.107000 +CVE-2025-27165,0,0,155ef390f669d6468b0102ed2c72d4380689dc4db0ed799a4f6608e79cc30933,2025-07-08T22:15:24.107000 CVE-2025-27166,0,0,5022e29cb2fc1ef4a7439717f59195861ec489ae1633e7bf61f51adda22ed1de,2025-04-28T17:05:20.700000 CVE-2025-27167,0,0,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000 CVE-2025-27168,0,0,f99984308c3ede254daed21e56e764d668905b50bfa211ed61f2d84fac69bffd,2025-03-31T20:06:08.030000 @@ -289997,7 +289997,7 @@ CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12c CVE-2025-27200,0,0,2d55459379d67dca2d0eb314eb2150af648e2a6572b027ee78112b380b949b64,2025-04-18T14:40:40.313000 CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3f33,2025-04-15T19:47:25.960000 CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000 -CVE-2025-27203,1,1,4ac4588eba67d8607f05965f50eae40867fdeefa38cdc1f8b334d6ea289cf222,2025-07-08T22:15:24.717000 +CVE-2025-27203,0,0,4ac4588eba67d8607f05965f50eae40867fdeefa38cdc1f8b334d6ea289cf222,2025-07-08T22:15:24.717000 CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000 CVE-2025-27205,0,0,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000 CVE-2025-27206,0,0,d294d50f3906c6fb3fe785cd1596aadcf69ed2db2162953cfc8dc1288ebf1c78,2025-06-23T19:25:38.097000 @@ -290608,7 +290608,7 @@ CVE-2025-28038,0,0,46df29a94614d53d2d4678213bd0ab9a6d3f7530231cbf83b8db2ee8e48a2 CVE-2025-28039,0,0,1b599e06f5a4e23fe6fb163660d4bc70d995f8b2b9997fa65746d32955bcd877,2025-04-29T16:01:14.980000 CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000 CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000 -CVE-2025-28055,0,0,ce78de505057aed6b1ad7ca0d3670c3be55f6f022d99c5a98028ac77810f03b4,2025-05-14T14:15:28.413000 +CVE-2025-28055,0,1,35f8ed5cf293b90ebdc18df3cef817c8072c1ad688be145fe6c633c8ee577f6b,2025-07-09T01:58:56.097000 CVE-2025-28056,0,0,335824986060acb352d56d36b39de26c1a3898677bff39f2a1f9ff2d5a5fbd34,2025-06-23T18:07:03.310000 CVE-2025-28057,0,0,631e6e6f013829d26e8d01802f279e396e4ee4a0af8a44f7acb3a0f54ba8ecf5,2025-05-14T15:15:57.120000 CVE-2025-28059,0,0,fd8c4b90b954c66b0460c191e4b9f4832cdbdf6804690dc7405571baa823f74b,2025-04-22T15:16:10.627000 @@ -290975,8 +290975,8 @@ CVE-2025-2914,0,0,80de8c8203a8c6e5ee48a61979dd7eebd126df92749f77d2c9bd8a25b7ecec CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000 CVE-2025-2915,0,0,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff26074,2025-04-14T14:03:21.190000 CVE-2025-29150,0,0,830ae278210dc8950b4025bdf811095dc9ceda7da749b4d24c53ea4d187bdb2f,2025-04-15T13:50:15.537000 -CVE-2025-29152,0,0,51510d190a0992f344517e05dca0ceba44c1346cb754011978a70471c7e99787,2025-05-08T14:39:18.800000 -CVE-2025-29153,0,0,c3c0b9739ef9ab66c06180b9f0a901923626477365af0e4231a20f42f54e2228,2025-05-08T14:39:18.800000 +CVE-2025-29152,0,1,fd479f052bcfb4a1299809dd2b6131cbb4581a31eda78bdf1d052acd5b156665,2025-07-09T01:31:33.547000 +CVE-2025-29153,0,1,222e71623fb468f721cd8c8796380f409326f11281035b8da60aa2aacb60a5b3,2025-07-09T01:30:45.633000 CVE-2025-29154,0,0,7fdc59b1b8b3db49c174aefb6a6ba9c008546e8b1db8a06cac0366e7a5c5b909,2025-05-08T19:16:02.437000 CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 CVE-2025-2917,0,0,5e954b3dd80aa4a930dbaedde7b70b19fc8b0dc93229912d7b3d305f418d7302,2025-06-09T17:30:31.340000 @@ -291058,7 +291058,7 @@ CVE-2025-29430,0,0,9c1050f2b9fcf4b29fb9e6c2c3c05dd42d239ca5737cbb0e54747be1037b2 CVE-2025-29431,0,0,d467a56b9c5c57e54c01aff6a53ffdd59b78e3e6577e8a72af651975cfade5e5,2025-04-02T12:30:59.763000 CVE-2025-2944,0,0,cf12c6d562fae663dd5d96b3834ab18519c0f1919968332718191907a51897d5,2025-05-12T17:32:32.760000 CVE-2025-29446,0,0,582b59aa305608a9ea037f09db22736e66508636d1c6558f1fffa35c18b47ee1,2025-05-28T15:49:36.563000 -CVE-2025-29448,0,0,63c1b97baf643e40c5f31132844b3722b3f9be0a4bc061296392520e5c01d5ea,2025-05-12T19:15:49.080000 +CVE-2025-29448,0,1,0569783863d8f396b518daa7c9c0d66323365bffad49502e23497beaefe83550,2025-07-09T01:28:45.923000 CVE-2025-29449,0,0,1c63852ecef2dbc2da812fd949e8ff942bebe5c5482e7cbe6370e892fc3d3c55,2025-04-25T16:28:28.240000 CVE-2025-2945,0,0,5701c477425c2a81bc66d944f3bb97a7255b4c935bf92c67bb01910b6829ab38,2025-04-07T14:18:34.453000 CVE-2025-29450,0,0,f34a5cdc8205f33cbdf0862b5cf2a87c8d745f937abf35e2012f9e6f793825a1,2025-04-23T18:09:36.620000 @@ -291547,7 +291547,7 @@ CVE-2025-30309,0,0,9f9cf0cdd20ae1c66398c9aa3e331adc1c37648db304a8a0df1f734799450 CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000 CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2c37,2025-05-14T14:28:01.833000 CVE-2025-30312,0,0,d8970b1c2c24348ac512ef795bb871415a9b852028c471c93ceff988db0fee4b,2025-07-08T18:15:27.830000 -CVE-2025-30313,1,1,6fe792e37fa789df49a338e7f0e30726bb6c2367c67fc5969480fd4a5fd962ce,2025-07-08T22:15:24.887000 +CVE-2025-30313,0,0,6fe792e37fa789df49a338e7f0e30726bb6c2367c67fc5969480fd4a5fd962ce,2025-07-08T22:15:24.887000 CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000 CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000 CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000 @@ -294115,12 +294115,16 @@ CVE-2025-34073,0,0,226c883b954018c8810e92ceeee1f557abfffde11dfd6d9f986cfb63d0d8c CVE-2025-34074,0,0,eed98becf76180c1f49d39998e4805554fd68e19842167f162a60615e649fcd4,2025-07-03T15:13:53.147000 CVE-2025-34075,0,0,cb7b44e62b94861960671a6fc3983d86af25526a29d4ee69d70ea5689c232664,2025-07-03T15:13:53.147000 CVE-2025-34076,0,0,6ee2442dc6be9c659562f90bcf48edc7f094596109aca377d9c36e9f6d00588a,2025-07-03T15:13:53.147000 +CVE-2025-34077,1,1,cb5a6007ef8278cbbde0d6c1791589816e4902a903a40a548f3a13b93a201d5a,2025-07-09T01:15:49.780000 CVE-2025-34078,0,0,176d525ba75d756afc007946b133df490ab9b9867c970743c3aa0fb2bc315b29,2025-07-03T15:13:53.147000 CVE-2025-34079,0,0,e6d733d75639f74da638a863b1673b04916d219d5fe2f30c247d053c7c8a41ae,2025-07-03T15:13:53.147000 CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000 CVE-2025-34080,0,0,7facaa51cd8a6d5555f1a7d11ff6b11423d2fee5e31c80ebe182ad59860e92d0,2025-07-03T15:14:12.767000 CVE-2025-34081,0,0,ad8db7fe69d8caab8acca643e7b73c50072fd91c7954d3079104dc722a9fd721,2025-07-03T15:14:12.767000 CVE-2025-34082,0,0,8e7cdf26e6e4ebac24b58034c5bfe420ca7fb06d0f8699d9db6e67a339390616,2025-07-08T16:19:11.700000 +CVE-2025-34083,1,1,67fef137754b8e4d2008508507d99eb9e952f50ca60df1517ff7e137c1c0233c,2025-07-09T01:15:49.937000 +CVE-2025-34084,1,1,491d0cf6304d788f847e56732ab517af0a05e1a3a074ae7b2795cd91fc06e984,2025-07-09T01:15:50.087000 +CVE-2025-34085,1,1,26e36c636cd09db46605a275ce290cdc10c92bb17b3011ad742323fc14355971,2025-07-09T01:15:50.233000 CVE-2025-34086,0,0,0c0b3cb7a8820f327740a6c325b4e6ca41c271054ec5bc145417360830ed0c7a,2025-07-08T16:19:11.700000 CVE-2025-34087,0,0,867061decccefb09479870d1f3de9f16db98e82c914dcecfee5a20f6cf1d2aeb,2025-07-08T16:19:11.700000 CVE-2025-34088,0,0,732aa03615eba0e7d59822a19fe86e19e78666e7be244dc2f0c6a42837bd5a22,2025-07-08T16:19:11.700000 @@ -294585,6 +294589,7 @@ CVE-2025-37796,0,0,428030d0653a748175c71827ea4c9ae20b71774709349878f4ddda1cd95c0 CVE-2025-37797,0,0,04c3b81aa43ea972ff03b205158e8c85815e069e0bd94bd11b701338b4fabaf6,2025-05-05T20:54:45.973000 CVE-2025-37798,0,0,be48f42e78a97ee583b85d7dc176da94f31740373bceae27744ad0d4ea28ac30,2025-05-05T20:54:45.973000 CVE-2025-37799,0,0,85f61eb961aa875297012e886cd9399d789a2f3f7c26e5abad0e51ed67e877ff,2025-05-05T20:54:19.760000 +CVE-2025-3780,1,1,b3d2819b83a5797b460776b23e9568f06cbb870ef29c7a438edf9fcfe4aaec9f,2025-07-09T00:15:39.570000 CVE-2025-37800,0,0,1c62fed04664d2fd62584a116d919da7b92871c162cfe5585c0233f1ae44e9c6,2025-06-05T14:32:50.747000 CVE-2025-37801,0,0,ade129d73a49fd784bd7d280edecbf87e2c6cfcb6893403155c3dfa0d982045f,2025-06-05T14:32:39.940000 CVE-2025-37802,0,0,fff4a555fc9c3c58b438e5fb3ae932e0cb838e2b7e82ba27163c93c0a0c1b05a,2025-06-05T14:32:23.670000 @@ -296113,10 +296118,10 @@ CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6d CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000 CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000 CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000 -CVE-2025-43591,1,1,6830c3e0d4762c9c103fc4598fee898be639970882dd0b7f06260439773a20ac,2025-07-08T22:15:25.050000 -CVE-2025-43592,1,1,467a87e9b3d77fb41c1440a2b0fddf6ff8c9a732f7fd4c67296c7026a8b240d0,2025-07-08T22:15:25.217000 +CVE-2025-43591,0,0,6830c3e0d4762c9c103fc4598fee898be639970882dd0b7f06260439773a20ac,2025-07-08T22:15:25.050000 +CVE-2025-43592,0,0,467a87e9b3d77fb41c1440a2b0fddf6ff8c9a732f7fd4c67296c7026a8b240d0,2025-07-08T22:15:25.217000 CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000 -CVE-2025-43594,1,1,648b3f694ce768ed9e4c2e3618b18b5cc3b87284168846e836a5c621bf849db3,2025-07-08T22:15:25.397000 +CVE-2025-43594,0,0,648b3f694ce768ed9e4c2e3618b18b5cc3b87284168846e836a5c621bf849db3,2025-07-08T22:15:25.397000 CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000 CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000 CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000 @@ -296599,7 +296604,7 @@ CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9 CVE-2025-45819,0,0,c665b8750201a2fc239ff6acb7a2f60c43e76c91b36aa53da175cb91cdf72bb5,2025-06-17T19:41:54.183000 CVE-2025-45820,0,0,95a4e4eb3429b44b329ce72184a4d2ba508647a05ea4c8a36c99350258cec814,2025-06-17T19:41:43.420000 CVE-2025-4583,0,0,d033db5d8e1445724b5ad15f6035fe34ad2e9550c6dccd9e6ec8dd9370a2da58,2025-05-29T14:29:50.247000 -CVE-2025-45835,0,0,aa39dd65f685fbe279d7b03e35d1c2268d64deb3fa0d9f011aa8b0e874feb904,2025-05-12T22:15:26.343000 +CVE-2025-45835,0,1,b5a2ddd334a5a69e8e14fa66eb09ef9ca47475f518b477dcf849e79072195f44,2025-07-09T01:57:10.290000 CVE-2025-4584,0,0,31a2f5c8b766309fb45942f5a04a635c1102f6801d45e918936c861fe4a1af22,2025-07-03T17:38:28.387000 CVE-2025-45841,0,0,a1ad10acce18019e8f9e2d58501f2514612506a6c92af5fc61456a359336ccd9,2025-05-16T15:39:52.967000 CVE-2025-45842,0,0,e0887fa7ced0e29e63bdfffa8e454d99c4076790ed2b6862ad082a0b9a6b7794,2025-05-16T15:39:45.950000 @@ -297019,8 +297024,8 @@ CVE-2025-46713,0,0,52b5f47481eed81cdfa77d7fdf7e1eb397e2770a52108ac1a8158bbb54118 CVE-2025-46714,0,0,0a41c2a9ca714c22e2b0866438762cfc18c811db79b3df98db455c7fc3a6108b,2025-05-23T15:55:02.040000 CVE-2025-46715,0,0,844c01e608dd4d69f791ee79b9ba4f97a5b36ae9ddeca39e730cc6c520e1f06f,2025-05-23T15:55:02.040000 CVE-2025-46716,0,0,fe0b7300ab0eee9b5c30a2bdc4d0a682596d3fe1d9fc6f3679e986edaddf4b79,2025-05-23T15:55:02.040000 -CVE-2025-46717,0,0,ddfe80bec4f5063d8e4c0f121e84f8065768a8a31aad0eafc5cecc4516eff821,2025-05-12T22:15:26.957000 -CVE-2025-46718,0,0,885c34e4ac34f705a4ef1825ec33431373f2ba5032bb9657c9e7312381094a9b,2025-05-12T22:15:27.057000 +CVE-2025-46717,0,1,ad19574d9d9c6e7926c7a1b123efcaa09245a956cc8b1a5261938268ed3d2d3d,2025-07-09T01:51:08.943000 +CVE-2025-46718,0,1,4e74ecb99f0292463aad7f70034d5239d471278eff02184fd3c9bb0e6e5078e2,2025-07-09T01:45:32.727000 CVE-2025-46719,0,0,b25887997950d7d3ab39998b5b94bb3c024854b8ada00a78d9ecb1ca2e7fd509,2025-06-17T20:18:16.003000 CVE-2025-4672,0,0,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000 CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000 @@ -297342,12 +297347,12 @@ CVE-2025-47093,0,0,d041bb92bf35803d912e46cc3786fe6194a9f70224953010e6cfbbb689495 CVE-2025-47094,0,0,2b1e141c81f037a004986a2a6feda2400217e4605e2e7cbf768fa440e99bdb14,2025-06-16T14:47:48.470000 CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673a42,2025-06-11T00:15:27.457000 CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000 -CVE-2025-47097,1,1,a32b4216bd3ba5587e5a8fb6bc2b5ce1dc4b740ce18afbf9eefdd622686b418f,2025-07-08T23:15:23.687000 -CVE-2025-47098,1,1,e07334de3d0b5e6f86633570d8041dc6af3c394211803325d190792c71bf7349,2025-07-08T23:15:23.850000 -CVE-2025-47099,1,1,ffb43766404e7cd47c3534f5792f8695dde3e0c2a232f081041fbec936aa6e9a,2025-07-08T23:15:24.013000 +CVE-2025-47097,0,0,a32b4216bd3ba5587e5a8fb6bc2b5ce1dc4b740ce18afbf9eefdd622686b418f,2025-07-08T23:15:23.687000 +CVE-2025-47098,0,0,e07334de3d0b5e6f86633570d8041dc6af3c394211803325d190792c71bf7349,2025-07-08T23:15:23.850000 +CVE-2025-47099,0,0,ffb43766404e7cd47c3534f5792f8695dde3e0c2a232f081041fbec936aa6e9a,2025-07-08T23:15:24.013000 CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000 CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000 -CVE-2025-47103,1,1,0f958201632760b4bb1e0a74fe0514cd2c2c24ff9fae758401712bc4feb220f1,2025-07-08T22:15:25.553000 +CVE-2025-47103,0,0,0f958201632760b4bb1e0a74fe0514cd2c2c24ff9fae758401712bc4feb220f1,2025-07-08T22:15:25.553000 CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000 CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000 CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000 @@ -297363,26 +297368,26 @@ CVE-2025-47114,0,0,d163492e89575318359525e72632c9c943e0e758e06a293f69c2dae9facfa CVE-2025-47115,0,0,1bbfc8222a0849d3f615770e73bae226a0c8265c4bce8e1cd9a585d4ca4685bc,2025-06-16T14:47:31.267000 CVE-2025-47116,0,0,137a8d5062435ed03fec8e94fcca5accb2b2cd00d042dd35a0ed6a26a9dac507,2025-06-16T14:47:27.360000 CVE-2025-47117,0,0,ad3df63509d2764d93688d9d9f1a9b2e1a2a39de970d2426a955e41c43e223e3,2025-06-16T14:47:22.160000 -CVE-2025-47119,1,1,f0c8fd41e81c88d1be07c0092de74bc846c65420be78c31a437a33493dfc2c19,2025-07-08T23:15:24.173000 +CVE-2025-47119,0,0,f0c8fd41e81c88d1be07c0092de74bc846c65420be78c31a437a33493dfc2c19,2025-07-08T23:15:24.173000 CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000 -CVE-2025-47120,1,1,2867370570756813db7eb03adca268c3b4b39beb4e965ed18aa045454643cdb8,2025-07-08T23:15:24.337000 -CVE-2025-47121,1,1,95929ef04ae37891c67ec941c0f1bdc68a55462f6f04ae4c9d7480897241edef,2025-07-08T23:15:24.487000 -CVE-2025-47122,1,1,bc428eaaea677bf9f4191c6c900cfa0ec6aeca3bd6b744bdbda6b22fdaf1813b,2025-07-08T23:15:24.640000 -CVE-2025-47123,1,1,149447a8d580ca6b8001eacc5c19def615fc1b3c0e12a79544af06138d927b01,2025-07-08T23:15:24.797000 -CVE-2025-47124,1,1,2149c33e8d18c41701e1486795e64efec9f9a70061ecfc8ea77bcd7ae7ce0efe,2025-07-08T23:15:24.953000 -CVE-2025-47125,1,1,df5fd29003f5ab9e7a945de707a95a6a022032c0606e4f254098df45e3106891,2025-07-08T23:15:25.117000 -CVE-2025-47126,1,1,f6795b756fc831284dc88431ce3ead81a771ae3353bb117ba86a4d5eb30432e4,2025-07-08T23:15:25.280000 -CVE-2025-47127,1,1,b4f61c867c13bed502ebf00cc063fc2ebbd2d6f10461d4efb4ffb8602c85cad4,2025-07-08T23:15:25.443000 -CVE-2025-47128,1,1,611731a0747ad4703b5d747b06c39f1f3db635f3b11ed6538df8b7c543242e3b,2025-07-08T23:15:25.593000 -CVE-2025-47129,1,1,e277e77d0c0c2b7c545a2d102ffa357116182e6b57b9b6154b9277fc7af8805b,2025-07-08T23:15:25.757000 +CVE-2025-47120,0,0,2867370570756813db7eb03adca268c3b4b39beb4e965ed18aa045454643cdb8,2025-07-08T23:15:24.337000 +CVE-2025-47121,0,0,95929ef04ae37891c67ec941c0f1bdc68a55462f6f04ae4c9d7480897241edef,2025-07-08T23:15:24.487000 +CVE-2025-47122,0,0,bc428eaaea677bf9f4191c6c900cfa0ec6aeca3bd6b744bdbda6b22fdaf1813b,2025-07-08T23:15:24.640000 +CVE-2025-47123,0,0,149447a8d580ca6b8001eacc5c19def615fc1b3c0e12a79544af06138d927b01,2025-07-08T23:15:24.797000 +CVE-2025-47124,0,0,2149c33e8d18c41701e1486795e64efec9f9a70061ecfc8ea77bcd7ae7ce0efe,2025-07-08T23:15:24.953000 +CVE-2025-47125,0,0,df5fd29003f5ab9e7a945de707a95a6a022032c0606e4f254098df45e3106891,2025-07-08T23:15:25.117000 +CVE-2025-47126,0,0,f6795b756fc831284dc88431ce3ead81a771ae3353bb117ba86a4d5eb30432e4,2025-07-08T23:15:25.280000 +CVE-2025-47127,0,0,b4f61c867c13bed502ebf00cc063fc2ebbd2d6f10461d4efb4ffb8602c85cad4,2025-07-08T23:15:25.443000 +CVE-2025-47128,0,0,611731a0747ad4703b5d747b06c39f1f3db635f3b11ed6538df8b7c543242e3b,2025-07-08T23:15:25.593000 +CVE-2025-47129,0,0,e277e77d0c0c2b7c545a2d102ffa357116182e6b57b9b6154b9277fc7af8805b,2025-07-08T23:15:25.757000 CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000 -CVE-2025-47130,1,1,80f775b176e0eec4c95abb50abc91cde6c7e1e969f05fc7b5dedaf530f78fdc9,2025-07-08T23:15:25.910000 -CVE-2025-47131,1,1,025bd12695c59650091129dd599a7865168286a4f306798e3c71b00fea30ee17,2025-07-08T23:15:26.073000 -CVE-2025-47132,1,1,ad5b20a6a03e2421e916bacae6c502b98cf21b20c97c7f22f6ca631de66efd15,2025-07-08T23:15:26.223000 -CVE-2025-47133,1,1,960d61abfd9e907b69fe6e9fe40a3328a119e9f5e7b5ec858013b61e6b9860d0,2025-07-08T23:15:26.390000 -CVE-2025-47134,1,1,bfd73800cd1b3d75d725db349716aaa75033a2ff8f0d93841f81712003f3d4c0,2025-07-08T22:15:25.703000 +CVE-2025-47130,0,0,80f775b176e0eec4c95abb50abc91cde6c7e1e969f05fc7b5dedaf530f78fdc9,2025-07-08T23:15:25.910000 +CVE-2025-47131,0,0,025bd12695c59650091129dd599a7865168286a4f306798e3c71b00fea30ee17,2025-07-08T23:15:26.073000 +CVE-2025-47132,0,0,ad5b20a6a03e2421e916bacae6c502b98cf21b20c97c7f22f6ca631de66efd15,2025-07-08T23:15:26.223000 +CVE-2025-47133,0,0,960d61abfd9e907b69fe6e9fe40a3328a119e9f5e7b5ec858013b61e6b9860d0,2025-07-08T23:15:26.390000 +CVE-2025-47134,0,0,bfd73800cd1b3d75d725db349716aaa75033a2ff8f0d93841f81712003f3d4c0,2025-07-08T22:15:25.703000 CVE-2025-47135,0,0,108cc60d1bd33d5a8335a3fa56d5ec5ebbf28658b48fd8c4fd7062bb198c651c,2025-07-08T18:15:29.440000 -CVE-2025-47136,1,1,fd3c0672f300fcfaca803a507eed7620af44dc5f993b80653c0e8134a3dfcf86,2025-07-08T22:15:25.857000 +CVE-2025-47136,0,0,fd3c0672f300fcfaca803a507eed7620af44dc5f993b80653c0e8134a3dfcf86,2025-07-08T22:15:25.857000 CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000 CVE-2025-47149,0,0,2734c76650c27423981403171e8ba8344bf60f54ddfbffa7869e6a96d7489a05,2025-05-23T15:54:42.643000 CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a14,2025-05-27T14:11:05.693000 @@ -297737,7 +297742,7 @@ CVE-2025-47679,0,0,6602ef84847c58e4762740250b5e5076c474ae9ce6e643ba0660928bd0463 CVE-2025-4768,0,0,da23ae7a682d483d670bbafc80d7e766b08a1df2b0d2253901d5205a2051314f,2025-05-16T14:42:18.700000 CVE-2025-47680,0,0,9430ec7771e847a2100a614681d88115a87258ca31d69f7cda45d9d234f146a2,2025-05-23T15:54:42.643000 CVE-2025-47681,0,0,d1fa028feb99ae7813e0c8bfeccbcc5cc88653cd17aebda9690b3fbb83c836b5,2025-05-08T14:39:09.683000 -CVE-2025-47682,0,0,7abaeff91eaf1747f5187bfdff9289b6af01577cb5a5bc2b896515d846fc9e2a,2025-05-13T19:35:25.503000 +CVE-2025-47682,0,1,a60f0d04500f68a0b3cc33f3b184a07682a1219ec28456ebdc346e6afe8070f3,2025-07-09T01:36:27.727000 CVE-2025-47683,0,0,847489e7dabfc8450b212d5b30cd1d2f7c870a79f76804e28fa2ec6047c54b38,2025-05-08T14:39:09.683000 CVE-2025-47684,0,0,fd1a9894ee842533cac5c0d72a0af5c2fb5d7d6bbe1c3fb5518ff73450463972,2025-05-08T14:39:09.683000 CVE-2025-47685,0,0,79efcb6e063784c2d53a7630700b637df856470177283205e17aa20edc940324,2025-05-08T14:39:09.683000 @@ -298116,6 +298121,7 @@ CVE-2025-48276,0,0,0e141f1bba6aa60f05739d7c11f150d7139abee4704e3e4b24e80ad758f6c CVE-2025-48277,0,0,22dca5b7c56418f77c0bce203490c523fc4aff3e411af80d1d258902607a715a,2025-05-21T20:25:33.823000 CVE-2025-48278,0,0,fc186ead0a408b0818eff61791f9966eb55ac4b781cef1f9c2ff2b13637be2a0,2025-05-21T20:25:33.823000 CVE-2025-48279,0,0,9dc533b8d1b9260f59e768bca99b698c8c590d3512060f62b5cf97cb4049476c,2025-06-12T16:06:47.857000 +CVE-2025-4828,1,1,0905dde8280702bfc022f24248af59a52b0a08a2b695233cf936fa983ffa1361,2025-07-09T00:15:47.077000 CVE-2025-48280,0,0,50547438efb25a41870b12bbd2b12530e271613abc780fbeacb3aedf39b9e831,2025-05-21T20:25:33.823000 CVE-2025-48281,0,0,0c6d2dcd35d8f3f2edcb2581ae9b12554be8513f92d667a82b3bca8f16578a34,2025-06-12T16:06:47.857000 CVE-2025-48282,0,0,a63c42bd2eb9f1f01c9f596804aff79306d7447dc39b229a0ba899a19f281349,2025-05-21T20:25:33.823000 @@ -298245,6 +298251,7 @@ CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c769 CVE-2025-48501,0,0,5c57adc3870af6b8ef95f48e7913473030230717b94ab82a9be37e526f077c85,2025-07-08T16:18:34.923000 CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000 CVE-2025-4852,0,0,9fdc9f5e4228d0479c129fbe9c7f799e549cc0e36b5c79452a30c2f45481eb4e,2025-06-04T20:10:34.490000 +CVE-2025-4855,1,1,9cd38a997d5c3821f7a82f53dab3b03bb6fbd4aa69fd628acc52df5471baf502,2025-07-09T00:15:47.243000 CVE-2025-4857,0,0,b8cd444e0175beca8d40133df431ce226233c6568d6b88387b6a31033e9026f6,2025-06-02T17:32:17.397000 CVE-2025-4858,0,0,4d4acfd1ddd3d80c071f1db7dab6f9bace329ed4acf49c3284cbb245e6202bfe,2025-05-22T18:19:26.573000 CVE-2025-4859,0,0,7ee73dc7bc51986d834579cc9ff8417bc2588c9d45015a0c69616c74659b9b88,2025-05-22T18:17:04.033000 @@ -298767,17 +298774,17 @@ CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0d CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000 CVE-2025-49520,0,0,8baebc35523945bd35de07d42fda2554b9e130dd2f1677e6b4b5b1fa3ba7d6b1,2025-07-03T15:14:12.767000 CVE-2025-49521,0,0,2e21ab9896c671b2641a1fd6799eb79dcb95d338ad91c2250b20c876c8af9e40,2025-07-03T15:14:12.767000 -CVE-2025-49524,1,1,cf0534c507f7c5f47e05216df0397a22f256128f09d71caca35014be7037ec6d,2025-07-08T22:15:26.010000 -CVE-2025-49525,1,1,c043b565919129e48845c4164bc9fa3614b7d316f768d685dfd4ef1ea55eb1cc,2025-07-08T22:15:26.183000 -CVE-2025-49526,1,1,d9c6502c00f943f1d4ed6e7a11c47e0cdd69ba38c45e1c33442d9c9d0106560f,2025-07-08T22:15:26.340000 -CVE-2025-49527,1,1,0f96b6fe097a0e4a381adcc29941fd8e306ba564f7a3cbb4eb989c540f66e1a9,2025-07-08T22:15:26.500000 -CVE-2025-49528,1,1,c04d3258f8d6e7db1cf2d51a6a086de82dab581ba8e198e5e5036134288e141a,2025-07-08T22:15:26.657000 -CVE-2025-49529,1,1,6c9158651c8d6f73f11c9fb70b3f2c1abba0d1b38edecc4c755cccbb6d93abb6,2025-07-08T22:15:26.810000 -CVE-2025-49530,1,1,957bf34b474fba5de280895f12e0abfd24e823b5bfc9e19f5f13dd3aaede4674,2025-07-08T22:15:26.960000 -CVE-2025-49531,1,1,321058713aac28893cebf8dd55502a6ac06a3eecb9af13ea3373ffa95c1dfbdc,2025-07-08T22:15:27.113000 -CVE-2025-49532,1,1,395fe09750e5ab0de85f88a8bb0d7ddcacff97a4e91645ba5dd12d1822e76bb0,2025-07-08T22:15:27.273000 -CVE-2025-49533,1,1,23d6b9fdd252390f8881e6f53f2b7cb4ede566acad453771a83c56bc08c8bfd1,2025-07-08T22:15:27.423000 -CVE-2025-49534,1,1,88b71a5cc34e50c8fd5a55773bd40159fc244c03ace46b3b6241795308bce314,2025-07-08T22:15:27.587000 +CVE-2025-49524,0,0,cf0534c507f7c5f47e05216df0397a22f256128f09d71caca35014be7037ec6d,2025-07-08T22:15:26.010000 +CVE-2025-49525,0,0,c043b565919129e48845c4164bc9fa3614b7d316f768d685dfd4ef1ea55eb1cc,2025-07-08T22:15:26.183000 +CVE-2025-49526,0,0,d9c6502c00f943f1d4ed6e7a11c47e0cdd69ba38c45e1c33442d9c9d0106560f,2025-07-08T22:15:26.340000 +CVE-2025-49527,0,0,0f96b6fe097a0e4a381adcc29941fd8e306ba564f7a3cbb4eb989c540f66e1a9,2025-07-08T22:15:26.500000 +CVE-2025-49528,0,0,c04d3258f8d6e7db1cf2d51a6a086de82dab581ba8e198e5e5036134288e141a,2025-07-08T22:15:26.657000 +CVE-2025-49529,0,0,6c9158651c8d6f73f11c9fb70b3f2c1abba0d1b38edecc4c755cccbb6d93abb6,2025-07-08T22:15:26.810000 +CVE-2025-49530,0,0,957bf34b474fba5de280895f12e0abfd24e823b5bfc9e19f5f13dd3aaede4674,2025-07-08T22:15:26.960000 +CVE-2025-49531,0,0,321058713aac28893cebf8dd55502a6ac06a3eecb9af13ea3373ffa95c1dfbdc,2025-07-08T22:15:27.113000 +CVE-2025-49532,0,0,395fe09750e5ab0de85f88a8bb0d7ddcacff97a4e91645ba5dd12d1822e76bb0,2025-07-08T22:15:27.273000 +CVE-2025-49533,0,0,23d6b9fdd252390f8881e6f53f2b7cb4ede566acad453771a83c56bc08c8bfd1,2025-07-08T22:15:27.423000 +CVE-2025-49534,0,0,88b71a5cc34e50c8fd5a55773bd40159fc244c03ace46b3b6241795308bce314,2025-07-08T22:15:27.587000 CVE-2025-49535,0,0,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000 CVE-2025-49536,0,0,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000 CVE-2025-49537,0,0,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000 @@ -298791,7 +298798,7 @@ CVE-2025-49543,0,0,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786b CVE-2025-49544,0,0,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000 CVE-2025-49545,0,0,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000 CVE-2025-49546,0,0,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000 -CVE-2025-49547,1,1,9f057608fd5bded1b3e3d881b8d5b33b5948ad193dc915409d3273384c3360a2,2025-07-08T22:15:27.737000 +CVE-2025-49547,0,0,9f057608fd5bded1b3e3d881b8d5b33b5948ad193dc915409d3273384c3360a2,2025-07-08T22:15:27.737000 CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000 CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000 CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000 @@ -299784,7 +299791,7 @@ CVE-2025-53539,0,0,5db39fcd0a7210d0be83b7c2d14e7c8ed3f3b273c7210a57205be51f0a6b1 CVE-2025-53540,0,0,68f0d19008b8f949cf7cbae53e1f6ef67fca39bb0fc5628cd655d505d311b69c,2025-07-08T16:18:34.923000 CVE-2025-53543,0,0,da4e1b5cf6cb8007cd6dfd1396fc489f3840d88a4e59fc523fdbc4c83d5fc208,2025-07-08T16:18:34.923000 CVE-2025-53545,0,0,ef3d0455098abbefc8b277f85bd071e32e2b46fb49dca2b74733aee634f2df15,2025-07-08T16:18:14.207000 -CVE-2025-53547,1,1,0603f19d53a4e8e1ee41784cd64f1b6377de65c88b39bed5a19368f091eb7c70,2025-07-08T22:15:27.897000 +CVE-2025-53547,0,0,0603f19d53a4e8e1ee41784cd64f1b6377de65c88b39bed5a19368f091eb7c70,2025-07-08T22:15:27.897000 CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000 CVE-2025-53566,0,0,454fc69172044556d46b17e70adb6745e5c6362d217f0ee325fd72c5ff2824d8,2025-07-08T16:18:53.607000 CVE-2025-53568,0,0,ec672fa14438849d4042331d8f520ecf08d3b5cc6d344f82d58d26ad189f71b5,2025-07-08T16:18:53.607000 @@ -300714,7 +300721,7 @@ CVE-2025-6543,0,0,614be473b1a9f0b696f8665a5ce20ebb99b6c34c213be6f11e91a24c2a2ce2 CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaff8,2025-06-23T20:16:21.633000 CVE-2025-6546,0,0,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000 CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000 -CVE-2025-6550,0,1,89e239136c37d0091ac7da31fce424150e754df9694a35b76fceef47cee0376e,2025-07-08T22:15:28.053000 +CVE-2025-6550,0,0,89e239136c37d0091ac7da31fce424150e754df9694a35b76fceef47cee0376e,2025-07-08T22:15:28.053000 CVE-2025-6551,0,0,2a94174e2614ca3546b6a5e525dcaf472420d11762377d8f50c13a66a36f8364,2025-07-08T14:26:00.507000 CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000 CVE-2025-6554,0,0,890362c519a4357d98514f62cd39fc9e4bb37403cd00a1b3ef610614d19dbf03,2025-07-03T14:36:33.257000 @@ -300843,7 +300850,7 @@ CVE-2025-6752,0,0,d618339d30498ab434c65ab8e70ead8372a7351acdadb43706f579edd48b3c CVE-2025-6753,0,0,3897c99aad9d809fc80328b995708f5bc4da9d5705cbec93e88e8647b45eee72,2025-06-30T18:38:48.477000 CVE-2025-6755,0,0,2ed0f7f54c600ed4e147859a7a6dccd680b8f9e751ace8296b2fc7b8585c8e1d,2025-07-07T14:37:41.387000 CVE-2025-6756,0,0,0cfdb95abe834ccf814ebb67236819ce98902f5c812431ef066dbba054d03826,2025-07-03T15:14:12.767000 -CVE-2025-6759,1,1,fd5ad8950faaf00037797969f812bda1b912165b72aa82116a14ba1f59189b19,2025-07-08T22:15:28.213000 +CVE-2025-6759,0,0,fd5ad8950faaf00037797969f812bda1b912165b72aa82116a14ba1f59189b19,2025-07-08T22:15:28.213000 CVE-2025-6761,0,0,e4aa62f203d4ba34beb7bc7552005e1ee7d628b1642e253cda9ca26ecfa6cb7f,2025-06-30T18:38:48.477000 CVE-2025-6762,0,0,75cd4b1572c25c8bfa181120ae91b7aedff91bf82d0f669f47b2f3f4fec5cad2,2025-06-30T18:38:48.477000 CVE-2025-6763,0,0,79011f757887077a09a36e14edcb0426409f6ce627f1762247315cb51e05c1de,2025-06-30T18:38:48.477000 @@ -301138,10 +301145,14 @@ CVE-2025-7192,0,0,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee CVE-2025-7193,0,0,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000 CVE-2025-7194,0,0,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000 CVE-2025-7196,0,0,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000 -CVE-2025-7197,1,1,d7ef2bbbca6a098b30626d655580ae51f3bb02749fdfc95787b7456aca1ba445,2025-07-08T22:15:28.363000 -CVE-2025-7198,1,1,63b79c707b5bfce7c46214c79d7862e8376d7eb74cbc05a4724b43eff8a718c0,2025-07-08T22:15:28.563000 -CVE-2025-7199,1,1,b0a8250b4d336e166905e4bc2ac946445847a87b58bca02c2f72af4f009a69fd,2025-07-08T23:15:26.547000 -CVE-2025-7200,1,1,3128d4b4efd12d5fee611c128232b2629be04d055967f1d11cd5875056d136cd,2025-07-08T23:15:26.757000 +CVE-2025-7197,0,0,d7ef2bbbca6a098b30626d655580ae51f3bb02749fdfc95787b7456aca1ba445,2025-07-08T22:15:28.363000 +CVE-2025-7198,0,0,63b79c707b5bfce7c46214c79d7862e8376d7eb74cbc05a4724b43eff8a718c0,2025-07-08T22:15:28.563000 +CVE-2025-7199,0,0,b0a8250b4d336e166905e4bc2ac946445847a87b58bca02c2f72af4f009a69fd,2025-07-08T23:15:26.547000 +CVE-2025-7200,0,0,3128d4b4efd12d5fee611c128232b2629be04d055967f1d11cd5875056d136cd,2025-07-08T23:15:26.757000 +CVE-2025-7206,1,1,3ca17ff02cbcfbf4464d887bbb10d8cfa775adf269cb6b0b330fc51f6d653020,2025-07-09T00:15:47.403000 +CVE-2025-7207,1,1,6915b9fee1744d2962d1c9521b50eebd0824e683c1233cf9508260238a35c249,2025-07-09T01:15:50.380000 +CVE-2025-7208,1,1,fe45ae0a0d55cd4756a2f02bc446bcdfbdb5609d538ddc0bf13c783d1187bde9,2025-07-09T01:15:50.573000 +CVE-2025-7209,1,1,43dd99e89031e3f7af044860d9a47ac87e1766c4bfb07261d7005685e1c94222,2025-07-09T01:15:50.773000 CVE-2025-7259,0,0,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000 CVE-2025-7326,0,0,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000 CVE-2025-7327,0,0,a0fb7d73224d0b20e5509ef1c0447ce978b71b86006dd59d1e903714c73ecb3c,2025-07-08T16:18:14.207000