diff --git a/CVE-2011/CVE-2011-52xx/CVE-2011-5280.json b/CVE-2011/CVE-2011-52xx/CVE-2011-5280.json
index 102dfdb363b..c6d5cfd9651 100644
--- a/CVE-2011/CVE-2011-52xx/CVE-2011-5280.json
+++ b/CVE-2011/CVE-2011-52xx/CVE-2011-5280.json
@@ -2,7 +2,7 @@
"id": "CVE-2011-5280",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-06-02T15:55:07.807",
- "lastModified": "2025-04-12T10:46:40.837",
+ "lastModified": "2025-07-08T17:33:43.070",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
@@ -63,13 +63,13 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:6.13.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "F804F55D-D23F-4ADD-8245-C855D6C87CA2"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01464AAC-49E5-4224-9C0E-E7F7C46CD11D"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:6.13.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "F91D11C0-A1CC-430B-8FE6-490C9A1E0682"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.13.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE986A5-B8D0-460D-8172-8EA0D58060D1"
}
]
}
diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5861.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5861.json
index 80aac87d216..8ac5963f1aa 100644
--- a/CVE-2012/CVE-2012-58xx/CVE-2012-5861.json
+++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5861.json
@@ -2,13 +2,13 @@
"id": "CVE-2012-5861",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2012-11-23T12:09:58.367",
- "lastModified": "2025-04-11T00:51:21.963",
+ "lastModified": "2025-07-08T16:15:25.743",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
- "value": "Multiple SQL injection vulnerabilities on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 allow remote attackers to execute arbitrary SQL commands via (1) the inverterselect parameter in a primo action to dettagliinverter.php or (2) the lingua parameter to changelanguagesession.php."
+ "value": "These Sinapsi devices do not check the validity of the data before \nexecuting queries. By accessing the SQL table of certain pages that do \nnot require authentication within the device, attackers can leak \ninformation from the device. This could allow the attacker to compromise\n confidentiality."
},
{
"lang": "es",
@@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
+ "baseScore": 7.8,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "COMPLETE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "baseSeverity": "HIGH",
+ "exploitabilityScore": 10.0,
+ "impactScore": 6.9,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ },
{
"source": "nvd@nist.gov",
"type": "Primary",
@@ -44,7 +67,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
@@ -52,6 +75,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -114,14 +147,11 @@
"source": "ics-cert@hq.dhs.gov"
},
{
- "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-325-01.pdf",
- "source": "ics-cert@hq.dhs.gov",
- "tags": [
- "US Government Resource"
- ]
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80200",
+ "source": "ics-cert@hq.dhs.gov"
},
{
- "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80201",
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-325-01",
"source": "ics-cert@hq.dhs.gov"
},
{
diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5862.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5862.json
index 603278d3c42..fbb8db185b2 100644
--- a/CVE-2012/CVE-2012-58xx/CVE-2012-5862.json
+++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5862.json
@@ -2,13 +2,13 @@
"id": "CVE-2012-5862",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2012-11-23T12:09:58.430",
- "lastModified": "2025-04-11T00:51:21.963",
+ "lastModified": "2025-07-08T16:15:26.580",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
- "value": "login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in this script, as demonstrated by a password of astridservice or 36e44c9b64."
+ "value": "These Sinapsi devices\nstore hard-coded passwords in the PHP file of the device. By using the \nhard-coded passwords in the device, attackers can log into the device \nwith administrative privileges. This could allow the attacker to have \nunauthorized access."
},
{
"lang": "es",
@@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+ "baseScore": 10.0,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "COMPLETE",
+ "integrityImpact": "COMPLETE",
+ "availabilityImpact": "COMPLETE"
+ },
+ "baseSeverity": "HIGH",
+ "exploitabilityScore": 10.0,
+ "impactScore": 10.0,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ },
{
"source": "nvd@nist.gov",
"type": "Primary",
@@ -44,8 +67,18 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "ics-cert@hq.dhs.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-259"
+ }
+ ]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -114,14 +147,11 @@
"source": "ics-cert@hq.dhs.gov"
},
{
- "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-325-01.pdf",
- "source": "ics-cert@hq.dhs.gov",
- "tags": [
- "US Government Resource"
- ]
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80200",
+ "source": "ics-cert@hq.dhs.gov"
},
{
- "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80200",
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-325-01",
"source": "ics-cert@hq.dhs.gov"
},
{
diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5863.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5863.json
index 910085dbbb5..0d3aeaf3b65 100644
--- a/CVE-2012/CVE-2012-58xx/CVE-2012-5863.json
+++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5863.json
@@ -2,13 +2,13 @@
"id": "CVE-2012-5863",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2012-11-23T12:09:58.477",
- "lastModified": "2025-04-11T00:51:21.963",
+ "lastModified": "2025-07-08T16:15:26.747",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
- "value": "ping.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in the ip_dominio parameter."
+ "value": "These Sinapsi devices do not check for special elements in commands sent \nto the system. By accessing certain pages with administrative privileges\n that do not require authentication within the device, attackers can \nexecute arbitrary, unexpected, or dangerous commands directly onto the \noperating system."
},
{
"lang": "es",
@@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+ "baseScore": 10.0,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "COMPLETE",
+ "integrityImpact": "COMPLETE",
+ "availabilityImpact": "COMPLETE"
+ },
+ "baseSeverity": "HIGH",
+ "exploitabilityScore": 10.0,
+ "impactScore": 10.0,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ },
{
"source": "nvd@nist.gov",
"type": "Primary",
@@ -44,8 +67,18 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "ics-cert@hq.dhs.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -114,14 +147,11 @@
"source": "ics-cert@hq.dhs.gov"
},
{
- "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-325-01.pdf",
- "source": "ics-cert@hq.dhs.gov",
- "tags": [
- "US Government Resource"
- ]
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80200",
+ "source": "ics-cert@hq.dhs.gov"
},
{
- "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80202",
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-325-01",
"source": "ics-cert@hq.dhs.gov"
},
{
diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5864.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5864.json
index 0a8c4d6eb1a..f806eef469d 100644
--- a/CVE-2012/CVE-2012-58xx/CVE-2012-5864.json
+++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5864.json
@@ -2,13 +2,13 @@
"id": "CVE-2012-5864",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2012-11-23T12:09:58.540",
- "lastModified": "2025-04-11T00:51:21.963",
+ "lastModified": "2025-07-08T16:15:26.917",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
- "value": "The management web pages on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 do not require authentication, which allows remote attackers to obtain administrative access via a direct request, as demonstrated by a request to ping.php."
+ "value": "These Sinapsi devices \ndo not check if users that visit pages within the device have properly \nauthenticated. By directly visiting the pages within the device, \nattackers can gain unauthorized access with administrative privileges."
},
{
"lang": "es",
@@ -17,6 +17,29 @@
],
"metrics": {
"cvssMetricV2": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
+ "baseScore": 9.4,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "COMPLETE",
+ "integrityImpact": "COMPLETE",
+ "availabilityImpact": "NONE"
+ },
+ "baseSeverity": "HIGH",
+ "exploitabilityScore": 10.0,
+ "impactScore": 9.2,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ },
{
"source": "nvd@nist.gov",
"type": "Primary",
@@ -44,8 +67,18 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "ics-cert@hq.dhs.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -114,14 +147,11 @@
"source": "ics-cert@hq.dhs.gov"
},
{
- "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-325-01.pdf",
- "source": "ics-cert@hq.dhs.gov",
- "tags": [
- "US Government Resource"
- ]
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80200",
+ "source": "ics-cert@hq.dhs.gov"
},
{
- "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80203",
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-325-01",
"source": "ics-cert@hq.dhs.gov"
},
{
diff --git a/CVE-2013/CVE-2013-20xx/CVE-2013-2018.json b/CVE-2013/CVE-2013-20xx/CVE-2013-2018.json
index 39b000688b6..6cb4640b418 100644
--- a/CVE-2013/CVE-2013-20xx/CVE-2013-2018.json
+++ b/CVE-2013/CVE-2013-20xx/CVE-2013-2018.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-2018",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-02-20T00:15:10.520",
- "lastModified": "2024-11-21T01:50:52.380",
+ "lastModified": "2025-07-08T17:31:12.700",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:berkeley:boinc:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "9901A926-E8AD-44E7-AB44-B1A5888F9DC3"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A050C594-976D-4492-8DFA-B4BAFCDCF08A"
}
]
}
diff --git a/CVE-2013/CVE-2013-20xx/CVE-2013-2019.json b/CVE-2013/CVE-2013-20xx/CVE-2013-2019.json
index 3787031d35f..f357d6c1f44 100644
--- a/CVE-2013/CVE-2013-20xx/CVE-2013-2019.json
+++ b/CVE-2013/CVE-2013-20xx/CVE-2013-2019.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-2019",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-06-02T15:55:09.700",
- "lastModified": "2025-04-12T10:46:40.837",
+ "lastModified": "2025-07-08T17:33:43.070",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
@@ -63,13 +63,13 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:6.10.58:*:*:*:*:*:*:*",
- "matchCriteriaId": "1FFD3AD2-E8F0-44EB-98DB-30500FF24A31"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.10.58:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51305A0A-F2A8-4A87-B8A3-BFC4CA2186A8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:6.12.34:*:*:*:*:*:*:*",
- "matchCriteriaId": "B9457F54-5861-4CC5-BFA4-B419E3DC61DA"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.12.34:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50880F6C-D23E-4E75-92DD-A686841C0CC6"
}
]
}
diff --git a/CVE-2013/CVE-2013-22xx/CVE-2013-2298.json b/CVE-2013/CVE-2013-22xx/CVE-2013-2298.json
index 136c8ab188a..06a1324666f 100644
--- a/CVE-2013/CVE-2013-22xx/CVE-2013-2298.json
+++ b/CVE-2013/CVE-2013-22xx/CVE-2013-2298.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-2298",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-06-02T15:55:10.060",
- "lastModified": "2025-04-12T10:46:40.837",
+ "lastModified": "2025-07-08T17:33:43.070",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
@@ -63,798 +63,798 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "72ACEBEA-6925-4173-B047-878041A48ACB"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72D08712-08B8-4CF8-816E-0245492E6A52"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "0D5AA961-FDC4-4C29-ADDA-DC21250E7051"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0E2B388-8839-49BA-97D5-1178C190E61D"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "89E47AD7-41A4-49C5-9E6A-E510C103E194"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "81EA0FC1-DF55-4B4E-9FDB-D5B478CFB788"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "D59688F7-562E-4FBF-8295-452DAA744266"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4C1A539-41E7-48A1-8C13-50D9F8B59503"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "0B3BECE2-2C1C-4B5E-A2C2-2511BD6866CE"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97638D84-2429-4BDE-B01C-5F54A9C8BB57"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "9A0C36D6-F3F8-4D43-9DCD-56629EF66A95"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50E647A8-728B-4671-BC61-CC277C86BA4D"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "B42461B6-6CA2-4769-8D81-F877F1A0CA6C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "169FD74C-CCB4-47BF-AD8F-EEF1D108BE8A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "81047D0F-12DB-454E-ABCD-79E7B1E10074"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91AAD86A-7321-4409-A09D-32F68AFCFA9E"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "67D46435-2A28-4465-A3AC-E1BB9B164465"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3EE22BDA-185D-4BDB-A251-F2C264E443B0"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "61A950EE-1246-4139-BDFB-3922BFB22078"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7EB51A05-4432-41FF-A644-FBF2E15C02A5"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "72D80DEC-1F9B-40A3-A9C5-CE4E7E765D4E"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.11:*:*:*:*:*:*:*",
+ "matchCriteriaId": "39130CDF-67C4-4F83-8131-FA61A09D15C1"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "7A984D4C-A0BD-4247-B7B4-285898E74574"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98714E3B-3623-45F3-B110-93E338B06635"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "140D0E46-07B9-4D21-9E52-8E1C127DAA9C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.13:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31CD8873-B877-49A4-B8EB-ED600F63FE54"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.14:*:*:*:*:*:*:*",
- "matchCriteriaId": "0881C659-7FFB-4AC4-9BAC-C7C07479D9E6"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD3E307E-456F-43ED-AFFD-EB76630EF3D9"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.15:*:*:*:*:*:*:*",
- "matchCriteriaId": "2F46E6D2-72B3-4555-847B-7475D06569BA"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.15:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DE83D7BC-EAAB-4AD0-B106-05C46A14A97A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.16:*:*:*:*:*:*:*",
- "matchCriteriaId": "D2373E55-FD6A-4A6A-916B-54709AC648A0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.16:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF3FD542-1C90-4483-AD0A-07CD828F6D62"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.17:*:*:*:*:*:*:*",
- "matchCriteriaId": "64694A7C-63CF-4D74-B404-209F668B9ECD"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.17:*:*:*:*:*:*:*",
+ "matchCriteriaId": "094DC9ED-6399-48A8-8162-4DF8B592CD5F"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.18:*:*:*:*:*:*:*",
- "matchCriteriaId": "DB4B49E1-5154-414D-8B7A-F3769DE91A10"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97C2CD23-2471-436F-8F2F-C057577D8606"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.19:*:*:*:*:*:*:*",
- "matchCriteriaId": "DC49824E-B1DB-4BC9-8FAB-7B7ABFE92531"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.19:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D07FE6F-DC48-4CDC-A762-19A0F18CA927"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.20:*:*:*:*:*:*:*",
- "matchCriteriaId": "8D88C698-4B62-40A5-A787-89B991791EC0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.20:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5617F6BE-1096-44D4-850D-23A50410CAFE"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.21:*:*:*:*:*:*:*",
- "matchCriteriaId": "6D65703E-12E6-43D9-A766-5F9B1E9ACDEA"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C62D6475-A03A-4592-9728-4C86F80F55C2"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.22:*:*:*:*:*:*:*",
- "matchCriteriaId": "0D6273BF-3B1C-4CED-A489-03A168C38917"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42FEC49C-7D3A-4768-B2A9-5D684BDF02C9"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.23:*:*:*:*:*:*:*",
- "matchCriteriaId": "4FF8E5F2-4BB6-4A78-8DCF-06322EC7BB6D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.23:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CB85E0E-A47B-4F56-A5C9-50322B804077"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.24:*:*:*:*:*:*:*",
- "matchCriteriaId": "C5AA6314-12C7-4170-ADEE-913C9640E43F"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.24:*:*:*:*:*:*:*",
+ "matchCriteriaId": "963F5586-0EEA-4D08-9D0B-1477C7A18ADF"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.25:*:*:*:*:*:*:*",
- "matchCriteriaId": "0B99DC52-3666-4FC6-AE09-2C3ACA3FA0CA"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.25:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC1C1843-6DF2-44C7-96D1-2222CAAC3D90"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.26:*:*:*:*:*:*:*",
- "matchCriteriaId": "13D1242C-4D6B-4F2C-84B6-7645B58CCBC0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.26:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2E0160A9-BD01-48B3-B364-95D3CADDD325"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.27:*:*:*:*:*:*:*",
- "matchCriteriaId": "D9E167EC-AD30-474B-ACF4-552692FF0952"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.27:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A07F468-DB9D-4EF5-AA92-03198D86458C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.28:*:*:*:*:*:*:*",
- "matchCriteriaId": "138B80D2-5ECB-4785-AEC3-11ABCD810BF7"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1468E038-BBB7-438F-90A8-7AE0B2213580"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.29:*:*:*:*:*:*:*",
- "matchCriteriaId": "E30B8842-EE53-4B40-8385-DDB795594E63"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.29:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9005FAA7-44E5-48B5-A821-76DF51AA072A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.30:*:*:*:*:*:*:*",
- "matchCriteriaId": "7B6A87C6-80D4-40B8-930B-76F4307493EB"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.30:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52CE30BA-D2B5-45B9-B172-8FCC33B01875"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.31:*:*:*:*:*:*:*",
- "matchCriteriaId": "9D7F8BC8-EABB-4ACF-9C13-279F6DF98257"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.31:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13622311-0274-4320-AC0D-1DFC56ACD6C4"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.32:*:*:*:*:*:*:*",
- "matchCriteriaId": "63576B74-4C68-43CC-85F5-76F7BE46115D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.32:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E001BA5-C287-4DAF-AD75-B13614F40138"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.33:*:*:*:*:*:*:*",
- "matchCriteriaId": "EFF2BC24-CE22-4D40-960B-BDCF3E0A505D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.33:*:*:*:*:*:*:*",
+ "matchCriteriaId": "061F470B-4258-4EDA-A455-94406A5AA49A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.34:*:*:*:*:*:*:*",
- "matchCriteriaId": "D14E62A0-C955-4B78-B455-4CD1C9518941"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.34:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4144ABFA-30D6-403F-B06C-EB6FD3FA5D31"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.35:*:*:*:*:*:*:*",
- "matchCriteriaId": "34B53CF1-6D78-413E-A836-B2D69224F00E"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.35:*:*:*:*:*:*:*",
+ "matchCriteriaId": "789E9948-4BD1-49D4-8CB8-A7FC461A3499"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.36:*:*:*:*:*:*:*",
- "matchCriteriaId": "7B4778EC-9F8A-4044-9B30-EB9FE03A8146"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C83F53F-CC0C-4E8B-A370-B126136D69FF"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.45:*:*:*:*:*:*:*",
- "matchCriteriaId": "CF25A3C4-922C-4E1D-9891-7017C41D4F9C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.45:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D4B4A0-EAC5-44CD-A3B1-846CF8D24253"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.46:*:*:*:*:*:*:*",
- "matchCriteriaId": "7F41B766-B68D-48A2-B5DA-48CC9C09C41A"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.46:*:*:*:*:*:*:*",
+ "matchCriteriaId": "047B4BE2-7645-4462-94C8-75CF3D254F67"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.47:*:*:*:*:*:*:*",
- "matchCriteriaId": "5D7908B9-9438-4344-97C9-04C6F394BA6F"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.47:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AED4DBC1-C5A9-48CB-9A16-DAF82AF1C408"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.48:*:*:*:*:*:*:*",
- "matchCriteriaId": "602D58CD-50CB-4B40-A6DB-450E2B662385"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.48:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7B92EA1-E5B4-4033-B9F7-4D5DB2185D62"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.49:*:*:*:*:*:*:*",
- "matchCriteriaId": "9DE8FCAC-B809-41E2-8B74-9996E6062DF1"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.49:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C57DFB4-D4A4-4984-8F09-B3C42F4F6AD2"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.50:*:*:*:*:*:*:*",
- "matchCriteriaId": "370D0086-696C-4596-BE7D-FE92C317E80D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.50:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09D4354C-67BA-4528-BB36-A6DCA387C215"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.51:*:*:*:*:*:*:*",
- "matchCriteriaId": "4AA2091B-280A-4E44-95E9-7B37BB0AF7F3"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.51:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2ECDD36-F19B-4F4B-A989-73C28B25FBD8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.52:*:*:*:*:*:*:*",
- "matchCriteriaId": "F944478F-7CD0-4E4C-8C69-32866F87204A"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.52:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F28D4C39-F6EB-4FB0-B778-463DB06C6B16"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.53:*:*:*:*:*:*:*",
- "matchCriteriaId": "E7112391-86B3-477A-A3AF-0C74946505DB"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.53:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7731646-7388-4CCE-8922-FC23970B7612"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.54:*:*:*:*:*:*:*",
- "matchCriteriaId": "5FE7250C-FFAD-4642-BBF9-0EA6206C7CEC"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.54:*:*:*:*:*:*:*",
+ "matchCriteriaId": "463EEF45-F3D9-4C84-8732-F2AB09A3F4AB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.55:*:*:*:*:*:*:*",
- "matchCriteriaId": "3619BD70-F218-4922-BDC2-7FFFA628E1CC"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.55:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DAC243F-9275-48A6-B3F7-C680BCC9BFC0"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.56:*:*:*:*:*:*:*",
- "matchCriteriaId": "209FEA5E-DE6C-447E-B9A9-018AEB6235E0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.56:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E20BE840-BCA7-41FA-BF6D-6B5ED81709C8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.57:*:*:*:*:*:*:*",
- "matchCriteriaId": "E9585996-25A2-461B-8BF0-7A2A88D6817C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.57:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4701F032-AE35-4316-AAFF-D95FE8B54FCD"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.58:*:*:*:*:*:*:*",
- "matchCriteriaId": "24B60685-83A4-4351-810B-FFFD4D6E5166"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.58:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0297F2F-9634-4281-969A-347F700F2C23"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.59:*:*:*:*:*:*:*",
- "matchCriteriaId": "17E948F3-8FE0-4FD3-B850-A46C3AC93BD0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.59:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6D61390-9B3A-48A0-9370-5DDBB3506FEA"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.60:*:*:*:*:*:*:*",
- "matchCriteriaId": "60B76029-DF53-440A-A748-9296E607DF67"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.60:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9EC494F-3064-4B5B-AD0B-CC5D60EC3EA6"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.61:*:*:*:*:*:*:*",
- "matchCriteriaId": "767D20D9-3B38-432F-8457-1EE9830D734E"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.61:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C5036D79-54AE-41F5-A6C4-9E1375CE838A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.62:*:*:*:*:*:*:*",
- "matchCriteriaId": "09E712BD-E76A-4CAD-9FAD-1C389FDC8503"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.62:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2017E6D-8600-4699-89B3-97252B21581A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.63:*:*:*:*:*:*:*",
- "matchCriteriaId": "1FBD4606-2C99-4D75-ABA1-F2FAE01CD544"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.63:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A05D1BE7-2F16-44AE-B6D4-388764B9D3AB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.64:*:*:*:*:*:*:*",
- "matchCriteriaId": "C5C70612-0C84-4AFA-8544-4711CD97B141"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7057951-2340-4A56-8A15-8A9BC65F630A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.65:*:*:*:*:*:*:*",
- "matchCriteriaId": "A1AC4926-93DD-4C88-B1CA-0B04F55A2C0D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.65:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20A663AA-80B6-40A1-ABA1-5A969F036425"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.66:*:*:*:*:*:*:*",
- "matchCriteriaId": "AA40F7E2-AD20-4BCF-B681-104054B43F90"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.66:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EC0811F-3232-421C-ACF9-835D9B3B4EFB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.67:*:*:*:*:*:*:*",
- "matchCriteriaId": "80977C6B-37B8-424F-8BA2-B71BF8C982C8"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.67:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C1801E1-7DDD-40BD-B9F5-E98AC3B1E2D0"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.68:*:*:*:*:*:*:*",
- "matchCriteriaId": "912374B0-0025-4CAD-A027-7E56B5B547EE"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.68:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE4896AF-86D9-4475-B80D-B2F6080873CB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.69:*:*:*:*:*:*:*",
- "matchCriteriaId": "A49C5556-093E-4AA8-B457-B9D85C121A96"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.69:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57033EA4-7921-4DC5-A6CF-736A81123F85"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.70:*:*:*:*:*:*:*",
- "matchCriteriaId": "D9C66032-1F1F-4870-AE4F-8A739065D512"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.70:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2373784B-C25C-4EB4-A19B-EDC870EE40EF"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.71:*:*:*:*:*:*:*",
- "matchCriteriaId": "EA29DAE6-041B-411D-B568-DD7475990EC2"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.71:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2801EBD2-26E5-40D8-99F6-D38AC629A925"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.72:*:*:*:*:*:*:*",
- "matchCriteriaId": "CDA3BB23-58D5-445E-9C43-38C82ED93EF6"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.72:*:*:*:*:*:*:*",
+ "matchCriteriaId": "858694D8-1B83-4072-803D-1A6E0C3C7D76"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.73:*:*:*:*:*:*:*",
- "matchCriteriaId": "ACF84144-B360-4020-858C-0CED5AF433DA"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.73:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A13E07B1-2FB7-4CE8-81F4-B66EEC9624C3"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.74:*:*:*:*:*:*:*",
- "matchCriteriaId": "42130B2A-6D98-469D-9997-F0C2934D7561"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.74:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BDA95B4-6876-4580-8D30-BC1F61259F6A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.75:*:*:*:*:*:*:*",
- "matchCriteriaId": "F6805C67-9E48-4819-B272-8554E7016F90"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.75:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76C85ABB-4EA4-4E88-A836-33B738DAAB5D"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.76:*:*:*:*:*:*:*",
- "matchCriteriaId": "4BB3ADC6-DF44-4275-9CD6-D7418337E80B"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.76:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B2FA70D-C9D8-46F9-ABE8-9227DFEEE082"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.77:*:*:*:*:*:*:*",
- "matchCriteriaId": "AFE0ED05-2135-451E-92AA-2C6CA542D7A1"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.77:*:*:*:*:*:*:*",
+ "matchCriteriaId": "701DD561-65EB-406E-A741-2EE9690EA706"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.78:*:*:*:*:*:*:*",
- "matchCriteriaId": "9659C33C-52C1-4216-BB4F-598F7F124E39"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.78:*:*:*:*:*:*:*",
+ "matchCriteriaId": "404C970E-CD43-4E9B-B4D1-F8FB00ED3CFB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.79:*:*:*:*:*:*:*",
- "matchCriteriaId": "207B90FE-B98F-4433-A1CC-173C155161DD"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.79:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDA61FA5-AA09-459E-9366-2A27A97FE01B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.0.80:*:*:*:*:*:*:*",
- "matchCriteriaId": "5482021D-0416-469D-BC3A-BA41556BFAD0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.80:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C70BA88-12A0-4278-A4B5-9A97F11CAC1B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "9B85A097-9C15-44CC-B25D-569972E1BEE8"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA43F1C8-4F6C-4B98-B17B-B719877D152A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "9DAC38ED-A406-43FE-AB06-28F5A48E11D8"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CD7A49C-F4A0-4184-9989-A881F04C5CF8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "AD84C70D-3648-43FD-9465-33CE1DABE941"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8EE56322-9565-4816-9667-10BD07CC67AB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "67909D1B-B250-4436-8C79-AEC2BAC0F940"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70EBAE6D-3431-4E12-9B5D-C7CE4F1BA20E"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "779E2426-2D32-43D0-BEA7-3AE3EBAB5212"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC2961E7-7240-4E82-9EAB-7179844BED1B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "3556F5DB-10B7-4D31-B9BF-96AB2FBA484C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96D50DC2-1B61-4B97-AC74-93A568BFC40B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "5BCE0D8E-C919-40DD-B2C6-7AFDE896B87C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "778D492F-1930-43EB-8D00-8B6709B66F24"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "D0A10187-5BD4-4C6B-A6E6-7BD77C627DDD"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "415EB17A-2F00-42A3-AD38-2D7FF7B61B1C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "21A9F254-6216-4E22-A4C5-D0AB3246F011"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9AA58FE4-4459-4C54-B752-7443804933F5"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "17BD791C-F639-439B-89FC-4AAE751BCE57"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63CF77D9-78C4-4B4A-B4EA-1D058E8EE3C8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "A23E765F-CDD5-4693-B1E4-1398E761FA19"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C591FDF8-285B-4619-805A-1EBC14E6A12C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "802DEFD8-7481-4876-9FFD-DAB6FE2D5B06"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.11:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89762343-F054-4405-9B10-9D7D4D5B2E00"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "53431CE8-D83F-4D8F-84E2-864F89221BB5"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F5A6216-637A-4079-8ADD-A280CDEE93B5"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "443A8DDB-9EF6-4C83-B3ED-B49427CF0321"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.13:*:*:*:*:*:*:*",
+ "matchCriteriaId": "270C3996-8DE7-4C5B-B9F6-ACADAA8E29B9"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.14:*:*:*:*:*:*:*",
- "matchCriteriaId": "063D6A7B-0CE8-4D1B-A045-0473CE18433C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43BC1ACB-D2C2-432D-94D0-508F167E9D9A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.15:*:*:*:*:*:*:*",
- "matchCriteriaId": "F21FB80C-A633-4751-8E40-5CE9DF473E6B"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.15:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9D8EAFF-8A32-452D-B6E4-B616632939A3"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.16:*:*:*:*:*:*:*",
- "matchCriteriaId": "A0ADC25E-5152-41C6-A051-13321F8B3D79"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.16:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC0D71F1-14FD-48E4-8080-86B5BD06E30B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.17:*:*:*:*:*:*:*",
- "matchCriteriaId": "B76F75A6-B4E5-487C-AD1C-EE1C2A5D9A34"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.17:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3444FEE8-52CD-40B7-AB35-5281DDFB85DB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.18:*:*:*:*:*:*:*",
- "matchCriteriaId": "620E18DA-D700-46E4-A773-CA04AB6B1DD4"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6BE5B33-9C19-4255-B5EF-419999BE7633"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.19:*:*:*:*:*:*:*",
- "matchCriteriaId": "F41D2837-A432-4157-8648-363AC8CCD6E3"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.19:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC7F0EFA-ECA4-41C2-8CA7-8CE4676DCC8F"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.20:*:*:*:*:*:*:*",
- "matchCriteriaId": "E8F0D3F7-9302-47E5-99EC-B070656576BA"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.20:*:*:*:*:*:*:*",
+ "matchCriteriaId": "887664ED-6C06-4062-8E6D-2549F358350E"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.1.21:*:*:*:*:*:*:*",
- "matchCriteriaId": "31B97AD7-F85D-472C-9498-E9157CBD3B1E"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "080DABAF-9700-43CA-8D5E-AE8FFF11BBF0"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "577ABFCC-758B-49F9-A0DB-1FE0F76A7989"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D7EB90FB-D2D7-45B1-9A0D-FF9FA054889C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "848AD8FC-FCDF-4C66-A9C7-FC481D3C729F"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B815A1C2-9D23-485D-8687-4725E56E70D2"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "25FFC730-3B84-4E94-B8F9-CACDAC95635D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "830A4FE0-B923-4B00-8B03-93AB0C703F47"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "6E79D5E2-D55F-489C-B598-7BF3AB9B8B69"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CA1FF50-0858-451E-A301-22AD6E048328"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "B3ED76AD-CBF7-4F73-814B-F04A222F2F80"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96E523E1-A0AF-493A-B0A2-1107F1EEEB9B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "A7A269FE-A881-449E-BB75-C4DE339D4343"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2CB1BDF-5AEE-4E8F-95DD-8DAC18731691"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "35FA4F51-3C17-4B0D-A63D-383CD1D0D2B1"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9320EBA-E9DC-4954-ADAC-6F91A2E47525"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "E669EBFC-1D60-421A-B77C-170100612561"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17FE08E4-5304-4853-8685-63DBFCCA0BCA"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "31B66474-125D-4FD0-AE34-7E96DF75C8D0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66B5A49B-BBE2-402A-B7F4-7081116F4A82"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "513ACA92-FE56-427B-8AC0-E449D9FD17CE"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB443A80-98A3-4BF9-AB40-075F263150B4"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "8B8C3648-FF7E-415B-97B6-FA3BA767BDA9"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A33F67E-9BE2-43C2-976D-BF0600AADB27"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "B635B29A-FAEC-4268-BE04-3C5839F71F91"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.11:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C66739A-7265-4B19-AF9D-CAF6BE87616A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "403063CB-3898-406B-9F2C-9F572AA2BAFB"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C297FBED-C532-42BE-871B-C37CA35A2DB8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "25C422A5-C1F7-464E-9E85-D0051CB3CBA8"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.13:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B53C8AD-C4A8-4ED2-A493-88A7844387AC"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.14:*:*:*:*:*:*:*",
- "matchCriteriaId": "FE35D28C-50BB-4121-9C78-CFC8088092E2"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB97852C-EADD-4625-9B42-47102496306A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.15:*:*:*:*:*:*:*",
- "matchCriteriaId": "8DFD055F-1E3A-40B1-80EB-2CB6F43CE049"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.15:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5193A320-35F4-47AD-A959-8F401CCCC35E"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.16:*:*:*:*:*:*:*",
- "matchCriteriaId": "AB3439D5-D99B-4889-BE78-3BEC9A3A099F"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.16:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7587D83-5720-40A0-BF93-B83961D557A7"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.17:*:*:*:*:*:*:*",
- "matchCriteriaId": "792223F5-83BC-44C8-8999-04319AA1D721"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.17:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72F63A3B-E311-4254-9F12-79F958CF87A0"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.18:*:*:*:*:*:*:*",
- "matchCriteriaId": "6222D625-3FD3-406F-B1A6-D04A3C8A2A87"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F7CFA3B-2023-4D3E-A588-7139215B3C14"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.19:*:*:*:*:*:*:*",
- "matchCriteriaId": "6156A63D-0772-46D7-BB55-B32FA7F8DBA3"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.19:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98CFC8AC-E81F-48A8-A0D2-D69EC7FE68FC"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.20:*:*:*:*:*:*:*",
- "matchCriteriaId": "66808B2C-B462-4EF7-8AED-1F247F5ADD53"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.20:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C5B346F-4424-43C1-94C0-002E753564AF"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.21:*:*:*:*:*:*:*",
- "matchCriteriaId": "11918A25-3C76-4DDF-B80D-A7018B98FD23"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "880AF08E-1B23-4ED7-B423-285931F3EA60"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.22:*:*:*:*:*:*:*",
- "matchCriteriaId": "69946976-F500-4B83-9CF5-86E43C791F53"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A61BFF20-32F1-4AB0-8530-6FBE3A281EA0"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.23:*:*:*:*:*:*:*",
- "matchCriteriaId": "A5F89585-C33D-4885-B9A8-DA8B987C4530"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.23:*:*:*:*:*:*:*",
+ "matchCriteriaId": "623D9C4C-0363-42DF-86C4-B08363FDC66E"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.24:*:*:*:*:*:*:*",
- "matchCriteriaId": "480CFA6F-E914-43FC-B316-88A6E37DE4E9"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.24:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50661394-6F1C-4BAE-9C9B-2A942D00A4C4"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.25:*:*:*:*:*:*:*",
- "matchCriteriaId": "FB4C795E-E591-424F-A704-B26252B64CDE"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.25:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8518678E-AB01-40D6-912C-C04353CB89A7"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.26:*:*:*:*:*:*:*",
- "matchCriteriaId": "24219046-0BC7-4FF5-9B36-3FD26BB8C6B7"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.26:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3EE8C03-C5C2-4DBF-8255-B4F0731163B2"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.27:*:*:*:*:*:*:*",
- "matchCriteriaId": "D1C0AB25-35AC-4C06-B1E0-EE12FAB2AF9B"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.27:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC9D27FB-D232-45E4-AB38-77AC5DC8A4AF"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.28:*:*:*:*:*:*:*",
- "matchCriteriaId": "1E4AA793-EEA1-4974-BB22-2D3B8703AD8D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD2057F8-052F-4617-A22F-374D0FBD0B76"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.29:*:*:*:*:*:*:*",
- "matchCriteriaId": "02BD8922-169D-4A5F-9898-42824182CABF"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.29:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7D54458-49FD-41F1-8EAF-8A8E65844967"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.31:*:*:*:*:*:*:*",
- "matchCriteriaId": "8191E179-24F0-41F6-8F06-84AEC9121E15"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.31:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB21B9F-0C5B-4282-A937-3B1E60E4E712"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.32:*:*:*:*:*:*:*",
- "matchCriteriaId": "76CDBFE0-58C3-4EFE-B21A-916CBF94EEA0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.32:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04CC438E-C05B-4C91-99A0-EA800CEF5915"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.33:*:*:*:*:*:*:*",
- "matchCriteriaId": "5B76EAC5-808A-4CDA-A495-A3EFA0BD8379"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.33:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DC297C0-068D-4168-AA30-30475C89BC33"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.34:*:*:*:*:*:*:*",
- "matchCriteriaId": "4BBD63C5-02F4-4B4F-ABAF-C053D66C246E"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.34:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBCAEEA3-F7A9-4C8D-93D0-C42525ED8BE5"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.35:*:*:*:*:*:*:*",
- "matchCriteriaId": "48ED4917-E050-4A7D-8FE7-F4E8F327EB31"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.35:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1A69D2C-1FAD-4957-9207-034179B9D193"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.36:*:*:*:*:*:*:*",
- "matchCriteriaId": "C0FB0FEA-A8B4-4739-B2BA-53810281E4CC"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2A1E302-1B6D-4B56-A81F-467447E3CB11"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.37:*:*:*:*:*:*:*",
- "matchCriteriaId": "DF1EF0A9-0BF9-44F7-A877-207F6D6BBC08"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B2F3F21-55F8-4BE4-89BF-2B0F015B8C1E"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.38:*:*:*:*:*:*:*",
- "matchCriteriaId": "F76E4E67-55D9-4855-B184-EB1E2123E775"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6462918C-3D6F-4974-B113-3C9652C90B7F"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.39:*:*:*:*:*:*:*",
- "matchCriteriaId": "F6783990-3D01-4971-B21F-5B0648511289"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A22F41F5-2CFD-404B-9D35-43DCC29C8C2A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.40:*:*:*:*:*:*:*",
- "matchCriteriaId": "8429ADC1-2E7C-4BFE-9057-172552783A6D"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.40:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F61206A-340B-4CA1-A3CE-330DF31AF4B3"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.41:*:*:*:*:*:*:*",
- "matchCriteriaId": "146D7383-5F7F-4B4E-B420-EDA6502F7006"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.41:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C984AFFC-5D04-4995-8D8A-DA75F64DEECA"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.42:*:*:*:*:*:*:*",
- "matchCriteriaId": "542C864B-EC3A-48B9-B951-7754CB0E3A8E"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.42:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96C7B30A-3929-490C-83F7-39AB8CA36B45"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.43:*:*:*:*:*:*:*",
- "matchCriteriaId": "6956136B-D872-44E0-A4C0-2B4DC72DA773"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.43:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E2D613F-75BB-4951-9857-F5CE21EF97B8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.44:*:*:*:*:*:*:*",
- "matchCriteriaId": "977D4752-3F0E-449C-B0CE-3E5520DBF5DC"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.44:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EF2B954-E0BD-4D97-BC91-91A5FECFA687"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.47:*:*:*:*:*:*:*",
- "matchCriteriaId": "83D62B93-104D-4A3C-AD1F-29BF8E62B8B5"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.47:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA3D9A90-8AB6-45DD-9588-668C74D06AE2"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "4876F94C-8F5A-4CD6-875A-37EA0FD0CA53"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B1ED66C-FDEB-4474-AE38-B71DA8B1B0E6"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "EBDC577F-6626-4C0F-BD1F-E50FF609DD3C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94FA574F-F522-4EA0-AAA7-EADFA7DA958B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "61878C52-3CF6-4F19-A857-339A8F118F8F"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1452A45-D40D-46A7-A6F8-5871B0B108B7"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "15647404-62C1-446A-A02E-927AFBCFEB65"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "738ECB72-6F01-408A-B3B8-2743673EF9C1"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "E4E394F7-A7A8-4074-94BC-0C6B59C0D5F8"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8130E38D-0450-4531-99C0-00B7B5538287"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "7B8432E8-3E4D-4EE1-A4DE-9F7BFDA66609"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "645823B6-4412-4079-888D-F07872074E12"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "B5342D4B-A273-4A9D-AECE-BE979259B697"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2FBD866-B8B3-4257-99B7-1F0834AE44B3"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "6735152C-E6EC-43A6-B098-E6630CE1FF9C"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5144BB6C-C9F3-4E67-8823-ED53D80FCC9A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "8164F373-43E4-4C14-8F06-6B30A36EA1C0"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "30A53F8F-CDC5-4938-B4F3-C7FD9A53E5FB"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "617C67A7-7C92-4319-9A78-B369955662A8"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FD41F1D-E95C-4CC3-ACB6-827CD1D698A1"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "5D9AE796-9BF2-43AF-B739-8F7E3D2E22B9"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C0DF10E-527E-460C-88C6-67C1BC674F37"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "2959AC27-7CBF-4012-9597-153A6624BB2F"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.11:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD8066AC-1A95-4E43-B55D-0A8B0D3EB911"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "0B460AD6-A743-4CB7-949F-92620765B281"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84DB7AD3-E414-42ED-BED2-770C98032A7B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "C45D0E98-A710-4012-98F2-F470BA1FC806"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.13:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0A3D6EF-9D3B-4FAA-9A40-4C42F01A42C5"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.14:*:*:*:*:*:*:*",
- "matchCriteriaId": "933E73A4-AA4D-4ED4-A011-DB8491174537"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BC84068-0120-4E22-AC14-6F629B5FC197"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.15:*:*:*:*:*:*:*",
- "matchCriteriaId": "E8238873-DF64-4761-B33E-62BA0173641F"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.15:*:*:*:*:*:*:*",
+ "matchCriteriaId": "555AE9E7-67E2-4F17-BACE-FB3B4E5BAE2F"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.16:*:*:*:*:*:*:*",
- "matchCriteriaId": "A8BC4B55-9D10-4EEC-896E-1F6A5C4FB6BB"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.16:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A05D64FE-DEA1-4C58-A435-82B4622452F8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.17:*:*:*:*:*:*:*",
- "matchCriteriaId": "B8744D28-F0FD-4FD3-9819-0363BA5E6085"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.17:*:*:*:*:*:*:*",
+ "matchCriteriaId": "862E53E4-5EC4-400E-914C-0DC5E4B0FC83"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.18:*:*:*:*:*:*:*",
- "matchCriteriaId": "23610E3A-BE86-4832-8A54-F39073B9DFED"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99651D27-8491-497C-99AC-F36B9085EE80"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.3.19:*:*:*:*:*:*:*",
- "matchCriteriaId": "C6A06AAC-9C73-4098-9B41-8C81D0305412"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.19:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B45F107D-2ED6-4E15-A44C-59D26079FE1A"
}
]
}
diff --git a/CVE-2013/CVE-2013-73xx/CVE-2013-7386.json b/CVE-2013/CVE-2013-73xx/CVE-2013-7386.json
index 2b7e63075ad..1f4d11db60a 100644
--- a/CVE-2013/CVE-2013-73xx/CVE-2013-7386.json
+++ b/CVE-2013/CVE-2013-73xx/CVE-2013-7386.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-7386",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-06-02T15:55:11.060",
- "lastModified": "2025-04-12T10:46:40.837",
+ "lastModified": "2025-07-08T17:26:58.807",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
@@ -63,8 +63,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:rom_walton:boinc:7.2.33:*:*:*:*:*:*:*",
- "matchCriteriaId": "5B76EAC5-808A-4CDA-A495-A3EFA0BD8379"
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.33:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DC297C0-068D-4168-AA30-30475C89BC33"
}
]
}
diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42101.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42101.json
index 92dfab9adfb..c00cb90a780 100644
--- a/CVE-2023/CVE-2023-421xx/CVE-2023-42101.json
+++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42101.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42101",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:47.643",
- "lastModified": "2024-11-21T08:22:16.603",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:09:30.893",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ashlar:cobalt:1204.61:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E29B6E8-193C-4BF9-89F0-5B6C31D61E54"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1450/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1450/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42102.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42102.json
index 60b35b6db39..dc8a33315b3 100644
--- a/CVE-2023/CVE-2023-421xx/CVE-2023-42102.json
+++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42102.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42102",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:47.810",
- "lastModified": "2024-11-21T08:22:16.730",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:09:41.143",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ashlar:cobalt:1204.61:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E29B6E8-193C-4BF9-89F0-5B6C31D61E54"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1451/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1451/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42103.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42103.json
index 840287ccfe9..b919a716833 100644
--- a/CVE-2023/CVE-2023-421xx/CVE-2023-42103.json
+++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42103.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42103",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:47.983",
- "lastModified": "2024-11-21T08:22:16.850",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:09:56.370",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ashlar:cobalt:1204.62:*:*:*:*:*:*:*",
+ "matchCriteriaId": "679E0CCA-2CD7-49AC-AF27-A290401F0FB5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1452/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1452/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42104.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42104.json
index ea814c42fcd..b88add10c69 100644
--- a/CVE-2023/CVE-2023-421xx/CVE-2023-42104.json
+++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42104.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42104",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:48.163",
- "lastModified": "2024-11-21T08:22:16.970",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:10:03.773",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ashlar:cobalt:1204.61:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E29B6E8-193C-4BF9-89F0-5B6C31D61E54"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1453/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1453/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42105.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42105.json
index 3e5365322b5..81eee1c1d37 100644
--- a/CVE-2023/CVE-2023-421xx/CVE-2023-42105.json
+++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42105.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42105",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:48.333",
- "lastModified": "2024-11-21T08:22:17.100",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:14:38.037",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@@ -51,14 +73,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ashlar:cobalt:1204.61:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E29B6E8-193C-4BF9-89F0-5B6C31D61E54"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1454/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1454/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44431.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44431.json
index 06abd3d9b61..f217aa88282 100644
--- a/CVE-2023/CVE-2023-444xx/CVE-2023-44431.json
+++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44431.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44431",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:57.980",
- "lastModified": "2024-11-21T08:25:53.367",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:17:35.780",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@@ -51,14 +73,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C2EBB50-D125-411C-84DB-4E5EFEDCFA6B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1900/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1900/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50229.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50229.json
index fab57e7bd1c..cecef67b1fd 100644
--- a/CVE-2023/CVE-2023-502xx/CVE-2023-50229.json
+++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50229.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-50229",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:11.680",
- "lastModified": "2024-11-21T08:36:42.623",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:28:15.657",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@@ -51,22 +73,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.66",
+ "versionEndExcluding": "5.70",
+ "matchCriteriaId": "C96CCF8B-7E76-4B4B-BAE5-535D88AC1956"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1811/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1811/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50230.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50230.json
index d17c126ac15..a92fa2678b2 100644
--- a/CVE-2023/CVE-2023-502xx/CVE-2023-50230.json
+++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50230.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-50230",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:11.853",
- "lastModified": "2024-11-21T08:36:42.750",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:28:02.977",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@@ -51,22 +73,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.66",
+ "versionEndExcluding": "5.70",
+ "matchCriteriaId": "C96CCF8B-7E76-4B4B-BAE5-535D88AC1956"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1812/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/bluez/bluez/commit/5ab5352531a9cc7058cce569607f3a6831464443",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1812/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50786.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50786.json
index a49e501f182..436e0f9be1e 100644
--- a/CVE-2023/CVE-2023-507xx/CVE-2023-50786.json
+++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50786.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-50786",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T04:15:24.373",
- "lastModified": "2025-07-07T19:15:22.473",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json
index 00f72668668..1b937d7e80f 100644
--- a/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json
+++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51232.json
@@ -2,13 +2,17 @@
"id": "CVE-2023-51232",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T14:15:23.140",
- "lastModified": "2025-07-07T16:15:21.693",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in dagster-webserver Dagster thru 1.5.11 allows remote attackers to obtain sensitive information via crafted request to the /logs endpoint. This may be restricted to certain file names that start with a dot ('.')."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Directory Traversal en dagster-webserver Dagster thru 1.5.11 que permite a atacantes remotos obtener informaci\u00f3n confidencial mediante una solicitud manipulada al endpoint /logs. Esto puede estar restringido a ciertos nombres de archivo que empiezan con un punto ('.')."
}
],
"metrics": {},
diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51589.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51589.json
index d922527cf8c..421126a1600 100644
--- a/CVE-2023/CVE-2023-515xx/CVE-2023-51589.json
+++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51589.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-51589",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:19.230",
- "lastModified": "2024-11-21T08:38:26.553",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:27:54.023",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 5.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@@ -51,14 +73,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C2EBB50-D125-411C-84DB-4E5EFEDCFA6B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1904/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1904/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51592.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51592.json
index 32f4cf558dd..6a5759632fd 100644
--- a/CVE-2023/CVE-2023-515xx/CVE-2023-51592.json
+++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51592.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-51592",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:19.747",
- "lastModified": "2024-11-21T08:38:26.907",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:27:47.370",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 5.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@@ -51,14 +73,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C2EBB50-D125-411C-84DB-4E5EFEDCFA6B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1905/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1905/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51594.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51594.json
index fb7107cb6a6..9b7465af29f 100644
--- a/CVE-2023/CVE-2023-515xx/CVE-2023-51594.json
+++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51594.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-51594",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:20.123",
- "lastModified": "2024-11-21T08:38:27.157",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:27:33.363",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 5.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@@ -51,14 +73,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C2EBB50-D125-411C-84DB-4E5EFEDCFA6B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1901/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1901/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51596.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51596.json
index cd7b8692a93..738e5e14c7a 100644
--- a/CVE-2023/CVE-2023-515xx/CVE-2023-51596.json
+++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51596.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-51596",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:20.460",
- "lastModified": "2024-11-21T08:38:27.397",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:27:02.940",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C2EBB50-D125-411C-84DB-4E5EFEDCFA6B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1902/",
- "source": "zdi-disclosures@trendmicro.com"
+ "source": "zdi-disclosures@trendmicro.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1902/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52236.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52236.json
index 938e6790fc4..97c881ecadc 100644
--- a/CVE-2023/CVE-2023-522xx/CVE-2023-52236.json
+++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52236.json
@@ -2,13 +2,17 @@
"id": "CVE-2023-52236",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:23.750",
- "lastModified": "2025-07-08T11:15:23.750",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected products support insecure cryptographic algorithms. An attacker could leverage these legacy algorithms to achieve a man-in-the-middle attack or impersonate communicating parties."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en RUGGEDCOM i800 (Todas las versiones), RUGGEDCOM i801 (Todas las versiones), RUGGEDCOM i802 (Todas las versiones), RUGGEDCOM i803 (Todas las versiones), RUGGEDCOM M2100 (Todas las versiones), RUGGEDCOM M2200 (Todas las versiones), RUGGEDCOM M969 (Todas las versiones), RUGGEDCOM RMC30 (Todas las versiones), RUGGEDCOM RMC8388 V4.X (Todas las versiones), RUGGEDCOM RMC8388 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RP110 (Todas las versiones), RUGGEDCOM RS1600 (Todas las versiones), RUGGEDCOM RS1600F (Todas las versiones), RUGGEDCOM RS1600T (Todas las versiones), RUGGEDCOM RS400 (Todas las versiones), RUGGEDCOM RS401 (Todas las versiones), RUGGEDCOM RS416 (Todas las versiones), RUGGEDCOM RS416P (Todas las versiones), RUGGEDCOM RS416Pv2 V4.X (Todas las versiones), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS416v2 V4.X (Todas las versiones), RUGGEDCOM RS416v2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS8000 (Todas las versiones), RUGGEDCOM RS8000A (Todas las versiones), RUGGEDCOM RS8000H (Todas las versiones), RUGGEDCOM RS8000T (Todas las versiones), RUGGEDCOM RS900 (Todas las versiones), RUGGEDCOM RS900 (32M) V4.X (Todas las versiones), RUGGEDCOM RS900 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900G (Todas las versiones), RUGGEDCOM RS900G (32M) V4.X (Todas las versiones), RUGGEDCOM RS900G (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900GP (Todas las versiones), RUGGEDCOM RS900L (Todas las versiones), RUGGEDCOM RS900M-GETS-C01 (Todas las versiones), RUGGEDCOM RS900M-GETS-XX (Todas las versiones), RUGGEDCOM RS900M-STND-C01 (Todas las versiones), RUGGEDCOM RS900M-STND-XX (Todas las versiones), RUGGEDCOM RS900W (Todas las versiones), RUGGEDCOM RS910 (Todas las versiones), RUGGEDCOM RS910L (Todas las versiones), RUGGEDCOM RS910W (Todas las versiones), RUGGEDCOM RS920L (Todas las versiones), RUGGEDCOM RS920W (Todas las versiones), RUGGEDCOM RS930L (Todas las versiones), RUGGEDCOM RS930W (Todas las versiones), RUGGEDCOM RS940G (Todas las versiones), RUGGEDCOM RS969 (Todas las versiones), RUGGEDCOM RSG2100 (Todas las versiones), RUGGEDCOM RSG2100 (32M) V4.X (Todas las versiones), RUGGEDCOM RSG2100 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2100P (Todas las versiones), RUGGEDCOM RSG2100P (32M) V4.X (Todas las versiones), RUGGEDCOM RSG2100P (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2200 (Todas las versiones), RUGGEDCOM RSG2288 V4.X (Todas las versiones versiones), RUGGEDCOM RSG2288 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300 V4.X (Todas las versiones), RUGGEDCOM RSG2300 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300P V4.X (Todas las versiones), RUGGEDCOM RSG2300P V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2488 V4.X (Todas las versiones), RUGGEDCOM RSG2488 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG907R (Todas las versiones < V5.10.0), RUGGEDCOM RSG908C (Todas las versiones < V5.10.0), RUGGEDCOM RSG909R (Todas las versiones < V5.10.0), RUGGEDCOM RSG910C (Todas las versiones < V5.10.0), RUGGEDCOM RSG920P V4.X (Todas las versiones), RUGGEDCOM RSG920P V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSL910 (Todas las versiones < V5.10.0), RUGGEDCOM RST2228 (Todas las versiones < V5.10.0), RUGGEDCOM RST2228P (Todas las versiones < V5.10.0), RUGGEDCOM RST916C (Todas las versiones < V5.10.0), RUGGEDCOM RST916P (Todas las versiones < V5.10.0). Los productos afectados admiten algoritmos criptogr\u00e1ficos inseguros. Un atacante podr\u00eda aprovechar estos algoritmos heredados para realizar un ataque de intermediario o suplantar la identidad de las partes que se comunican."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json
index 097bccc88a4..c7eac8c4b6c 100644
--- a/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json
+++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10019.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-10019",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:14.230",
- "lastModified": "2025-03-20T10:15:14.230",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:32:39.380",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -51,10 +73,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lollms:lollms_web_ui:12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13C2AF1C-0ECA-4677-8686-A1F6F67A5E0B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://huntr.com/bounties/3cf80890-2d8a-4fc7-8e0e-6d4bf648b3ea",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json
index 9578a1066f5..917021399ca 100644
--- a/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json
+++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10047.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-10047",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:14.360",
- "lastModified": "2025-03-20T10:15:14.360",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:28:09.237",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "225B2535-8D51-4F5C-816B-46D755605CE1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://huntr.com/bounties/69c3a27c-bd93-4aff-a46b-56798f28a3ce",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11937.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11937.json
index 03f1a8b753d..60b702d7169 100644
--- a/CVE-2024/CVE-2024-119xx/CVE-2024-11937.json
+++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11937.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-11937",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T08:15:24.900",
- "lastModified": "2025-07-04T08:15:24.900",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json
index e8dfca0e84d..d4add3275da 100644
--- a/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json
+++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12766.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12766",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:30.000",
- "lastModified": "2025-03-20T14:15:18.387",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:24:32.990",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lollms:lollms_web_ui:13:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33B0BD9C-2312-401C-9E7F-C3E614A336A3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://huntr.com/bounties/a143a2e2-1293-4dec-b875-3312584bd2b1",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://huntr.com/bounties/a143a2e2-1293-4dec-b875-3312584bd2b1",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25176.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25176.json
index 6759b85851e..1d06a947f2c 100644
--- a/CVE-2024/CVE-2024-251xx/CVE-2024-25176.json
+++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25176.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-25176",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T17:15:27.247",
- "lastModified": "2025-07-07T17:15:27.247",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LuaJIT through 2.1 has a stack-buffer-overflow in lj_strfmt_wfnum in lj_strfmt_num.c."
+ },
+ {
+ "lang": "es",
+ "value": "LuaJIT hasta 2.1 tiene un desbordamiento de b\u00fafer de pila en lj_strfmt_wfnum en lj_strfmt_num.c."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25177.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25177.json
index ef1c895ece6..b33cb842e09 100644
--- a/CVE-2024/CVE-2024-251xx/CVE-2024-25177.json
+++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25177.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-25177",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T17:15:27.403",
- "lastModified": "2025-07-07T17:15:27.403",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LuaJIT through 2.1 has an unsinking of IR_FSTORE for NULL metatable, which leads to Denial of Service (DoS)."
+ },
+ {
+ "lang": "es",
+ "value": "LuaJIT hasta 2.1 tiene un deshundimiento de IR_FSTORE para metatabla NULL, lo que conduce a una denegaci\u00f3n de servicio (DoS)."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25178.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25178.json
index 8ef678ee62c..e470e1e52e7 100644
--- a/CVE-2024/CVE-2024-251xx/CVE-2024-25178.json
+++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25178.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-25178",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T17:15:27.527",
- "lastModified": "2025-07-07T17:15:27.527",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LuaJIT through 2.1 has an out-of-bounds read in the stack-overflow handler in lj_state.c"
+ },
+ {
+ "lang": "es",
+ "value": "LuaJIT hasta la versi\u00f3n 2.1 tiene una lectura fuera de los l\u00edmites en el controlador de desbordamiento de pila en lj_state.c"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31853.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31853.json
index 9e70ca201a0..683136c8cfb 100644
--- a/CVE-2024/CVE-2024-318xx/CVE-2024-31853.json
+++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31853.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-31853",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:23.997",
- "lastModified": "2025-07-08T11:15:23.997",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check the extended key usage attribute of that device's certificate.\r\nThis could allow an attacker to execute an on-path network (MitM) attack."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SICAM TOOLBOX II (todas las versiones anteriores a V07.11). Al establecer una conexi\u00f3n HTTPS con el servidor TLS de un dispositivo administrado, la aplicaci\u00f3n afectada no comprueba el atributo de uso de clave extendida del certificado de dicho dispositivo. Esto podr\u00eda permitir que un atacante ejecute un ataque de red en ruta (MitM)."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31854.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31854.json
index 791cb413771..009143f36b6 100644
--- a/CVE-2024/CVE-2024-318xx/CVE-2024-31854.json
+++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31854.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-31854",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:24.180",
- "lastModified": "2025-07-08T11:15:24.180",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check device's certificate common name against an expected value.\r\nThis could allow an attacker to execute an on-path network (MitM) attack."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SICAM TOOLBOX II (todas las versiones anteriores a V07.11). Al establecer una conexi\u00f3n HTTPS con el servidor TLS de un dispositivo administrado, la aplicaci\u00f3n afectada no compara el nombre com\u00fan del certificado del dispositivo con el valor esperado. Esto podr\u00eda permitir que un atacante ejecute un ataque de red en ruta (MitM)."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36348.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36348.json
new file mode 100644
index 00000000000..0534549bbbc
--- /dev/null
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36348.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2024-36348",
+ "sourceIdentifier": "psirt@amd.com",
+ "published": "2025-07-08T17:15:31.200",
+ "lastModified": "2025-07-08T17:15:31.200",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A transient execution vulnerability in some AMD processors may allow a user process to infer the control registers speculatively even if UMIP feature is enabled, potentially resulting in information leakage."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@amd.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
+ "baseScore": 3.8,
+ "baseSeverity": "LOW",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html",
+ "source": "psirt@amd.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36349.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36349.json
new file mode 100644
index 00000000000..d1651f70763
--- /dev/null
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36349.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2024-36349",
+ "sourceIdentifier": "psirt@amd.com",
+ "published": "2025-07-08T17:15:31.400",
+ "lastModified": "2025-07-08T17:15:31.400",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@amd.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
+ "baseScore": 3.8,
+ "baseSeverity": "LOW",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html",
+ "source": "psirt@amd.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36350.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36350.json
new file mode 100644
index 00000000000..d1d7fedbcfb
--- /dev/null
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36350.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2024-36350",
+ "sourceIdentifier": "psirt@amd.com",
+ "published": "2025-07-08T17:15:31.563",
+ "lastModified": "2025-07-08T17:15:31.563",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@amd.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
+ "baseScore": 5.6,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.1,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html",
+ "source": "psirt@amd.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36357.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36357.json
new file mode 100644
index 00000000000..6ef5054cee4
--- /dev/null
+++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36357.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2024-36357",
+ "sourceIdentifier": "psirt@amd.com",
+ "published": "2025-07-08T17:15:31.723",
+ "lastModified": "2025-07-08T17:15:31.723",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@amd.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
+ "baseScore": 5.6,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.1,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html",
+ "source": "psirt@amd.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37656.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37656.json
index a53a6ad0026..f0a5e934e83 100644
--- a/CVE-2024/CVE-2024-376xx/CVE-2024-37656.json
+++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37656.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-37656",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T18:15:25.120",
- "lastModified": "2025-07-07T18:15:25.120",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via the insufficient URL parameter verification in bbs/logout.php."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de redirecci\u00f3n abierta en gnuboard5 v.5.5.16 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la verificaci\u00f3n insuficiente del par\u00e1metro URL en bbs/logout.php."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37657.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37657.json
index e0a08020166..82eef493f3b 100644
--- a/CVE-2024/CVE-2024-376xx/CVE-2024-37657.json
+++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37657.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-37657",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T18:15:25.233",
- "lastModified": "2025-07-07T18:15:25.233",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via thebbs/login.php component."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de redirecci\u00f3n abierta en gnuboard5 v.5.5.16 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente bbs/login.php."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37658.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37658.json
index d63e69ef221..c976f7e8c0d 100644
--- a/CVE-2024/CVE-2024-376xx/CVE-2024-37658.json
+++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37658.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-37658",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T18:15:25.340",
- "lastModified": "2025-07-07T18:15:25.340",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via the bbs/member_confirm.php."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de redirecci\u00f3n abierta en gnuboard5 v.5.5.16 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de bbs/member_confirm.php."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43186.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43186.json
index 7b507dfe5db..b66c167cfe5 100644
--- a/CVE-2024/CVE-2024-431xx/CVE-2024-43186.json
+++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43186.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43186",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-29T00:15:23.620",
- "lastModified": "2025-04-01T20:26:30.593",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:28:18.497",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
}
]
},
@@ -51,10 +71,54 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.7",
+ "versionEndExcluding": "11.7.1",
+ "matchCriteriaId": "C8544C8A-580A-4A26-8731-0511ADC66F36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7184980",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43190.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43190.json
index 127b6eed792..03c3b9c1a08 100644
--- a/CVE-2024/CVE-2024-431xx/CVE-2024-43190.json
+++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43190.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-43190",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-07T18:15:25.440",
- "lastModified": "2025-07-07T18:15:25.440",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Engineering Requirements Management DOORS 9.7.2.9, under certain configurations, could allow a remote attacker to obtain password reset instructions of a legitimate user using man in the middle techniques."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Engineering Requirements Management DOORS 9.7.2.9, bajo ciertas configuraciones, podr\u00eda permitir que un atacante remoto obtenga instrucciones de restablecimiento de contrase\u00f1a de un usuario leg\u00edtimo utilizando t\u00e9cnicas de intermediario."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43334.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43334.json
index b0c963e1dbc..ca6190e266d 100644
--- a/CVE-2024/CVE-2024-433xx/CVE-2024-43334.json
+++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43334.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-43334",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-07T10:15:25.593",
- "lastModified": "2025-07-07T10:15:25.593",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gavias Halpes allows Reflected XSS.This issue affects Halpes: from n/a before 1.2.5."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Gavias Halpes permite XSS reflejado. Este problema afecta a Halpes: desde n/a hasta 1.2.5."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json
index 1d59fd61731..ba068e4c269 100644
--- a/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json
+++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json
@@ -2,13 +2,13 @@
"id": "CVE-2024-43614",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:29.623",
- "lastModified": "2024-10-21T20:50:38.370",
- "vulnStatus": "Analyzed",
+ "lastModified": "2025-07-08T16:15:45.507",
+ "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
- "value": "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability"
+ "value": "Relative path traversal in Microsoft Defender for Endpoint allows an authorized attacker to perform spoofing locally."
},
{
"lang": "es",
diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json
index 6498cfe6e85..594c31850d4 100644
--- a/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json
+++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-49563",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T02:15:13.510",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:25:00.350",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json
index 2f5eebc80df..bed60144b8a 100644
--- a/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json
+++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-49564",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T02:15:13.670",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:33:22.117",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json
index eb51f1feeea..ec25d862187 100644
--- a/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json
+++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-49565",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T02:15:13.810",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:33:18.680",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json
index ec6bca758d0..f75e0f9b60b 100644
--- a/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json
+++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-49601",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:16.650",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:33:01.010",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -51,10 +71,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52965.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52965.json
index b8be584fa2b..4a4a20e38d5 100644
--- a/CVE-2024/CVE-2024-529xx/CVE-2024-52965.json
+++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52965.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-52965",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-07-08T15:15:22.313",
- "lastModified": "2025-07-08T15:15:22.313",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53009.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53009.json
index c5ca88193fd..c85b7a66e75 100644
--- a/CVE-2024/CVE-2024-530xx/CVE-2024-53009.json
+++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53009.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-53009",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:28.460",
- "lastModified": "2025-07-08T13:15:28.460",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json
index 716000ce283..e1e4ea15ca9 100644
--- a/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json
+++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55551",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-19T14:15:37.733",
- "lastModified": "2025-04-02T14:15:46.250",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:44:23.807",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -81,22 +81,52 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:exasol:jdbc_driver:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "24.2.1",
+ "matchCriteriaId": "6A0D6AC6-6253-49C4-AE3E-A5E7E16F22F8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://docs.exasol.com/db/7.1/release_notes_drivers_jdbc/24.2.1.htm",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://docs.exasol.com/db/latest/connect_exasol/drivers/jdbc.htm",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://gist.github.com/azraelxuemo/9565ec9219e0c3e9afd5474904c39d0f",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.blackhat.com/eu-24/briefings/schedule/index.html#a-novel-attack-surface-java-authentication-and-authorization-service-jaas-42179",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Technical Description"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55599.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55599.json
index 06f45214cf1..9c6a22679cf 100644
--- a/CVE-2024/CVE-2024-555xx/CVE-2024-55599.json
+++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55599.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55599",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-07-08T15:15:23.870",
- "lastModified": "2025-07-08T15:15:23.870",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55895.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55895.json
index 1aac2282bd2..627767cb76d 100644
--- a/CVE-2024/CVE-2024-558xx/CVE-2024-55895.json
+++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55895.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55895",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-29T13:15:40.410",
- "lastModified": "2025-04-01T20:26:30.593",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:22:06.477",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
}
]
},
@@ -51,10 +71,54 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.7",
+ "versionEndExcluding": "11.7.1",
+ "matchCriteriaId": "C8544C8A-580A-4A26-8731-0511ADC66F36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185450",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55965.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55965.json
index ed330dcaf67..316ed31ef80 100644
--- a/CVE-2024/CVE-2024-559xx/CVE-2024-55965.json
+++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55965.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55965",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-26T21:15:23.063",
- "lastModified": "2025-03-27T16:45:27.850",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:35:30.287",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.51",
+ "matchCriteriaId": "76EC9A47-0E39-4CA8-AB1A-74F4CF8CEECF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/appsmithorg/appsmith/security/advisories/GHSA-794x-gm8v-2wj6",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-581xx/CVE-2024-58117.json b/CVE-2024/CVE-2024-581xx/CVE-2024-58117.json
index bb1c79d3b62..cbfc9947e39 100644
--- a/CVE-2024/CVE-2024-581xx/CVE-2024-58117.json
+++ b/CVE-2024/CVE-2024-581xx/CVE-2024-58117.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-58117",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:26.393",
- "lastModified": "2025-07-07T03:15:26.393",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow risk when vector images are parsed during file preview\nImpact: Successful exploitation of this vulnerability may affect the file preview function."
+ },
+ {
+ "lang": "es",
+ "value": "Riesgo de desbordamiento de pila cuando se analizan im\u00e1genes vectoriales durante la vista previa del archivo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de vista previa del archivo."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-581xx/CVE-2024-58128.json b/CVE-2024/CVE-2024-581xx/CVE-2024-58128.json
index 7af9ebb93fe..0da110f82e2 100644
--- a/CVE-2024/CVE-2024-581xx/CVE-2024-58128.json
+++ b/CVE-2024/CVE-2024-581xx/CVE-2024-58128.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-58128",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:17.197",
- "lastModified": "2025-04-01T20:26:30.593",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:31:44.517",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
}
]
},
@@ -51,14 +71,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:misp:misp:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.4.193",
+ "matchCriteriaId": "D38831B2-94AF-41A5-956B-D9EBE0EC177C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/MISP/MISP/commit/33a1eb66408e16a7535b2bae48303efd9501a26a",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/MISP/MISP/releases/tag/v2.4.193",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-581xx/CVE-2024-58129.json b/CVE-2024/CVE-2024-581xx/CVE-2024-58129.json
index d56a1cbf50c..3daa11b31a5 100644
--- a/CVE-2024/CVE-2024-581xx/CVE-2024-58129.json
+++ b/CVE-2024/CVE-2024-581xx/CVE-2024-58129.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-58129",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:17.333",
- "lastModified": "2025-04-01T20:26:30.593",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:30:50.003",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
}
]
},
@@ -51,14 +71,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:misp:misp:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.4.193",
+ "matchCriteriaId": "D38831B2-94AF-41A5-956B-D9EBE0EC177C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/MISP/MISP/commit/09a43870e733f79ffa33753ddc7bce3cbb5a5647",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/MISP/MISP/releases/tag/v2.4.193",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6986.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6986.json
index 42f5ca1eb87..7fb769895a7 100644
--- a/CVE-2024/CVE-2024-69xx/CVE-2024-6986.json
+++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6986.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6986",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:34.860",
- "lastModified": "2025-03-20T10:15:34.860",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:14:33.880",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -51,10 +73,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9177E7C-9C27-4C3C-AC97-7F277FEEC725"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://huntr.com/bounties/83e9bde1-40b2-49e9-be1c-bc1498eb8ebd",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7058.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7058.json
index 9fdf470a7a3..aec6ec42043 100644
--- a/CVE-2024/CVE-2024-70xx/CVE-2024-7058.json
+++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7058.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7058",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:36.340",
- "lastModified": "2025-03-20T10:15:36.340",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:10:59.790",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lollms:lollms_web_ui:10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5622185E-495B-47D8-BFB9-35A2EEC3A0B8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://huntr.com/bounties/148fce03-0f5a-4939-b636-b7f9848765e4",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7577.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7577.json
index 774930f8e4d..d56a6eeba78 100644
--- a/CVE-2024/CVE-2024-75xx/CVE-2024-7577.json
+++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7577.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7577",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-29T00:15:24.257",
- "lastModified": "2025-04-01T20:26:30.593",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:26:02.110",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
@@ -51,10 +71,54 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.7",
+ "versionEndExcluding": "11.7.1",
+ "matchCriteriaId": "C8544C8A-580A-4A26-8731-0511ADC66F36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185020",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8581.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8581.json
index a37f802048a..ae55a5c1da8 100644
--- a/CVE-2024/CVE-2024-85xx/CVE-2024-8581.json
+++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8581.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8581",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:43.350",
- "lastModified": "2025-03-20T10:15:43.350",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:05:51.403",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lollms:lollms_web_ui:12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13C2AF1C-0ECA-4677-8686-A1F6F67A5E0B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/parisneo/lollms-webui/commit/dcc078cbe20d2a9640b0942a622134b0e3fa6e48",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.com/bounties/67ead5b9-8149-4001-a1cd-ac648cb7b414",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9453.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9453.json
index bf00922faa0..53d898da4d0 100644
--- a/CVE-2024/CVE-2024-94xx/CVE-2024-9453.json
+++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9453.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9453",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-07-04T09:15:24.537",
- "lastModified": "2025-07-04T09:15:24.537",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0292.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0292.json
new file mode 100644
index 00000000000..9988c44d2ca
--- /dev/null
+++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0292.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-0292",
+ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "published": "2025-07-08T16:15:50.543",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SSRF in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated attacker with admin rights to access internal network services."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs",
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0293.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0293.json
new file mode 100644
index 00000000000..0fc0ea72193
--- /dev/null
+++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0293.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-0293",
+ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "published": "2025-07-08T16:15:51.727",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CLRF injection in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated attacker with admin rights to write to a protected configuration file on disk."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
+ "baseScore": 6.6,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-93"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs",
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0666.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0666.json
index b2c69672d03..80d18d77d99 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0666.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0666.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-0666",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-05-07T08:15:14.910",
- "lastModified": "2025-05-07T14:15:39.450",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:44:16.057",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
]
},
"weaknesses": [
@@ -73,14 +95,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.4.7",
+ "matchCriteriaId": "4D494BC2-675C-4EB3-A82A-CF9F45A23328"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_01_CSNC-2025-002_BOINC_multiple_XSS.txt",
- "source": "vulnerability@ncsc.ch"
+ "source": "vulnerability@ncsc.ch",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
},
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_01_CSNC-2025-002_BOINC_multiple_XSS.txt",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0667.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0667.json
index 9f86c43ea24..57b2288ad73 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0667.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0667.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-0667",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-05-07T08:15:15.057",
- "lastModified": "2025-05-07T14:15:39.550",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:48:19.440",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
]
},
"weaknesses": [
@@ -73,14 +95,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.4.7",
+ "matchCriteriaId": "4D494BC2-675C-4EB3-A82A-CF9F45A23328"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_02_CSNC-2025-003_BOINC_stored_XSS.txt",
- "source": "vulnerability@ncsc.ch"
+ "source": "vulnerability@ncsc.ch",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
},
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_02_CSNC-2025-003_BOINC_stored_XSS.txt",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0668.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0668.json
index 27b5cd10e9f..da4b210174f 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0668.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0668.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-0668",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-05-07T08:15:15.207",
- "lastModified": "2025-05-07T14:15:39.637",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:47:25.000",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
]
},
"weaknesses": [
@@ -73,14 +95,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.4.5",
+ "matchCriteriaId": "57B6CBF2-F5C6-4820-9286-A98A3A72BC9D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_03_CSNC-2025-004_BOINC_multiple_SQLi.txt",
- "source": "vulnerability@ncsc.ch"
+ "source": "vulnerability@ncsc.ch",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
},
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_03_CSNC-2025-004_BOINC_multiple_SQLi.txt",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0669.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0669.json
index 59fcbca3d52..e7be4a4619f 100644
--- a/CVE-2025/CVE-2025-06xx/CVE-2025-0669.json
+++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0669.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-0669",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-05-07T08:15:15.340",
- "lastModified": "2025-05-07T14:15:39.767",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:48:58.790",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
]
},
"weaknesses": [
@@ -73,14 +95,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.4.3",
+ "matchCriteriaId": "B1B8343D-727D-4817-9548-2118BCF511DB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_04_CSNC-2025-005_BOINC_CSRF.txt",
- "source": "vulnerability@ncsc.ch"
+ "source": "vulnerability@ncsc.ch",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
},
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2025_04_CSNC-2025-005_BOINC_CSRF.txt",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Third Party Advisory",
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1351.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1351.json
index e32fa24b4eb..0c6c12a9fed 100644
--- a/CVE-2025/CVE-2025-13xx/CVE-2025-1351.json
+++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1351.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-1351",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-07T17:15:27.693",
- "lastModified": "2025-07-07T17:15:27.693",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Virtualize 8.5, 8.6, and 8.7 products could allow a user to escalate their privileges to that of another user logging in at the same time due to a race condition in the login function."
+ },
+ {
+ "lang": "es",
+ "value": "Los productos IBM Storage Virtualize 8.5, 8.6 y 8.7 podr\u00edan permitir que un usuario aumente sus privilegios a los de otro usuario que inicie sesi\u00f3n al mismo tiempo debido a una condici\u00f3n de ejecuci\u00f3n en la funci\u00f3n de inicio de sesi\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1770.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1770.json
index 8232f901e9f..65e3d6d990f 100644
--- a/CVE-2025/CVE-2025-17xx/CVE-2025-1770.json
+++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1770.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-1770",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-20T06:15:22.903",
- "lastModified": "2025-03-20T06:15:22.903",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:38:54.230",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,22 +51,52 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.0.25",
+ "matchCriteriaId": "83E51B23-6F8A-478C-AF23-391D5E7EC252"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/widgets/events-calendar/events-calendar.php#L715",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/widgets/upcoming-event-tab/style/tab-1.php#L53",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3257023/",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f24baee-7003-449b-9072-d95fa1e26c8f?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20202.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20202.json
index 79eacf79fec..1482d13d484 100644
--- a/CVE-2025/CVE-2025-202xx/CVE-2025-20202.json
+++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20202.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20202",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-05-07T18:15:41.063",
- "lastModified": "2025-05-08T14:39:09.683",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:17:00.210",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,802 @@
"value": "CWE-805"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
+ "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F621724-9BA3-4D47-AAB8-08D7A541EBDF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
+ "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
+ "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2258D93E-71AA-4964-A5DF-008E3479F2A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "608ACC60-143B-4835-B6AC-E6C3111B4078"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
+ "matchCriteriaId": "78EEDF40-2CDA-4147-A9F2-A5F4B8FF35EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
+ "matchCriteriaId": "40CEA4FC-B946-4D54-A45B-686FC02D5411"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63527910-7F55-4D40-BFE7-D497C91C334D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6EACA43F-64DB-496B-A6B1-DB9FAF6606EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "53B97B06-206B-42F0-B68F-5C5136EAD2B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6281EB0F-EE0E-4B06-A7A1-29460A98A8CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07650346-67D7-4805-BF81-BB145304CC87"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C6C0D21-ABD5-42F1-B04B-745CA6115D07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A62648B-3273-4D75-8533-A5CBE1B1BCE0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0174C08C-8846-45AE-83ED-E9964348FA28"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E73D685D-A002-4D82-9B4C-1D6B5C0B0320"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1b:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1ED4E436-D338-4014-967D-9FE449518191"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:17.15.1w:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D66E9FE8-DD32-4D0A-BB80-E690F5299F45"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-cdp-dos-fpeks9K",
- "source": "psirt@cisco.com"
+ "source": "psirt@cisco.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20300.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20300.json
index e7fd5097349..fc178653d41 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20300.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20300.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20300",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:25.660",
- "lastModified": "2025-07-07T18:15:25.660",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.6, and 9.1.9 and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.112, and 9.2.2406.119, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles, and has read-only access to a specific alert, could suppress that alert when it triggers. See [Define alert suppression groups to throttle sets of similar alerts](https://help.splunk.com/en/splunk-enterprise/alert-and-respond/alerting-manual/9.4/manage-alert-trigger-conditions-and-throttling/define-alert-suppression-groups-to-throttle-sets-of-similar-alerts)."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Splunk Enterprise anteriores a 9.4.2, 9.3.5, 9.2.6 y 9.1.9, y de Splunk Cloud Platform anteriores a 9.3.2411.103, 9.3.2408.112 y 9.2.2406.119, un usuario con pocos privilegios que no tenga los roles de administrador ni de experto de Splunk y que tenga acceso de solo lectura a una alerta espec\u00edfica podr\u00eda suprimirla al activarse. Consulte [Definir grupos de supresi\u00f3n de alertas para limitar conjuntos de alertas similares](https://help.splunk.com/en/splunk-enterprise/alert-and-respond/alerting-manual/9.4/manage-alert-trigger-conditions-and-throttling/define-alert-suppression-groups-to-throttle-sets-of-similar-alerts)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20319.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20319.json
index acadc3354df..ad7b8310f57 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20319.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20319.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20319",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:25.830",
- "lastModified": "2025-07-07T18:15:25.830",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability `edit_scripted` and `list_inputs` capability , could perform a remote command execution due to improper user input sanitization on the scripted input files.
See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) and [Setting up a scripted input ](https://docs.splunk.com/Documentation/Splunk/9.4.2/AdvancedDev/ScriptSetup)for more information."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Splunk Enterprise anteriores a 9.4.3, 9.3.5, 9.2.7 y 9.1.10, un usuario que tenga un rol que contenga la capacidad de alto privilegio `edit_scripted` y la capacidad `list_inputs` podr\u00eda realizar una ejecuci\u00f3n remota de comandos debido a una depuraci\u00f3n incorrecta de la entrada del usuario en los archivos de entrada con capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) and [Setting up a scripted input ](https://docs.splunk.com/Documentation/Splunk/9.4.2/AdvancedDev/ScriptSetup)for more information. "
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20320.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20320.json
index 9e4118c9f43..e42ba19e1be 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20320.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20320.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20320",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:25.987",
- "lastModified": "2025-07-07T18:15:25.987",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.107, 9.3.2408.117, and 9.2.2406.121, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through the `User Interface - Views` configuration page that could potentially lead to a denial of service (DoS).The user could cause the DoS by exploiting a path traversal vulnerability that allows for deletion of arbitrary files within a Splunk directory. The vulnerability requires the low-privileged user to phish the administrator-level victim by tricking them into initiating a request within their browser. The low-privileged user should not be able to exploit the vulnerability at will."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Splunk Enterprise anteriores a 9.4.3, 9.3.5, 9.2.7 y 9.1.10, y de Splunk Cloud Platform anteriores a 9.3.2411.107, 9.3.2408.117 y 9.2.2406.121, un usuario con privilegios bajos que no tenga los roles de administrador o de alto nivel de Splunk podr\u00eda manipular un payload malicioso a trav\u00e9s de la p\u00e1gina de configuraci\u00f3n \"Interfaz de usuario - Vistas\", lo que podr\u00eda provocar una denegaci\u00f3n de servicio (DoS). El usuario podr\u00eda causar la denegaci\u00f3n de servicio (DoS) explotando una vulnerabilidad de path traversal que permite la eliminaci\u00f3n de archivos arbitrarios dentro de un directorio de Splunk. La vulnerabilidad requiere que el usuario con privilegios bajos suplante a la v\u00edctima con nivel de administrador, enga\u00f1\u00e1ndola para que inicie una solicitud en su navegador. El usuario con privilegios bajos no deber\u00eda poder explotar la vulnerabilidad a voluntad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20321.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20321.json
index c8bed50074a..b3fceab9dfc 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20321.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20321.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20321",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:26.143",
- "lastModified": "2025-07-07T18:15:26.143",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.114, and 9.2.2406.119, an unauthenticated attacker can send a specially-crafted SPL search that could change the membership state in a Splunk Search Head Cluster (SHC) through a Cross-Site Request Forgery (CSRF), potentially leading to the removal of the captain or a member of the SHC.
The vulnerability requires the attacker to phish the administrator-level victim by tricking them into initiating a request within their browser. The attacker should not be able to exploit the vulnerability at will."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Splunk Enterprise anteriores a 9.4.3, 9.3.5, 9.2.7 y 9.1.10, y de Splunk Cloud Platform anteriores a 9.3.2411.104, 9.3.2408.114 y 9.2.2406.119, un atacante no autenticado puede enviar una b\u00fasqueda SPL especialmente manipulada que podr\u00eda cambiar el estado de membres\u00eda en un Cl\u00faster de Cabeza de B\u00fasqueda (SHC) de Splunk mediante un Cross-Site Request Forgery (CSRF), lo que podr\u00eda provocar la eliminaci\u00f3n del capit\u00e1n o de un miembro del SHC.
La vulnerabilidad requiere que el atacante suplante a la v\u00edctima con nivel de administrador, enga\u00f1\u00e1ndola para que inicie una solicitud desde su navegador. El atacante no deber\u00eda poder explotar la vulnerabilidad a voluntad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20322.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20322.json
index 92ad4871fea..a785ed193e8 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20322.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20322.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20322",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:26.307",
- "lastModified": "2025-07-07T18:15:26.307",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, an unauthenticated attacker could send a specially-crafted SPL search command that could trigger a rolling restart in the Search Head Cluster through a Cross-Site Request Forgery (CSRF), potentially leading to a denial of service (DoS).
The vulnerability requires the attacker to phish the administrator-level victim by tricking them into initiating a request within their browser. The attacker should not be able to exploit the vulnerability at will.
See [How rolling restart works](https://docs.splunk.com/Documentation/Splunk/9.4.2/DistSearch/RestartSHC) for more information."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Splunk Enterprise anteriores a 9.4.3, 9.3.5, 9.2.7 y 9.1.10, y Splunk Cloud Platform anteriores a 9.3.2411.104, 9.3.2408.113 y 9.2.2406.119, un atacante no autenticado podr\u00eda enviar un comando de b\u00fasqueda SPL especialmente manipulado que podr\u00eda desencadenar un reinicio progresivo en el cl\u00faster del cabezal de b\u00fasqueda a trav\u00e9s de un Cross-Site Request Forgery (CSRF), lo que podr\u00eda provocar una denegaci\u00f3n de servicio (DoS).
La vulnerabilidad requiere que el atacante suplante de identidad (phishing) a la v\u00edctima de nivel de administrador enga\u00f1\u00e1ndola para que inicie una solicitud dentro de su navegador. El atacante no deber\u00eda poder explotar la vulnerabilidad a voluntad.
Consulte [C\u00f3mo funciona el reinicio continuo](https://docs.splunk.com/Documentation/Splunk/9.4.2/DistSearch/RestartSHC) para obtener m\u00e1s informaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20323.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20323.json
index 6e92f3ce855..1c02297e765 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20323.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20323.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20323",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:26.470",
- "lastModified": "2025-07-07T18:15:26.470",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could turn off the scheduled search `Bucket Copy Trigger` within the Splunk Archiver application. This is because of missing access controls in the saved searches for this app."
+ },
+ {
+ "lang": "es",
+ "value": "En versiones de Splunk Enterprise anteriores a 9.4.3, 9.3.5, 9.2.7 y 9.1.10, un usuario con privilegios bajos que no tenga los roles de \"admin\" o \"power\" de Splunk podr\u00eda desactivar la b\u00fasqueda programada \"Bucket Copy Trigger\" en la aplicaci\u00f3n Splunk Archiver. Esto se debe a la falta de controles de acceso en las b\u00fasquedas guardadas de esta aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20324.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20324.json
index 2027ccfbe2d..417b5950fec 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20324.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20324.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20324",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:26.633",
- "lastModified": "2025-07-07T18:15:26.633",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.7, and 9.1.10 and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create or overwrite [system source type](https://help.splunk.com/en/splunk-enterprise/get-started/get-data-in/9.2/configure-source-types/create-source-types) configurations by sending a specially-crafted payload to the `/servicesNS/nobody/search/admin/sourcetypes/` REST endpoint on the Splunk management port."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Splunk Enterprise anteriores a 9.4.2, 9.3.5, 9.2.7 y 9.1.10 y Splunk Cloud Platform anteriores a 9.3.2411.104, 9.3.2408.113 y 9.2.2406.119, un usuario con privilegios bajos que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda crear o sobrescribir configuraciones de [tipo de origen del sistema](https://help.splunk.com/en/splunk-enterprise/get-started/get-data-in/9.2/configure-source-types/create-source-types) enviando un payload especialmente manipulada al endpoint REST `/servicesNS/nobody/search/admin/sourcetypes/` en el puerto de administraci\u00f3n de Splunk."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-203xx/CVE-2025-20325.json b/CVE-2025/CVE-2025-203xx/CVE-2025-20325.json
index 426f72081dd..07999f5d730 100644
--- a/CVE-2025/CVE-2025-203xx/CVE-2025-20325.json
+++ b/CVE-2025/CVE-2025-203xx/CVE-2025-20325.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20325",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-07-07T18:15:26.793",
- "lastModified": "2025-07-07T18:15:26.793",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.113, and 9.2.2406.119, the software potentially exposes the search head cluster [splunk.secret](https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/9.4/install-splunk-enterprise-securely/deploy-secure-passwords-across-multiple-servers) key. This exposure could happen if you have a Search Head cluster and you configure the Splunk Enterprise\u00a0`SHCConfig`\u00a0log channel at the DEBUG logging level in the clustered deployment.
The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles.
See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities), [Deploy a search head cluster](https://help.splunk.com/en/splunk-enterprise/administer/distributed-search/9.4/deploy-search-head-clustering/deploy-a-search-head-cluster), [Deploy secure passwords across multiple servers](https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/9.4/install-splunk-enterprise-securely/deploy-secure-passwords-across-multiple-servers) and [Set a security key for the search head cluster](https://help.splunk.com/splunk-enterprise/administer/distributed-search/9.4/configure-search-head-clustering/set-a-security-key-for-the-search-head-cluster#id_2c54937a_736c_47b5_9485_67e9e390acfa__Set_a_security_key_for_the_search_head_cluster) for more information."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Splunk Enterprise anteriores a 9.4.3, 9.3.5, 9.2.7 y 9.1.10, y de Splunk Cloud Platform anteriores a 9.3.2411.103, 9.3.2408.113 y 9.2.2406.119, el software podr\u00eda exponer la clave del cl\u00faster de cabezales de b\u00fasqueda [splunk.secret](https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/9.4/install-splunk-enterprise-securely/deploy-secure-passwords-across-multiple-servers). Esta exposici\u00f3n podr\u00eda ocurrir si tiene un cl\u00faster de cabezales de b\u00fasqueda y configura el canal de registro `SHCConfig` de Splunk Enterprise en el nivel de registro DEBUG de la implementaci\u00f3n en cl\u00faster.
La vulnerabilidad requerir\u00eda acceso local a los archivos de registro o acceso administrativo a los \u00edndices internos, que, por defecto, solo recibe el rol de administrador. Revise los roles y las capacidades de su instancia y restrinja el acceso a los \u00edndices internos a los roles de administrador.
See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities), [Deploy a search head cluster](https://help.splunk.com/en/splunk-enterprise/administer/distributed-search/9.4/deploy-search-head-clustering/deploy-a-search-head-cluster), [Deploy secure passwords across multiple servers](https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/9.4/install-splunk-enterprise-securely/deploy-secure-passwords-across-multiple-servers) and [Set a security key for the search head cluster](https://help.splunk.com/splunk-enterprise/administer/distributed-search/9.4/configure-search-head-clustering/set-a-security-key-for-the-search-head-cluster#id_2c54937a_736c_47b5_9485_67e9e390acfa__Set_a_security_key_for_the_search_head_cluster) for more information. "
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20680.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20680.json
index 68719c7f10f..35770111e8f 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20680.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20680.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20680",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:26.423",
- "lastModified": "2025-07-08T14:15:24.853",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20681.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20681.json
index e2c4dd84586..ef6f381e15e 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20681.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20681.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20681",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:27.260",
- "lastModified": "2025-07-08T14:15:25.033",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20682.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20682.json
index 3aeeebc6ebd..55291fec24d 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20682.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20682.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20682",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:27.407",
- "lastModified": "2025-07-08T14:15:25.190",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20683.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20683.json
index ff048296485..b27fad80616 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20683.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20683.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20683",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:27.550",
- "lastModified": "2025-07-08T14:15:25.357",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20684.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20684.json
index a0dde990ace..eae55cdf794 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20684.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20684.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20684",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:27.690",
- "lastModified": "2025-07-08T14:15:25.517",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20685.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20685.json
index 912466449bb..c4b275dfdf0 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20685.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20685.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20685",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:27.833",
- "lastModified": "2025-07-08T14:15:25.683",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@@ -22,10 +22,10 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "attackVector": "NETWORK",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
@@ -34,7 +34,7 @@
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
- "exploitabilityScore": 3.9,
+ "exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20686.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20686.json
index 66f524fd032..e15c7fccbb2 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20686.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20686.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20686",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:27.987",
- "lastModified": "2025-07-08T14:15:25.843",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@@ -22,10 +22,10 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL",
- "attackVector": "NETWORK",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
@@ -34,7 +34,7 @@
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
- "exploitabilityScore": 3.9,
+ "exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20687.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20687.json
index 111014d7dba..84bd57c665c 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20687.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20687.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20687",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:28.143",
- "lastModified": "2025-07-08T14:15:26.030",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20688.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20688.json
index a8803a8b696..5e90c7d1b82 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20688.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20688.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20688",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:28.350",
- "lastModified": "2025-07-08T15:15:24.217",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20689.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20689.json
index b7cb7b6b0b9..10f256f35e7 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20689.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20689.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20689",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:28.503",
- "lastModified": "2025-07-08T15:15:24.447",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20690.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20690.json
index 0399ef4e19f..90617e2c0cb 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20690.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20690.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20690",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:28.653",
- "lastModified": "2025-07-08T15:15:24.643",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20691.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20691.json
index 82edb5a4d16..1dc395f5307 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20691.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20691.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20691",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:28.807",
- "lastModified": "2025-07-08T15:15:24.843",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20692.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20692.json
index 6c02db0a316..ff70647247d 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20692.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20692.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20692",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:28.950",
- "lastModified": "2025-07-08T15:15:25.050",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20693.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20693.json
index da6cd85536f..b26481a614e 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20693.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20693.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20693",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:29.100",
- "lastModified": "2025-07-08T15:15:25.233",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20694.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20694.json
index c34d01da12c..108a8d41ac6 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20694.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20694.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20694",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:29.250",
- "lastModified": "2025-07-08T15:15:25.393",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20695.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20695.json
index a6477e51641..4a8428e5060 100644
--- a/CVE-2025/CVE-2025-206xx/CVE-2025-20695.json
+++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20695.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-20695",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-07-08T03:15:29.433",
- "lastModified": "2025-07-08T14:15:26.193",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20982.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20982.json
index ed1449ed661..6cd33f6e5c1 100644
--- a/CVE-2025/CVE-2025-209xx/CVE-2025-20982.json
+++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20982.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20982",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:24.733",
- "lastModified": "2025-07-08T11:15:24.733",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in setting auth secret in KnoxVault trustlet prior to SMR Jul-2025 Release 1 allows local privileged attackers to write out-of-bounds memory."
+ },
+ {
+ "lang": "es",
+ "value": "La escritura fuera de los l\u00edmites en la configuraci\u00f3n de autenticaci\u00f3n secreta en el trustlet de KnoxVault anterior a SMR Jul-2025 Release 1 permite que atacantes privilegiados locales escriban fuera de los l\u00edmites de la memoria."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20983.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20983.json
index b2cfc491672..0bbc4c5b124 100644
--- a/CVE-2025/CVE-2025-209xx/CVE-2025-20983.json
+++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20983.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20983",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:24.873",
- "lastModified": "2025-07-08T11:15:24.873",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in checking auth secret in KnoxVault trustlet prior to SMR Jul-2025 Release 1 allows local privileged attackers to write out-of-bounds memory."
+ },
+ {
+ "lang": "es",
+ "value": "La escritura fuera de los l\u00edmites en la verificaci\u00f3n de secretos de autenticaci\u00f3n en el trustlet de KnoxVault antes de la versi\u00f3n 1 de SMR de julio de 2025 permite que atacantes privilegiados locales escriban en memoria fuera de los l\u00edmites."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20997.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20997.json
index 14723d68d84..7764ee01431 100644
--- a/CVE-2025/CVE-2025-209xx/CVE-2025-20997.json
+++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20997.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20997",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.000",
- "lastModified": "2025-07-08T11:15:25.000",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permission in Framework for Galaxy Watch prior to SMR Jul-2025 Release 1 allows local attackers to reset some configuration of Galaxy Watch."
+ },
+ {
+ "lang": "es",
+ "value": "El permiso predeterminado incorrecto en Framework para Galaxy Watch anterior a SMR Jul-2025 Release 1 permite que atacantes locales restablezcan alguna configuraci\u00f3n de Galaxy Watch."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20998.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20998.json
index 0730a58f48b..4ff455674c7 100644
--- a/CVE-2025/CVE-2025-209xx/CVE-2025-20998.json
+++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20998.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20998",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.137",
- "lastModified": "2025-07-08T11:15:25.137",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in SamsungAccount for Galaxy Watch prior to SMR Jul-2025 Release 1 allows local attackers to access phone number."
+ },
+ {
+ "lang": "es",
+ "value": "El control de acceso inadecuado en SamsungAccount para Galaxy Watch anterior a SMR Jul-2025 Release 1 permite que atacantes locales accedan al n\u00famero de tel\u00e9fono."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20999.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20999.json
index bdb86e03932..8cba7855f54 100644
--- a/CVE-2025/CVE-2025-209xx/CVE-2025-20999.json
+++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20999.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-20999",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.267",
- "lastModified": "2025-07-08T11:15:25.267",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in accessing saved Wi-Fi password for Galaxy Tablet prior to SMR Jul-2025 Release 1 allows secondary users to access owner's saved Wi-Fi password."
+ },
+ {
+ "lang": "es",
+ "value": "La autorizaci\u00f3n incorrecta para acceder a la contrase\u00f1a de Wi-Fi guardada para Galaxy Tablet anterior a la versi\u00f3n 1 de SMR de julio de 2025 permite que usuarios secundarios accedan a la contrase\u00f1a de Wi-Fi guardada del propietario."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21000.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21000.json
index 9d269a67132..d81d507049a 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21000.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21000.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21000",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.397",
- "lastModified": "2025-07-08T11:15:25.397",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in Bluetooth prior to SMR Jul-2025 Release 1 allows local attackers to enable Bluetooth."
+ },
+ {
+ "lang": "es",
+ "value": "La gesti\u00f3n inadecuada de privilegios en Bluetooth antes de la versi\u00f3n 1 de SMR Jul-2025 permite que atacantes locales habiliten Bluetooth."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21001.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21001.json
index 47507188230..f1aa67da218 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21001.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21001.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21001",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.523",
- "lastModified": "2025-07-08T11:15:25.523",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in LeAudioService prior to SMR Jul-2025 Release 1 allows local attackers to stop broadcasting Auracast."
+ },
+ {
+ "lang": "es",
+ "value": "Un control de acceso inadecuado en LeAudioService anterior a SMR Jul-2025 Release 1 permite que atacantes locales dejen de transmitir Auracast."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21002.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21002.json
index 71d7c2c99f5..f321f333009 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21002.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21002.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21002",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.660",
- "lastModified": "2025-07-08T11:15:25.660",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in LeAudioService prior to SMR Jul-2025 Release 1 allows local attackers to manipulate broadcasting Auracast."
+ },
+ {
+ "lang": "es",
+ "value": "Un control de acceso inadecuado en LeAudioService anterior a SMR Jul-2025 Release 1 permite a atacantes locales manipular la transmisi\u00f3n de Auracast."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21003.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21003.json
index 7e51cc75183..835b31766e5 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21003.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21003.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21003",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.793",
- "lastModified": "2025-07-08T11:15:25.793",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure storage of sensitive information in Emergency SOS prior to SMR Jul-2025 Release 1 allows local attackers to access sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "El almacenamiento inseguro de informaci\u00f3n confidencial en Emergency SOS antes de la versi\u00f3n 1 de SMR Jul-2025 permite que atacantes locales accedan a informaci\u00f3n confidencial."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21004.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21004.json
index 8683198ff3f..33e0c09f160 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21004.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21004.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21004",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:25.923",
- "lastModified": "2025-07-08T11:15:25.923",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper verification of intent by broadcast receiver in System UI for Galaxy Watch prior to SMR Jul-2025 Release 1 allows local attackers to power off the device."
+ },
+ {
+ "lang": "es",
+ "value": "La verificaci\u00f3n incorrecta de la intenci\u00f3n por parte del receptor de transmisi\u00f3n en la interfaz de usuario del sistema para Galaxy Watch anterior a la versi\u00f3n 1 de SMR de julio de 2025 permite que atacantes locales apaguen el dispositivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21005.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21005.json
index dd62b6de8b7..ce02eab4476 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21005.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21005.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21005",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:26.043",
- "lastModified": "2025-07-08T11:15:26.043",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in isemtelephony prior to Android 15 allows local attackers to access sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "El control de acceso inadecuado en isemtelephony anterior a Android 15 permite a atacantes locales acceder a informaci\u00f3n confidencial."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21006.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21006.json
index c27051b01d3..29feeed0f93 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21006.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21006.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21006",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:26.177",
- "lastModified": "2025-07-08T11:15:26.177",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in handling of macro blocks for MPEG4 codec in libsavsvc.so prior to Android 15 allows local attackers to write out-of-bounds memory."
+ },
+ {
+ "lang": "es",
+ "value": "La escritura fuera de los l\u00edmites en el manejo de bloques macro para el c\u00f3dec MPEG4 en libsavsvc.so anterior a Android 15 permite que atacantes locales escriban en la memoria fuera de los l\u00edmites."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21007.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21007.json
index 0c6d4970b71..df8f53a60c4 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21007.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21007.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21007",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:26.300",
- "lastModified": "2025-07-08T11:15:26.300",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in accessing uninitialized memory in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption."
+ },
+ {
+ "lang": "es",
+ "value": "La escritura fuera de los l\u00edmites al acceder a la memoria no inicializada en libsavsvc.so antes de Android 15 permite que atacantes locales provoquen da\u00f1os en la memoria."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21008.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21008.json
index 0fb758ea29f..74f003143f1 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21008.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21008.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21008",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:26.433",
- "lastModified": "2025-07-08T11:15:26.433",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read in decoding frame header in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption."
+ },
+ {
+ "lang": "es",
+ "value": "La lectura fuera de los l\u00edmites en el encabezado del frame de decodificaci\u00f3n en libsavsvc.so anterior a Android 15 permite que atacantes locales provoquen corrupci\u00f3n en la memoria."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21009.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21009.json
index ca138d47974..b013b252fa6 100644
--- a/CVE-2025/CVE-2025-210xx/CVE-2025-21009.json
+++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21009.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-21009",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2025-07-08T11:15:26.557",
- "lastModified": "2025-07-08T11:15:26.557",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read in decoding malformed frame header in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption."
+ },
+ {
+ "lang": "es",
+ "value": "La lectura fuera de los l\u00edmites en la decodificaci\u00f3n de un encabezado de marco mal formado en libsavsvc.so anterior a Android 15 permite que atacantes locales provoquen corrupci\u00f3n en la memoria."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21164.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21164.json
new file mode 100644
index 00000000000..32f4795775a
--- /dev/null
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21164.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-21164",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:31.990",
+ "lastModified": "2025-07-08T17:15:31.990",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-62.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21165.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21165.json
new file mode 100644
index 00000000000..9fbcae1f7c8
--- /dev/null
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21165.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-21165",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:32.210",
+ "lastModified": "2025-07-08T17:15:32.210",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-62.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21166.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21166.json
new file mode 100644
index 00000000000..731f8cb34d0
--- /dev/null
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21166.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-21166",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:32.417",
+ "lastModified": "2025-07-08T17:15:32.417",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-62.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21167.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21167.json
new file mode 100644
index 00000000000..c1c2936367d
--- /dev/null
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21167.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-21167",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:32.630",
+ "lastModified": "2025-07-08T17:15:32.630",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-62.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21168.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21168.json
new file mode 100644
index 00000000000..388416f4f56
--- /dev/null
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21168.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-21168",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:32.837",
+ "lastModified": "2025-07-08T17:15:32.837",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-62.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json
index fc9ab7e4c04..1d51362e794 100644
--- a/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21174",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:15:44.667",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:12:07.337",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21174",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21195.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21195.json
new file mode 100644
index 00000000000..82fab56b5e7
--- /dev/null
+++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21195.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-21195",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:33.037",
+ "lastModified": "2025-07-08T17:15:33.037",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper link resolution before file access ('link following') in Service Fabric allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H",
+ "baseScore": 6.0,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21195",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json
index bf388cbaa02..8dffc996e2d 100644
--- a/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json
+++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21384",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-01T01:15:17.127",
- "lastModified": "2025-04-01T20:26:11.547",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:15:46.383",
+ "vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
@@ -26,7 +26,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
@@ -43,6 +43,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
}
]
},
@@ -56,12 +76,42 @@
"value": "CWE-693"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:azure_health_bot:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03C68B90-30D0-4FDE-86B2-1FA1AA534BB7"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21384",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21422.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21422.json
index 99968368d14..f44ac26a5c2 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21422.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21422.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21422",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.193",
- "lastModified": "2025-07-08T13:15:29.193",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21426.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21426.json
index fc7f417a315..0bc50959f56 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21426.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21426.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21426",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.380",
- "lastModified": "2025-07-08T13:15:29.380",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21427.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21427.json
index b7779ad9eb4..1097aebf1ff 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21427.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21427.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21427",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.533",
- "lastModified": "2025-07-08T13:15:29.533",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21432.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21432.json
index da812ac09ec..a2e74b13039 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21432.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21432.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21432",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.703",
- "lastModified": "2025-07-08T13:15:29.703",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21433.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21433.json
index a4739baf65f..bbe1330ae69 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21433.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21433.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21433",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:29.890",
- "lastModified": "2025-07-08T13:15:29.890",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21444.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21444.json
index 2f4df7230f9..1a1af2c543f 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21444.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21444.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21444",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.073",
- "lastModified": "2025-07-08T13:15:30.073",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21445.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21445.json
index dfdef2cf3e4..1fcbbad2c0e 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21445.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21445.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21445",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.227",
- "lastModified": "2025-07-08T13:15:30.227",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21446.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21446.json
index 51f9e8835cc..d7163002aa2 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21446.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21446.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21446",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.387",
- "lastModified": "2025-07-08T13:15:30.387",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21449.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21449.json
index 7e14658e784..64bfe4a7da8 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21449.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21449.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21449",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.567",
- "lastModified": "2025-07-08T13:15:30.567",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21450.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21450.json
index c7446ff2e65..84758ba44f5 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21450.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21450.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21450",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.740",
- "lastModified": "2025-07-08T13:15:30.740",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21454.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21454.json
index 190d7447dcc..6515682db82 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21454.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21454.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21454",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:30.907",
- "lastModified": "2025-07-08T13:15:30.907",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21466.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21466.json
index 33654cf3dea..5aad2cd194d 100644
--- a/CVE-2025/CVE-2025-214xx/CVE-2025-21466.json
+++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21466.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21466",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.080",
- "lastModified": "2025-07-08T13:15:31.080",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json
index 8d3bb0b1567..92c38bbf86f 100644
--- a/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json
+++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-22398",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T02:15:14.063",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:33:14.673",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json
index 6d04481f7b6..47d48dd0688 100644
--- a/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json
+++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-22659",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-27T15:15:58.283",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:33:37.550",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
}
]
},
@@ -51,10 +71,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:themeisle:orbit_fox:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.10.44",
+ "matchCriteriaId": "9130068E-CD9D-400B-BA89-0C9BC202F26C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/themeisle-companion/vulnerability/wordpress-orbit-fox-by-themeisle-plugin-2-10-44-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23364.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23364.json
index 81d348ff4d5..3ddc0310aea 100644
--- a/CVE-2025/CVE-2025-233xx/CVE-2025-23364.json
+++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23364.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-23364",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:26.683",
- "lastModified": "2025-07-08T11:15:26.683",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in TIA Administrator (All versions < V3.0.6). The affected application improperly validates code signing certificates.\r\nThis could allow an attacker to bypass the check and exceute arbitrary code during installations."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en TIA Administrator (todas las versiones anteriores a la V3.0.6). La aplicaci\u00f3n afectada valida incorrectamente los certificados de firma de c\u00f3digo. Esto podr\u00eda permitir que un atacante omita la comprobaci\u00f3n y ejecute c\u00f3digo arbitrario durante las instalaciones."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23365.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23365.json
index d148a95b52e..07e905f4ac6 100644
--- a/CVE-2025/CVE-2025-233xx/CVE-2025-23365.json
+++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23365.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-23365",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:26.860",
- "lastModified": "2025-07-08T11:15:26.860",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in TIA Administrator (All versions < V3.0.6). The affected application allows low-privileged users to trigger installations by overwriting cache files and modifying the downloads path. This would allow an attacker to escalate privilege and exceute arbitrary code."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en TIA Administrator (todas las versiones anteriores a la V3.0.6). La aplicaci\u00f3n afectada permite a usuarios con pocos privilegios activar instalaciones sobrescribiendo archivos de cach\u00e9 y modificando la ruta de descarga. Esto permitir\u00eda a un atacante escalar privilegios y ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json
index c4d2f238a1d..e3d07baee0c 100644
--- a/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json
+++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-23383",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:17.297",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:55.733",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23968.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23968.json
index 8d3921af9d2..de42712cbd8 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23968.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23968.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-23968",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-03T19:15:23.043",
- "lastModified": "2025-07-07T09:15:24.970",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23970.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23970.json
index 6d3278e0101..43590e0fc02 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23970.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23970.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-23970",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:25.697",
- "lastModified": "2025-07-04T12:15:25.697",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Privilege Assignment vulnerability in aonetheme Service Finder Booking allows Privilege Escalation. This issue affects Service Finder Booking: from n/a through 6.0."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en aonetheme Service Finder Booking permite la escalada de privilegios. Este problema afecta a la reserva de Service Finder desde la versi\u00f3n n/d hasta la 6.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23972.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23972.json
index f4f22c58806..798a296006a 100644
--- a/CVE-2025/CVE-2025-239xx/CVE-2025-23972.json
+++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23972.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-23972",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:25.540",
- "lastModified": "2025-07-04T09:15:25.540",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24002.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24002.json
index b0604240332..8340e448da6 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24002.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24002.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24002",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:23.473",
- "lastModified": "2025-07-08T07:15:23.473",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-service for these stations until they got restarted by the watchdog."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto no autenticado puede usar mensajes MQTT para bloquear un servicio en estaciones de carga que cumplen con la Ley de Calibraci\u00f3n Alemana, lo que genera una denegaci\u00f3n de servicio temporal para estas estaciones hasta que sean reiniciadas por el organismo de control."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24003.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24003.json
index 1e8fd173788..31385ac7a31 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24003.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24003.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24003",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:23.943",
- "lastModified": "2025-07-08T07:15:23.943",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integrity for only EichrechtAgents and potential denial-of-service for these stations."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto no autenticado puede usar mensajes MQTT para activar escrituras fuera de los l\u00edmites en estaciones de carga que cumplen con la Ley de calibraci\u00f3n alemana, lo que genera una p\u00e9rdida de integridad solo para EichrechtAgents y una posible denegaci\u00f3n de servicio para estas estaciones."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24004.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24004.json
index 890b64c26bd..6f5a75c1a4a 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24004.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24004.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24004",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:24.127",
- "lastModified": "2025-07-08T07:15:24.127",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a temporary denial-of-service for the stations until they got restarted by the watchdog."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante f\u00edsico con acceso a la pantalla del dispositivo a trav\u00e9s de USB-C puede enviar un mensaje al dispositivo que activa una copia no segura a un b\u00fafer, lo que genera una p\u00e9rdida de integridad y una denegaci\u00f3n de servicio temporal para las estaciones hasta que sean reiniciadas por el organismo de control."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24005.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24005.json
index f0fa6592353..40227b0e20d 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24005.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24005.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24005",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:24.303",
- "lastModified": "2025-07-08T07:15:24.303",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante local con una cuenta de usuario local puede aprovechar un script vulnerable a trav\u00e9s de SSH para escalar privilegios a root debido a una validaci\u00f3n de entrada incorrecta."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24006.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24006.json
index e59e8500a3b..305f6097a4e 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24006.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24006.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24006",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:24.493",
- "lastModified": "2025-07-08T07:15:24.493",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante local con pocos privilegios puede aprovechar permisos inseguros a trav\u00e9s de SSH en los dispositivos afectados para escalar privilegios a root."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24065.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24065.json
index 9c3f3c5667e..913ed011683 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24065.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24065.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24065",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:21:08.970",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:11:46.830",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,91 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24068.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24068.json
index 55773b8b319..3f050153a67 100644
--- a/CVE-2025/CVE-2025-240xx/CVE-2025-24068.json
+++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24068.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24068",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:21:11.880",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:11:50.247",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,121 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json
index 531b022b058..fa05a2acbe0 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24377",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:17.460",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:51.783",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json
index 482a10e6296..40b6f94c52c 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24378",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:17.617",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:45.970",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json
index 3a2a35beccd..295d8726398 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24379",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:17.783",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:40.003",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json
index df96861a136..e2d4ff3356c 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24380",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:17.953",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:33.037",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json
index c94f2be0a4b..9904b37c846 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24381",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:18.120",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:28.740",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json
index 76bec758dab..c7f485f4873 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24382",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T02:15:14.217",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:33:10.570",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json
index a6a42d04bb0..a137e8ff62c 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24383",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T02:15:14.367",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:33:05.830",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json
index bfc5c442801..93da8fe2665 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24385",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:18.453",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:24.280",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json
index ef5763152fe..41d6cbd34e6 100644
--- a/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json
+++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24386",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-03-28T03:15:18.620",
- "lastModified": "2025-03-28T18:11:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:32:16.767",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.5.0.0.5.259",
+ "matchCriteriaId": "F0F4FF8F-1F14-4E5F-ADBD-AEA2C8494BE4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24474.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24474.json
index bc9ee1a31c5..a197395fdf2 100644
--- a/CVE-2025/CVE-2025-244xx/CVE-2025-24474.json
+++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24474.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24474",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-07-08T15:15:26.220",
- "lastModified": "2025-07-08T15:15:26.220",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24508.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24508.json
index b44646bdadd..6fe0845f7d8 100644
--- a/CVE-2025/CVE-2025-245xx/CVE-2025-24508.json
+++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24508.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24508",
"sourceIdentifier": "secure@symantec.com",
"published": "2025-07-07T05:15:41.547",
- "lastModified": "2025-07-07T18:15:26.950",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Extraction of Account Connectivity Credentials (ACCs) from the IT Management Agent secure storage"
+ },
+ {
+ "lang": "es",
+ "value": "Extracci\u00f3n de credenciales de conectividad de cuenta (ACC) del almacenamiento seguro del agente de administraci\u00f3n de TI"
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24735.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24735.json
index 6158c2a1247..12d26121910 100644
--- a/CVE-2025/CVE-2025-247xx/CVE-2025-24735.json
+++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24735.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24735",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:26.210",
- "lastModified": "2025-07-04T09:15:26.210",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24748.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24748.json
index c3eea9a4d38..76fc6b57d39 100644
--- a/CVE-2025/CVE-2025-247xx/CVE-2025-24748.json
+++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24748.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24748",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:26.970",
- "lastModified": "2025-07-04T09:15:26.970",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24757.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24757.json
index 46f8909a69a..4fe3990b6d7 100644
--- a/CVE-2025/CVE-2025-247xx/CVE-2025-24757.json
+++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24757.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24757",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:27.197",
- "lastModified": "2025-07-04T09:15:27.197",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24764.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24764.json
index 8f45b7a2e92..692e2067b9e 100644
--- a/CVE-2025/CVE-2025-247xx/CVE-2025-24764.json
+++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24764.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-24764",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:27.870",
- "lastModified": "2025-07-04T09:15:27.870",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24771.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24771.json
index d4838136938..174a6b655b0 100644
--- a/CVE-2025/CVE-2025-247xx/CVE-2025-24771.json
+++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24771.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24771",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:26.320",
- "lastModified": "2025-07-04T12:15:26.320",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Content Manager Light allows Reflected XSS. This issue affects Content Manager Light: from n/a through 3.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en OTWthemes Content Manager Light permite XSS reflejado. Este problema afecta a Content Manager Light desde n/d hasta la versi\u00f3n 3.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24780.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24780.json
index 0fb73706cd2..ac82c1848c2 100644
--- a/CVE-2025/CVE-2025-247xx/CVE-2025-24780.json
+++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24780.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-24780",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:26.500",
- "lastModified": "2025-07-04T12:15:26.500",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in printcart Printcart Web to Print Product Designer for WooCommerce allows SQL Injection. This issue affects Printcart Web to Print Product Designer for WooCommerce: from n/a through 2.4.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en printcart Printcart Web to Print Product Designer for WooCommerce permite la inyecci\u00f3n SQL. Este problema afecta a Printcart Web to Print Product Designer para WooCommerce: desde n/d hasta la versi\u00f3n 2.4.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25268.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25268.json
index 66b2553598d..d003551672a 100644
--- a/CVE-2025/CVE-2025-252xx/CVE-2025-25268.json
+++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25268.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-25268",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:24.693",
- "lastModified": "2025-07-08T07:15:24.693",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante adyacente no autenticado puede modificar la configuraci\u00f3n enviando solicitudes espec\u00edficas a un endpoint de API, lo que genera acceso de lectura y escritura debido a la falta de autenticaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25269.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25269.json
index f4638e93775..0a928df505d 100644
--- a/CVE-2025/CVE-2025-252xx/CVE-2025-25269.json
+++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25269.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-25269",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:24.890",
- "lastModified": "2025-07-08T07:15:24.890",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante local no autenticado puede inyectar un comando que posteriormente se ejecuta como root, lo que provoca una escalada de privilegios."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25270.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25270.json
index c1d46d4b96f..bb02aff1176 100644
--- a/CVE-2025/CVE-2025-252xx/CVE-2025-25270.json
+++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25270.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-25270",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:25.080",
- "lastModified": "2025-07-08T07:15:25.080",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto no autenticado puede alterar la configuraci\u00f3n del dispositivo de manera tal de obtener la ejecuci\u00f3n remota de c\u00f3digo como root con configuraciones espec\u00edficas."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25271.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25271.json
index fc39a17e930..e9ca9d9f4ac 100644
--- a/CVE-2025/CVE-2025-252xx/CVE-2025-25271.json
+++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25271.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-25271",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:25.270",
- "lastModified": "2025-07-08T07:15:25.270",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante adyacente no autenticado puede configurar un nuevo backend OCPP, debido a valores predeterminados inseguros para la interfaz de configuraci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26591.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26591.json
index 81db8018c73..722d1410cea 100644
--- a/CVE-2025/CVE-2025-265xx/CVE-2025-26591.json
+++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26591.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-26591",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:28.517",
- "lastModified": "2025-07-04T09:15:28.517",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26636.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26636.json
new file mode 100644
index 00000000000..e6f39d446f7
--- /dev/null
+++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26636.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-26636",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:33.793",
+ "lastModified": "2025-07-08T17:15:33.793",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Processor optimization removal or modification of security-critical code in Windows Kernel allows an authorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1037"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26636",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26780.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26780.json
index ca075272e80..ecb6eb4cefa 100644
--- a/CVE-2025/CVE-2025-267xx/CVE-2025-26780.json
+++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26780.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-26780",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:22.683",
- "lastModified": "2025-07-07T16:15:22.683",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in L2 in Samsung Mobile Processor and Modem Exynos 2400 and Modem 5400. The lack of a length check leads to a Denial of Service via a malformed PDCP packet."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en L2 en Samsung Mobile Processor y Modem Exynos 2400 y m\u00f3dem 5400. La falta de una verificaci\u00f3n de longitud conduce a una denegaci\u00f3n de servicio a trav\u00e9s de un paquete PDCP mal formado."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26850.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26850.json
index 165187b07eb..343b982a60f 100644
--- a/CVE-2025/CVE-2025-268xx/CVE-2025-26850.json
+++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26850.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-26850",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T00:15:22.670",
- "lastModified": "2025-07-05T00:15:22.670",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The agent in Quest KACE Systems Management Appliance (SMA) before 14.0.97 and 14.1.x before 14.1.19 potentially allows privilege escalation on managed systems."
+ },
+ {
+ "lang": "es",
+ "value": "El agente en Quest KACE Systems Management Appliance (SMA) anterior a 14.0.97 y 14.1.x anterior a 14.1.19 potencialmente permite la escalada de privilegios en sistemas administrados."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27042.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27042.json
index 3a9b5b07daf..8bdf1499320 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27042.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27042.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27042",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.240",
- "lastModified": "2025-07-08T13:15:31.240",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27043.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27043.json
index b8de4172638..485ab07391d 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27043.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27043.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27043",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.430",
- "lastModified": "2025-07-08T13:15:31.430",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27044.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27044.json
index 43db9f817df..5c672f040fd 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27044.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27044.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27044",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.603",
- "lastModified": "2025-07-08T13:15:31.603",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27046.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27046.json
index 7bac5336286..d191c4960da 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27046.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27046.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27046",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.760",
- "lastModified": "2025-07-08T13:15:31.760",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27047.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27047.json
index fb9dec8b6a4..f0b89be3435 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27047.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27047.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27047",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:31.913",
- "lastModified": "2025-07-08T13:15:31.913",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27050.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27050.json
index 6a1fa597e7e..43e7b501d8e 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27050.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27050.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27050",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.070",
- "lastModified": "2025-07-08T13:15:32.070",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27051.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27051.json
index 9232dd25dbc..fecdaab31cf 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27051.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27051.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27051",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.233",
- "lastModified": "2025-07-08T13:15:32.233",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27052.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27052.json
index 5d25a908195..8dc44eb4b63 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27052.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27052.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27052",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.397",
- "lastModified": "2025-07-08T13:15:32.397",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27055.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27055.json
index 0b73f662284..b8a75d67071 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27055.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27055.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27055",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.570",
- "lastModified": "2025-07-08T13:15:32.570",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27056.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27056.json
index 788cd862449..3bae93643c9 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27056.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27056.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27056",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.730",
- "lastModified": "2025-07-08T13:15:32.730",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27057.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27057.json
index 9bc759fca6c..bd7e3af2a71 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27057.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27057.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27057",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:32.910",
- "lastModified": "2025-07-08T13:15:32.910",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27058.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27058.json
index 55d5a5d984b..60bb5ea6d80 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27058.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27058.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27058",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:33.153",
- "lastModified": "2025-07-08T13:15:33.153",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27061.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27061.json
index 59acf5e86b9..a8596f561b7 100644
--- a/CVE-2025/CVE-2025-270xx/CVE-2025-27061.json
+++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27061.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27061",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-07-08T13:15:33.447",
- "lastModified": "2025-07-08T13:15:33.447",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27127.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27127.json
index 2ca8c51e3ae..decf54c3742 100644
--- a/CVE-2025/CVE-2025-271xx/CVE-2025-27127.json
+++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27127.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-27127",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:27.070",
- "lastModified": "2025-07-08T11:15:27.070",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in TIA Project-Server (All versions < V2.1.1), TIA Project-Server V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions), Totally Integrated Automation Portal (TIA Portal) V20 (All versions < V20 Update 3). The affected application improperly handles uploaded projects in the document root. This could allow an attacker with contributor privileges to cause denial of service by uploading a malicious project."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en TIA Project-Server (todas las versiones anteriores a V2.1.1), TIA Project-Server V17 (todas las versiones), Totally Integrated Automation Portal (TIA Portal) V17 (todas las versiones), Totally Integrated Automation Portal (TIA Portal) V18 (todas las versiones), Totally Integrated Automation Portal (TIA Portal) V19 (todas las versiones) y Totally Integrated Automation Portal (TIA Portal) V20 (todas las versiones anteriores a V20 Update 3). La aplicaci\u00f3n afectada gestiona incorrectamente los proyectos cargados en la ra\u00edz del documento. Esto podr\u00eda permitir que un atacante con privilegios de colaborador provoque una denegaci\u00f3n de servicio al cargar un proyecto malicioso."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json
index ad1876ef93c..794b1cb19a4 100644
--- a/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json
+++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27130",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-04-01T09:15:15.657",
- "lastModified": "2025-04-01T20:26:11.547",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:09:54.687",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
@@ -51,14 +73,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.11.6",
+ "matchCriteriaId": "13E0F55E-283E-43AC-8B00-E67721935375"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN87266215/",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.welcart.com/archives/23868.html",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27326.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27326.json
index c4afdef9e2d..ff5f285bba2 100644
--- a/CVE-2025/CVE-2025-273xx/CVE-2025-27326.json
+++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27326.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27326",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:28.727",
- "lastModified": "2025-07-04T09:15:28.727",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27358.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27358.json
index 54ae948eec8..207c559a808 100644
--- a/CVE-2025/CVE-2025-273xx/CVE-2025-27358.json
+++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27358.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27358",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:29.277",
- "lastModified": "2025-07-07T09:15:25.140",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27446.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27446.json
index 2b38952f9f2..72204fbb87e 100644
--- a/CVE-2025/CVE-2025-274xx/CVE-2025-27446.json
+++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27446.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-27446",
"sourceIdentifier": "security@apache.org",
"published": "2025-07-06T06:15:21.587",
- "lastModified": "2025-07-06T06:15:21.587",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in Apache APISIX(java-plugin-runner).\n\nLocal listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges.\nThis issue affects Apache APISIX(java-plugin-runner): from 0.2.0 through 0.5.0.\n\nUsers are recommended to upgrade to version 0.6.0 or higher, which fixes the issue."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de asignaci\u00f3n incorrecta de permisos para recursos cr\u00edticos en Apache APISIX(java-plugin-runner). Los permisos de los archivos de escucha locales en el ejecutor de complementos de APISIX permiten a un atacante local elevar privilegios. Este problema afecta a Apache APISIX(java-plugin-runner): de la 0.2.0 a la 0.5.0. Se recomienda actualizar a la versi\u00f3n 0.6.0 o superior, que soluciona el problema."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json
index 990b36ebff0..abc7f00bd8c 100644
--- a/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json
+++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27485",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:15:59.300",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:14:04.910",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27485",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json
index 43235c49ec4..c4b9423a94a 100644
--- a/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json
+++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27486",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:15:59.450",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:14:17.177",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27486",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json
index a2a3565bde0..e138dd079af 100644
--- a/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json
+++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27490",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:15:59.953",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:15:27.283",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -55,10 +55,73 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5737",
+ "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5737",
+ "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1551",
+ "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27490",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json
index 2c2d186cfca..a0503927ba8 100644
--- a/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json
+++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27491",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:00.140",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:16:00.837",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,121 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.20978",
+ "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.20978",
+ "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5737",
+ "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5737",
+ "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1551",
+ "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json
index a6e3de8fb6e..de0ed56c922 100644
--- a/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json
+++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27492",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:00.313",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:16:11.407",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -55,10 +55,61 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1551",
+ "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27492",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json
index 2dbc401ec38..6c62b984e98 100644
--- a/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json
+++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27727",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:00.477",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:28:26.697",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,146 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.20978",
+ "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.20978",
+ "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5737",
+ "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5737",
+ "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
+ "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
+ "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
+ "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1551",
+ "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json
index 1b6d46c6a5d..05c03634297 100644
--- a/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json
+++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27728",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:00.653",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:29:09.757",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,37 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27728",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json
index 0d32af72d5f..d3c60984eb9 100644
--- a/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json
+++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27729",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:00.813",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:30:00.247",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,61 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5737",
+ "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5737",
+ "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json
index cc8773e892d..3b0541faa83 100644
--- a/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json
+++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27730",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:00.990",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:57:21.603",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -55,10 +55,85 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5737",
+ "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5737",
+ "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1551",
+ "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27730",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json
index cd312403b56..9889629dcf1 100644
--- a/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json
+++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27731",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:01.163",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:09:36.627",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,91 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5737",
+ "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5737",
+ "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1551",
+ "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27731",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json
index 20a74670314..0018a6d20d6 100644
--- a/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json
+++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-27732",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:01.333",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:10:00.610",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,158 @@
"value": "CWE-591"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-667"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.20978",
+ "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.20978",
+ "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5737",
+ "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5737",
+ "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5189",
+ "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5189",
+ "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
+ "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
+ "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
+ "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.7969",
+ "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7136",
+ "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3453",
+ "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1551",
+ "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.3775",
+ "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2793.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2793.json
index 8a9cbf3dbd2..d96ed10a23f 100644
--- a/CVE-2025/CVE-2025-27xx/CVE-2025-2793.json
+++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2793.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2793",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-08T15:15:27.023",
- "lastModified": "2025-07-08T15:15:27.023",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28951.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28951.json
index 4f8c3e6bac2..6bd4dc6acf9 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28951.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28951.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-28951",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:29.500",
- "lastModified": "2025-07-04T09:15:29.500",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28957.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28957.json
index ba28bde0df7..af3aaab257e 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28957.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28957.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-28957",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:30.007",
- "lastModified": "2025-07-04T09:15:30.007",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28963.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28963.json
index 7262b5629f3..f9324a533c1 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28963.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28963.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-28963",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:30.260",
- "lastModified": "2025-07-04T09:15:30.260",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28967.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28967.json
index 7a1d47f300d..382a3de95b1 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28967.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28967.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-28967",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:30.760",
- "lastModified": "2025-07-04T09:15:30.760",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28968.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28968.json
index eed0726bd84..5f72bf9eaad 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28968.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28968.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-28968",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:26.693",
- "lastModified": "2025-07-04T12:15:26.693",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vladimir Prelovac WP Wall allows Reflected XSS. This issue affects WP Wall: from n/a through 1.7.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Vladimir Prelovac WP Wall permite XSS reflejado. Este problema afecta a WP Wall desde n/d hasta la versi\u00f3n 1.7.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28969.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28969.json
index 124d9368d59..e2d3fd75ce6 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28969.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28969.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-28969",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:31.183",
- "lastModified": "2025-07-04T09:15:31.183",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28971.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28971.json
index 72f8a692157..e454f51a76e 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28971.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28971.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-28971",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:31.507",
- "lastModified": "2025-07-04T09:15:31.507",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28976.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28976.json
index 36ccc11cb6d..4fa22465cf9 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28976.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28976.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-28976",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:26.877",
- "lastModified": "2025-07-04T12:15:26.877",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dsrodzin Email Address Security by WebEmailProtector allows Stored XSS. This issue affects Email Address Security by WebEmailProtector: from n/a through 3.3.6."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ddsrodzin Email Address Security by WebEmailProtector permite XSS almacenado. Este problema afecta a Email Address Security de WebEmailProtector desde n/d hasta la versi\u00f3n 3.3.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28978.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28978.json
index 18f567598c2..0874bc435da 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28978.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28978.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-28978",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:27.053",
- "lastModified": "2025-07-04T12:15:27.053",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hung Trang Si SB Breadcrumbs allows Reflected XSS. This issue affects SB Breadcrumbs: from n/a through 1.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Hung Trang Si SB Breadcrumbs permite XSS reflejado. Este problema afecta a SB Breadcrumbs desde n/d hasta la versi\u00f3n 1.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28980.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28980.json
index 58e1f28156e..8df711d320b 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28980.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28980.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-28980",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:27.233",
- "lastModified": "2025-07-04T12:15:27.233",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in machouinard Aviation Weather from NOAA allows Path Traversal. This issue affects Aviation Weather from NOAA: from n/a through 0.7.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en machouinard Aviation Weather from NOAA permite Path Traversal. Este problema afecta a Aviation Weather de la NOAA desde n/d hasta la versi\u00f3n 0.7.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28983.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28983.json
index 37427f606d9..29afc1dbe04 100644
--- a/CVE-2025/CVE-2025-289xx/CVE-2025-28983.json
+++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28983.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-28983",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:27.437",
- "lastModified": "2025-07-04T12:15:27.437",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickandPledge Click & Pledge Connect allows Privilege Escalation. This issue affects Click & Pledge Connect: from 25.04010101 through WP6.8."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en ClickandPledge Click & Pledge Connect permite la escalada de privilegios. Este problema afecta a Click & Pledge Connect desde la versi\u00f3n 25.04010101 hasta WP6.8."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2827.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2827.json
index 4f47ce3fced..3e46009d003 100644
--- a/CVE-2025/CVE-2025-28xx/CVE-2025-2827.json
+++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2827.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2827",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-08T15:15:27.190",
- "lastModified": "2025-07-08T15:15:27.190",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29001.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29001.json
index b5149eb9a05..a14e54d134f 100644
--- a/CVE-2025/CVE-2025-290xx/CVE-2025-29001.json
+++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29001.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29001",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:32.110",
- "lastModified": "2025-07-04T09:15:32.110",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29007.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29007.json
index 1ea5cd7120b..726dd848cda 100644
--- a/CVE-2025/CVE-2025-290xx/CVE-2025-29007.json
+++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29007.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29007",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:32.653",
- "lastModified": "2025-07-04T09:15:32.653",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29012.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29012.json
index f247dec4c5f..ac212ac0c52 100644
--- a/CVE-2025/CVE-2025-290xx/CVE-2025-29012.json
+++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29012.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29012",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:32.900",
- "lastModified": "2025-07-04T09:15:32.900",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-292xx/CVE-2025-29267.json b/CVE-2025/CVE-2025-292xx/CVE-2025-29267.json
index f12698665e5..93135584f5d 100644
--- a/CVE-2025/CVE-2025-292xx/CVE-2025-29267.json
+++ b/CVE-2025/CVE-2025-292xx/CVE-2025-29267.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29267",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-08T15:15:26.827",
- "lastModified": "2025-07-08T15:15:26.827",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29817.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29817.json
index 726e2101c5f..e33c473bf54 100644
--- a/CVE-2025/CVE-2025-298xx/CVE-2025-29817.json
+++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29817.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29817",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-15T17:15:48.873",
- "lastModified": "2025-04-15T18:39:27.967",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:26:03.653",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.51.349.24355",
+ "matchCriteriaId": "521C8D25-648F-4E5D-8AA8-EEF7EDCEF21F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29817",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json
index 93ddfc7040f..747a324d177 100644
--- a/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json
+++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29820",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:07.683",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:11:44.570",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,90 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
+ "matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
+ "matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
+ "matchCriteriaId": "72324216-4EB3-4243-A007-FEF3133C7DF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
+ "matchCriteriaId": "0FBB0E61-7997-4F26-9C07-54912D3F1C10"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
+ "matchCriteriaId": "CF5DDD09-902E-4881-98D0-CB896333B4AA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
+ "matchCriteriaId": "26A3B226-5D7C-4556-9350-5222DC8EFC2C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
+ "matchCriteriaId": "851BAC4E-9965-4F40-9A6C-B73D9004F4C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
+ "matchCriteriaId": "23B2FA23-76F4-4D83-A718-B8D04D7EA37B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
+ "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
+ "matchCriteriaId": "D31E509A-0B2E-4B41-88C4-0099E800AFE6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
+ "matchCriteriaId": "017A7041-BEF1-4E4E-AC8A-EFC6AFEB01FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
+ "matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C082CC4-6128-475D-BC19-B239E348FDB2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29820",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json
index 77632d3433f..06ff66102e7 100644
--- a/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json
+++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29822",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:08.023",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:12:21.260",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,75 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
+ "matchCriteriaId": "CF5DDD09-902E-4881-98D0-CB896333B4AA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
+ "matchCriteriaId": "26A3B226-5D7C-4556-9350-5222DC8EFC2C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
+ "matchCriteriaId": "851BAC4E-9965-4F40-9A6C-B73D9004F4C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
+ "matchCriteriaId": "23B2FA23-76F4-4D83-A718-B8D04D7EA37B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
+ "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
+ "matchCriteriaId": "D31E509A-0B2E-4B41-88C4-0099E800AFE6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
+ "matchCriteriaId": "017A7041-BEF1-4E4E-AC8A-EFC6AFEB01FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
+ "matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:onenote:-:*:*:*:*:macos:*:*",
+ "matchCriteriaId": "C4EC14DE-82C6-495B-BFD8-8D1FA781D50F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:onenote:2016:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80F1EA3D-FD2D-4CB2-A93A-DFAD3187AFC3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29822",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json
index c8318c0b3f3..6cda8f68ffd 100644
--- a/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json
+++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29823",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-08T18:16:08.190",
- "lastModified": "2025-04-09T20:03:01.577",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:12:36.883",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,35 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
+ "matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
+ "matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29823",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29825.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29825.json
index caf50215dce..9348770e4d7 100644
--- a/CVE-2025/CVE-2025-298xx/CVE-2025-29825.json
+++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29825.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29825",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-05-02T02:15:16.317",
- "lastModified": "2025-05-02T13:52:51.693",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:24:46.700",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "136.0.3240.50",
+ "matchCriteriaId": "C2DB6DAE-A8E1-4250-9584-963470F1180D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29825",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29834.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29834.json
index 6734fc60228..48a773c77e0 100644
--- a/CVE-2025/CVE-2025-298xx/CVE-2025-29834.json
+++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29834.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29834",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-12T02:15:22.027",
- "lastModified": "2025-04-15T18:39:43.697",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:24:30.860",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "134.0.3124.93",
+ "matchCriteriaId": "C3C8F1D7-451C-49ED-BF81-31CBC67BAF72"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29834",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30929.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30929.json
index ca60a4adcf9..289f8e64a4a 100644
--- a/CVE-2025/CVE-2025-309xx/CVE-2025-30929.json
+++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30929.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-30929",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:33.450",
- "lastModified": "2025-07-04T09:15:33.450",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30933.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30933.json
index 68cabef6fa7..77a94452afd 100644
--- a/CVE-2025/CVE-2025-309xx/CVE-2025-30933.json
+++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30933.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-30933",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:27.607",
- "lastModified": "2025-07-04T12:15:27.607",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in LiquidThemes LogisticsHub allows Upload a Web Shell to a Web Server. This issue affects LogisticsHub: from n/a through 1.1.6."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en LiquidThemes LogisticsHub permite cargar un Web Shell a un servidor web. Este problema afecta a LogisticsHub desde n/d hasta la versi\u00f3n 1.1.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30943.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30943.json
index 153997b0b68..d7478683a73 100644
--- a/CVE-2025/CVE-2025-309xx/CVE-2025-30943.json
+++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30943.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-30943",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:33.673",
- "lastModified": "2025-07-04T09:15:33.673",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30947.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30947.json
index 502e9c473fa..d794744d3ad 100644
--- a/CVE-2025/CVE-2025-309xx/CVE-2025-30947.json
+++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30947.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-30947",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:34.167",
- "lastModified": "2025-07-04T09:15:34.167",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30969.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30969.json
index f22555fb6d9..c4c23a46ffd 100644
--- a/CVE-2025/CVE-2025-309xx/CVE-2025-30969.json
+++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30969.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-30969",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:34.417",
- "lastModified": "2025-07-04T09:15:34.417",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30979.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30979.json
index b20dc75d59f..c3ec933858c 100644
--- a/CVE-2025/CVE-2025-309xx/CVE-2025-30979.json
+++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30979.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-30979",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:34.877",
- "lastModified": "2025-07-04T09:15:34.877",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30983.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30983.json
index a17becae995..bda9e10d959 100644
--- a/CVE-2025/CVE-2025-309xx/CVE-2025-30983.json
+++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30983.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-30983",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:35.120",
- "lastModified": "2025-07-04T09:15:35.120",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json
index 2ceec5aa0aa..d084db5db6e 100644
--- a/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json
+++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3044.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3044",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:26.717",
- "lastModified": "2025-07-07T16:15:23.013",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in version 0.12.28."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la clase ArxivReader del repositorio run-llama/llama_index, versiones hasta la v0.12.22.post1, permite colisiones de hash MD5 al generar nombres de archivo para art\u00edculos descargados. Esto puede provocar la p\u00e9rdida de datos, ya que art\u00edculos con t\u00edtulos id\u00e9nticos pero contenido diferente pueden sobrescribirse, impidiendo que algunos art\u00edculos se procesen para el entrenamiento de modelos de IA. El problema se ha resuelto en la versi\u00f3n 0.12.28."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3046.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3046.json
index 264904ca6c3..fccea4a5cdf 100644
--- a/CVE-2025/CVE-2025-30xx/CVE-2025-3046.json
+++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3046.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3046",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:26.900",
- "lastModified": "2025-07-07T14:15:24.130",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la clase `ObsidianReader` del repositorio run-llama/llama_index, versiones 0.12.23 a 0.12.28, permite la lectura arbitraria de archivos mediante enlaces simb\u00f3licos. `ObsidianReader` no resuelve los enlaces simb\u00f3licos a sus rutas reales ni valida si las rutas resueltas se encuentran dentro del directorio deseado. Esta falla permite a los atacantes colocar enlaces simb\u00f3licos que apuntan a archivos fuera del directorio de la b\u00f3veda, que se procesan como archivos Markdown v\u00e1lidos, lo que podr\u00eda exponer informaci\u00f3n confidencial."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31037.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31037.json
index 4eb1b6f493a..7c0bca35532 100644
--- a/CVE-2025/CVE-2025-310xx/CVE-2025-31037.json
+++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31037.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-31037",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:27.790",
- "lastModified": "2025-07-04T12:15:27.790",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in favethemes Homey allows Reflected XSS. This issue affects Homey: from n/a through 2.4.5."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en favethemes Homey permite XSS reflejado. Este problema afecta a Homey desde la versi\u00f3n n/d hasta la 2.4.5."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31326.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31326.json
index 226b9d9cc55..e2e4f132b60 100644
--- a/CVE-2025/CVE-2025-313xx/CVE-2025-31326.json
+++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31326.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-31326",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:21.810",
- "lastModified": "2025-07-08T01:15:21.810",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP\ufffdBusinessObjects Business\ufffdIntelligence Platform (Web Intelligence) is vulnerable to HTML Injection, allowing an attacker with basic user privileges to inject malicious code into specific input fields. This could lead to unintended redirects or manipulation of application behavior, such as redirecting users to attacker-controlled domains. This issue primarily affects the integrity of the system. However, the confidentiality and availability of the system remain unaffected."
+ },
+ {
+ "lang": "es",
+ "value": "SAP BusinessObjects Business Intelligence Platform (Web Intelligence) es vulnerable a la inyecci\u00f3n de HTML, lo que permite a un atacante con privilegios de usuario b\u00e1sicos inyectar c\u00f3digo malicioso en campos de entrada espec\u00edficos. Esto podr\u00eda provocar redirecciones no deseadas o la manipulaci\u00f3n del comportamiento de la aplicaci\u00f3n, como redirigir a los usuarios a dominios controlados por el atacante. Este problema afecta principalmente a la integridad del sistema. Sin embargo, la confidencialidad y la disponibilidad del sistema permanecen intactas."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json
index 5658fec1cc3..7c2a8b1ce6e 100644
--- a/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json
+++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-31828",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-01T15:16:22.887",
- "lastModified": "2025-04-01T20:26:01.990",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:49:53.200",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
}
]
},
@@ -51,10 +71,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:easyappointments:easy\\!appointments:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.4.2",
+ "matchCriteriaId": "C9730E67-2C8F-447B-AD21-50C4D3279928"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/easyappointments/vulnerability/wordpress-easy-appointments-plugin-1-4-2-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3108.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3108.json
index fcd57b97e9f..890f5a4ab5b 100644
--- a/CVE-2025/CVE-2025-31xx/CVE-2025-3108.json
+++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3108.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3108",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-06T23:15:21.777",
- "lastModified": "2025-07-06T23:15:21.777",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad cr\u00edtica de deserializaci\u00f3n en el componente JsonPickleSerializer de la librer\u00eda run-llama/llama_index, que afecta a las versiones v0.12.27 a v0.12.40. Esta vulnerabilidad permite la ejecuci\u00f3n remota de c\u00f3digo debido a un mecanismo de respaldo inseguro al m\u00f3dulo pickle de Python. JsonPickleSerializer prioriza la deserializaci\u00f3n mediante pickle.loads(), que puede ejecutar c\u00f3digo arbitrario al procesar datos no confiables. Los atacantes pueden explotar esto manipulando payloads maliciosos para comprometer completamente el sistema. La causa principal incluye un mecanismo de respaldo inseguro, falta de validaci\u00f3n o salvaguardas, un dise\u00f1o enga\u00f1oso y la violaci\u00f3n de las directrices de seguridad de Python."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32023.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32023.json
index 105ab2a28a5..b386f3a84f9 100644
--- a/CVE-2025/CVE-2025-320xx/CVE-2025-32023.json
+++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32023.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-32023",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T16:15:22.830",
- "lastModified": "2025-07-07T16:15:22.830",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands."
+ },
+ {
+ "lang": "es",
+ "value": "Redis es una base de datos en memoria de c\u00f3digo abierto que persiste en el disco. Desde la versi\u00f3n 2.8 hasta versiones anteriores a la 8.0.3, 7.4.5, 7.2.10 y 6.2.19, un usuario autenticado pod\u00eda usar una cadena especialmente manipulada para activar una escritura fuera de los l\u00edmites de pila/mont\u00f3n en operaciones de hyperloglog, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. Es probable que el error afecte a todas las versiones de Redis con operaciones de hyperloglog implementadas. Esta vulnerabilidad se ha corregido en las versiones 8.0.3, 7.4.5, 7.2.10 y 6.2.19. Otra soluci\u00f3n alternativa para mitigar el problema sin parchear el ejecutable redis-server es impedir que los usuarios ejecuten operaciones de hyperloglog. Esto se puede lograr mediante ACL para restringir los comandos HLL."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32297.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32297.json
index 5f445ccffeb..ef8e4958b31 100644
--- a/CVE-2025/CVE-2025-322xx/CVE-2025-32297.json
+++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32297.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-32297",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:27.980",
- "lastModified": "2025-07-04T12:15:27.980",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in quantumcloud Simple Link Directory allows SQL Injection. This issue affects Simple Link Directory: from n/a through 14.7.3."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en quantumcloud Simple Link Directory permite la inyecci\u00f3n SQL. Este problema afecta a Simple Link Directory desde n/d hasta la versi\u00f3n 14.7.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32311.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32311.json
index c7634e37b7c..9f796c0dee4 100644
--- a/CVE-2025/CVE-2025-323xx/CVE-2025-32311.json
+++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32311.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-32311",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:28.163",
- "lastModified": "2025-07-04T12:15:28.163",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs Pressroom - News Magazine WordPress Theme allows Reflected XSS. This issue affects Pressroom - News Magazine WordPress Theme: from n/a through 6.9."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en QuanticaLabs Pressroom - News Magazine WordPress Theme permite XSS reflejado. Este problema afecta al tema de WordPress para revistas de noticias Pressroom desde n/d hasta la versi\u00f3n 6.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32719.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32719.json
index c7449012c18..a976a9edf0b 100644
--- a/CVE-2025/CVE-2025-327xx/CVE-2025-32719.json
+++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32719.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-32719",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:00.110",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:19:14.697",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,121 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32720.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32720.json
index dd8e2b452cc..6d6c415fc41 100644
--- a/CVE-2025/CVE-2025-327xx/CVE-2025-32720.json
+++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32720.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-32720",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:02.053",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:21:38.380",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,126 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32726.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32726.json
index 01cdc4b9614..6d878c8c869 100644
--- a/CVE-2025/CVE-2025-327xx/CVE-2025-32726.json
+++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32726.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-32726",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-04-12T02:15:22.180",
- "lastModified": "2025-04-15T18:39:43.697",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:12:50.770",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.99.1",
+ "matchCriteriaId": "77EFA878-2861-4C42-BAB7-6B02AA48575B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32726",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32918.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32918.json
index 3017a5658ce..d3fb93f1869 100644
--- a/CVE-2025/CVE-2025-329xx/CVE-2025-32918.json
+++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32918.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-32918",
"sourceIdentifier": "security@checkmk.com",
"published": "2025-07-04T08:15:25.520",
- "lastModified": "2025-07-04T08:15:25.520",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3225.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3225.json
index 68b4bb9ec03..3790152a2c8 100644
--- a/CVE-2025/CVE-2025-32xx/CVE-2025-3225.json
+++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3225.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3225",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.047",
- "lastModified": "2025-07-07T10:15:27.047",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XML Entity Expansion vulnerability, also known as a 'billion laughs' attack, exists in the sitemap parser of the run-llama/llama_index repository, specifically affecting version v0.12.21. This vulnerability allows an attacker to supply a malicious Sitemap XML, leading to a Denial of Service (DoS) by exhausting system memory and potentially causing a system crash. The issue is resolved in version v0.12.29."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de expansi\u00f3n de entidades XML, tambi\u00e9n conocida como ataque de \"billion laughs\", en el analizador de mapas de sitio del repositorio run-llama/llama_index, que afecta espec\u00edficamente a la versi\u00f3n v0.12.21. Esta vulnerabilidad permite a un atacante proporcionar un XML de mapa de sitio malicioso, lo que provoca una denegaci\u00f3n de servicio (DoS) al agotar la memoria del sistema y, potencialmente, provocar un bloqueo del mismo. El problema se ha resuelto en la versi\u00f3n v0.12.29."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json
index bfd00f8519c..91785c4c981 100644
--- a/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json
+++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3262.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3262",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.200",
- "lastModified": "2025-07-07T16:15:23.130",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the huggingface/transformers repository, specifically in version 4.49.0. The vulnerability is due to inefficient regular expression complexity in the `SETTING_RE` variable within the `transformers/commands/chat.py` file. The regex contains repetition groups and non-optimized quantifiers, leading to exponential backtracking when processing 'almost matching' payloads. This can degrade application performance and potentially result in a denial-of-service (DoS) when handling specially crafted input strings. The issue is fixed in version 4.51.0."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS) en el repositorio huggingface/transformers, concretamente en la versi\u00f3n 4.49.0. La vulnerabilidad se debe a la complejidad ineficiente de la expresi\u00f3n regular en la variable `SETTING_RE` del archivo `transformers/commands/chat.py`. La expresi\u00f3n regular contiene grupos de repetici\u00f3n y cuantificadores no optimizados, lo que provoca un retroceso exponencial al procesar payloads casi coincidentes. Esto puede reducir el rendimiento de la aplicaci\u00f3n y potencialmente provocar una denegaci\u00f3n de servicio (DoS) al procesar cadenas de entrada especialmente manipuladas. El problema se ha corregido en la versi\u00f3n 4.51.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3263.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3263.json
index b9a4b7854c2..f41437db766 100644
--- a/CVE-2025/CVE-2025-32xx/CVE-2025-3263.json
+++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3263.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3263",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.350",
- "lastModified": "2025-07-07T10:15:27.350",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_configuration_file()` function within the `transformers.configuration_utils` module. The affected version is 4.49.0, and the issue is resolved in version 4.51.0. The vulnerability arises from the use of a regular expression pattern `config\\.(.*)\\.json` that can be exploited to cause excessive CPU consumption through crafted input strings, leading to catastrophic backtracking. This can result in model serving disruption, resource exhaustion, and increased latency in applications using the library."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS) en la librer\u00eda Hugging Face Transformers, espec\u00edficamente en la funci\u00f3n `get_configuration_file()` del m\u00f3dulo `transformers.configuration_utils`. La versi\u00f3n afectada es la 4.49.0 y el problema se solucion\u00f3 en la versi\u00f3n 4.51.0. La vulnerabilidad surge del uso de un patr\u00f3n de expresi\u00f3n regular `config\\.(.*)\\.json`, que puede explotarse para causar un consumo excesivo de CPU mediante cadenas de entrada manipuladas, lo que provoca un retroceso catastr\u00f3fico. Esto puede provocar interrupciones en el servicio del modelo, agotamiento de recursos y mayor latencia en las aplicaciones que utilizan la librer\u00eda."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3264.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3264.json
index d9d09225ae2..0eb5133d35c 100644
--- a/CVE-2025/CVE-2025-32xx/CVE-2025-3264.json
+++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3264.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3264",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.500",
- "lastModified": "2025-07-07T10:15:27.500",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`. This vulnerability affects versions 4.49.0 and is fixed in version 4.51.0. The issue arises from a regular expression pattern `\\s*try\\s*:.*?except.*?:` used to filter out try/except blocks from Python code, which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to remote code loading disruption, resource exhaustion in model serving, supply chain attack vectors, and development pipeline disruption."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS) en la librer\u00eda Hugging Face Transformers, espec\u00edficamente en la funci\u00f3n `get_imports()` de `dynamic_module_utils.py`. Esta vulnerabilidad afecta a la versi\u00f3n 4.49.0 y se corrigi\u00f3 en la versi\u00f3n 4.51.0. El problema surge de un patr\u00f3n de expresi\u00f3n regular `\\s*try\\s*:.*?except.*?:` utilizado para filtrar bloques try/except del c\u00f3digo Python, que puede explotarse para causar un consumo excesivo de CPU mediante cadenas de entrada manipuladas debido a un retroceso catastr\u00f3fico. Esta vulnerabilidad puede provocar interrupciones en la carga remota de c\u00f3digo, agotamiento de recursos en la entrega de modelos, vectores de ataque a la cadena de suministro e interrupciones en el flujo de trabajo de desarrollo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33054.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33054.json
new file mode 100644
index 00000000000..3af52ff71c0
--- /dev/null
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33054.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-33054",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:34.063",
+ "lastModified": "2025-07-08T17:15:34.063",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Insufficient UI warning of dangerous operations in Remote Desktop Client allows an unauthorized attacker to perform spoofing over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-357"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33054",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33055.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33055.json
index e5957a00ede..9615e2f8d20 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33055.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33055.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33055",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:21.100",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:21:47.263",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,121 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33058.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33058.json
index 408baa06432..fc6e3af3eff 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33058.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33058.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33058",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:27.967",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:21:54.080",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,121 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33059.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33059.json
index ef0e4e4a150..f6f6198f97c 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33059.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33059.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33059",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:30.727",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:22:01.010",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,121 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33060.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33060.json
index d6f6f3e0ee7..51aa1e6af37 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33060.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33060.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33060",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:33.300",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:22:07.860",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,126 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33061.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33061.json
index c7d33299a0b..2fda2af04e1 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33061.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33061.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33061",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:35.353",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:22:14.333",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,109 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33062.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33062.json
index 46adf5580df..c931156dda1 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33062.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33062.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33062",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:37.330",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:22:21.373",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,109 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33063.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33063.json
index 981b37c2aad..6687b17bef9 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33063.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33063.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33063",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:39.490",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:22:26.790",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,97 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33065.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33065.json
index a699cb57100..af7f9c0fa50 100644
--- a/CVE-2025/CVE-2025-330xx/CVE-2025-33065.json
+++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33065.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-33065",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:22:45.323",
- "lastModified": "2025-06-12T16:06:39.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:22:32.730",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,121 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "FCC2974E-F0F4-4F33-9CCE-2CEA45A3AD86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.10240.21034",
+ "matchCriteriaId": "A94EDBE2-AAFF-4E9A-A9E5-9B02ADB94471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "21CF85F1-CE6E-4AA2-B686-20766DB23D46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "10F0F3D2-00CD-4F52-B31E-DEA656DBD8B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "F081F99C-6E6A-4AB2-8DE8-6457582D80D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "7D9FCD92-0CED-43D3-87E0-630B80AC1A89"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.5965",
+ "matchCriteriaId": "A5667B11-7E10-4A08-89D2-253D682151C5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.5965",
+ "matchCriteriaId": "A8CB6E81-62E0-4B19-ADE9-5ADB260CB960"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.5472",
+ "matchCriteriaId": "FCDDDE2C-0235-4792-905A-DDDF5D346BDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22631.5472",
+ "matchCriteriaId": "53835865-3135-4F16-9868-C96D8C5E2BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "AA78F5F9-AEE3-423B-B82A-9ECEF2BDADF3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.14393.8148",
+ "matchCriteriaId": "A9B7111D-5C1D-415B-8ED4-F891B4832B18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.7434",
+ "matchCriteriaId": "4E77CCA1-2FF6-429B-85A6-81E2B7C6B08F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.20348.3745",
+ "matchCriteriaId": "889A792E-8809-4A78-AABC-0567D025927A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.25398.1665",
+ "matchCriteriaId": "537E7AD5-0562-490B-AB16-0805F8865C74"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.26100.4270",
+ "matchCriteriaId": "BD4BB5C4-1318-4006-9C50-0AED4E0C8A3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34061.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34061.json
index 5a62df7c604..33029f95192 100644
--- a/CVE-2025/CVE-2025-340xx/CVE-2025-34061.json
+++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34061.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-34061",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:21.570",
- "lastModified": "2025-07-03T20:15:21.570",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34082.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34082.json
index 79329a4158a..6dca4654951 100644
--- a/CVE-2025/CVE-2025-340xx/CVE-2025-34082.json
+++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34082.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-34082",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:22.540",
- "lastModified": "2025-07-03T20:15:22.540",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34086.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34086.json
index ca6f7856cf9..f30d3ef2857 100644
--- a/CVE-2025/CVE-2025-340xx/CVE-2025-34086.json
+++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34086.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-34086",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:22.683",
- "lastModified": "2025-07-03T20:15:22.683",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34087.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34087.json
index 21ea4bf9224..a8649cc5435 100644
--- a/CVE-2025/CVE-2025-340xx/CVE-2025-34087.json
+++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34087.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-34087",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:22.843",
- "lastModified": "2025-07-03T20:15:22.843",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34088.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34088.json
index 6fb50593c06..6b656ac0fc1 100644
--- a/CVE-2025/CVE-2025-340xx/CVE-2025-34088.json
+++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34088.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-34088",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:23.007",
- "lastModified": "2025-07-03T20:15:23.007",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34089.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34089.json
index af3eceaa8d5..b0946b49e68 100644
--- a/CVE-2025/CVE-2025-340xx/CVE-2025-34089.json
+++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34089.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-34089",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-07-03T20:15:23.157",
- "lastModified": "2025-07-03T20:15:23.157",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3466.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3466.json
index 14699b4fa9c..69e70d5e409 100644
--- a/CVE-2025/CVE-2025-34xx/CVE-2025-3466.json
+++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3466.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3466",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.640",
- "lastModified": "2025-07-07T10:15:27.640",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones 1.1.0 a 1.1.2 de langgenius/dify son vulnerables a la entrada no saneada en el nodo de c\u00f3digo, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario con permisos de root completos. La vulnerabilidad surge de la capacidad de anular funciones globales en JavaScript, como parseInt, antes de que se impongan las restricciones de seguridad del entorno de pruebas. Esto puede provocar acceso no autorizado a claves secretas, servidores de red internos y movimiento lateral dentro de dify.ai. El problema se ha resuelto en la versi\u00f3n 1.1.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3467.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3467.json
index a87218a6567..5df31ec59d9 100644
--- a/CVE-2025/CVE-2025-34xx/CVE-2025-3467.json
+++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3467.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3467",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:27.793",
- "lastModified": "2025-07-07T10:15:27.793",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XSS vulnerability exists in langgenius/dify versions prior to 1.1.3, specifically affecting Firefox browsers. This vulnerability allows an attacker to obtain the administrator's token by sending a payload in the published chat. When the administrator views the conversation content through the monitoring/log function using Firefox, the XSS vulnerability is triggered, potentially exposing sensitive token information to the attacker."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad XSS en versiones de langgenius/dify anteriores a la 1.1.3, que afecta espec\u00edficamente a los navegadores Firefox. Esta vulnerabilidad permite a un atacante obtener el token del administrador mediante el env\u00edo de un payload en el chat publicado. Cuando el administrador visualiza el contenido de la conversaci\u00f3n a trav\u00e9s de la funci\u00f3n de monitorizaci\u00f3n/registro con Firefox, se activa la vulnerabilidad XSS, lo que podr\u00eda exponer informaci\u00f3n confidencial del token al atacante."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-360xx/CVE-2025-36014.json b/CVE-2025/CVE-2025-360xx/CVE-2025-36014.json
index d6a83843ea0..f3b28d2dbad 100644
--- a/CVE-2025/CVE-2025-360xx/CVE-2025-36014.json
+++ b/CVE-2025/CVE-2025-360xx/CVE-2025-36014.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-36014",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-07T17:15:27.890",
- "lastModified": "2025-07-07T17:15:27.890",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Integration Bus for z/OS 10.1.0.0 through 10.1.0.5 is vulnerable to code injection by a privileged user with access to the IIB install directory."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Integration Bus para z/OS 10.1.0.0 a 10.1.0.5 es vulnerable a la inyecci\u00f3n de c\u00f3digo por parte de un usuario privilegiado con acceso al directorio de instalaci\u00f3n de IIB."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-366xx/CVE-2025-36600.json b/CVE-2025/CVE-2025-366xx/CVE-2025-36600.json
index 2da0d0cbac7..bcf6ed752ce 100644
--- a/CVE-2025/CVE-2025-366xx/CVE-2025-36600.json
+++ b/CVE-2025/CVE-2025-366xx/CVE-2025-36600.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-36600",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-07-08T15:15:27.403",
- "lastModified": "2025-07-08T15:15:27.403",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json
index be40fa89741..1f6292b2bed 100644
--- a/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json
+++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3611.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-3611",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2025-05-30T15:15:41.197",
- "lastModified": "2025-05-30T16:31:03.107",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:11:34.797",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
}
]
},
@@ -51,10 +71,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.11.0",
+ "versionEndExcluding": "9.11.13",
+ "matchCriteriaId": "BC431F02-E096-4994-9CB3-AC2DB1C7FAB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.5.0",
+ "versionEndExcluding": "10.5.4",
+ "matchCriteriaId": "6EB2F235-4072-4E5E-914C-07829E12A481"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.7.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "555B766B-E5A3-4369-A2A7-4C77F246AFB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.7.0:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "5E70B3C8-33ED-4C9D-BDE0-0CCADB68207B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.7.0:rc2:*:*:*:*:*:*",
+ "matchCriteriaId": "7D2A4C91-AE3A-462B-A162-1C82B717D504"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://mattermost.com/security-updates",
- "source": "responsibledisclosure@mattermost.com"
+ "source": "responsibledisclosure@mattermost.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3626.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3626.json
index 2166a19fd34..b80e22c847f 100644
--- a/CVE-2025/CVE-2025-36xx/CVE-2025-3626.json
+++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3626.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3626",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-07T10:15:27.967",
- "lastModified": "2025-07-07T10:15:27.967",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote attacker with administrator account can gain full control of the device due to improper neutralization of special elements used in an OS Command ('OS Command Injection') while uploading a config file via webUI."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto con una cuenta de administrador puede obtener control total del dispositivo debido a la neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') al cargar un archivo de configuraci\u00f3n a trav\u00e9s de la interfaz web."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3630.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3630.json
index 1b886f0052b..d17f740cdd5 100644
--- a/CVE-2025/CVE-2025-36xx/CVE-2025-3630.json
+++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3630.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-3630",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-08T15:15:27.560",
- "lastModified": "2025-07-08T15:15:27.560",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3648.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3648.json
new file mode 100644
index 00000000000..c427d401ab6
--- /dev/null
+++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3648.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2025-3648",
+ "sourceIdentifier": "psirt@servicenow.com",
+ "published": "2025-07-08T16:15:57.280",
+ "lastModified": "2025-07-08T17:15:34.267",
+ "vulnStatus": "Awaiting Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain conditional access control list (ACL) configurations, this vulnerability could enable unauthenticated and authenticated users to use range query requests to infer instance data that is not intended to be accessible to them.\n\nTo assist customers in enhancing access controls, ServiceNow has introduced additional access control frameworks in Xanadu and Yokohama, such as Query ACLs, Security Data Filters and Deny-Unless ACLs.\n\nAdditionally, in May 2025, ServiceNow delivered to customers a security update that is designed to enhance customer ACL configurations.\n\nCustomers, please review the KB Articles in the References section."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "psirt@servicenow.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "attackRequirements": "PRESENT",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "HIGH",
+ "vulnIntegrityImpact": "NONE",
+ "vulnAvailabilityImpact": "NONE",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "NOT_DEFINED",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@servicenow.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1220"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2046494",
+ "source": "psirt@servicenow.com"
+ },
+ {
+ "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2139567",
+ "source": "psirt@servicenow.com"
+ },
+ {
+ "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2256712",
+ "source": "psirt@servicenow.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-37xx/CVE-2025-3705.json b/CVE-2025/CVE-2025-37xx/CVE-2025-3705.json
index 40bf5fc0375..f3ab7dccff7 100644
--- a/CVE-2025/CVE-2025-37xx/CVE-2025-3705.json
+++ b/CVE-2025/CVE-2025-37xx/CVE-2025-3705.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3705",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-07T10:15:28.133",
- "lastModified": "2025-07-07T10:15:28.133",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A physical attacker with no privileges can gain full control of the affected device due to improper neutralization of special elements used in an OS Command ('OS Command Injection') when loading a config file from a USB drive."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante f\u00edsico sin privilegios puede obtener control total del dispositivo afectado debido a la neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') al cargar un archivo de configuraci\u00f3n desde una unidad USB."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-37xx/CVE-2025-3777.json b/CVE-2025/CVE-2025-37xx/CVE-2025-3777.json
index f66e2683e8b..c975c117891 100644
--- a/CVE-2025/CVE-2025-37xx/CVE-2025-3777.json
+++ b/CVE-2025/CVE-2025-37xx/CVE-2025-3777.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3777",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:28.297",
- "lastModified": "2025-07-07T10:15:28.297",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Hugging Face Transformers hasta la 4.49.0 se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta en el archivo `image_utils.py`. Esta vulnerabilidad se debe a una validaci\u00f3n de URL insegura mediante el m\u00e9todo `startswith()`, que puede eludirse mediante la inyecci\u00f3n de nombres de usuario en la URL. Esto permite a los atacantes manipular URL que parecen provenir de YouTube, pero que redirigen a dominios maliciosos, lo que podr\u00eda provocar ataques de phishing, distribuci\u00f3n de malware o exfiltraci\u00f3n de datos. El problema se ha corregido en la versi\u00f3n 4.52.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38174.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38174.json
index ce146effd25..d9b8279b731 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38174.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38174.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38174",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T11:15:51.283",
- "lastModified": "2025-07-04T11:15:51.283",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthunderbolt: Do not double dequeue a configuration request\n\nSome of our devices crash in tb_cfg_request_dequeue():\n\n general protection fault, probably for non-canonical address 0xdead000000000122\n\n CPU: 6 PID: 91007 Comm: kworker/6:2 Tainted: G U W 6.6.65\n RIP: 0010:tb_cfg_request_dequeue+0x2d/0xa0\n Call Trace:\n \n ? tb_cfg_request_dequeue+0x2d/0xa0\n tb_cfg_request_work+0x33/0x80\n worker_thread+0x386/0x8f0\n kthread+0xed/0x110\n ret_from_fork+0x38/0x50\n ret_from_fork_asm+0x1b/0x30\n\nThe circumstances are unclear, however, the theory is that\ntb_cfg_request_work() can be scheduled twice for a request:\nfirst time via frame.callback from ring_work() and second\ntime from tb_cfg_request(). Both times kworkers will execute\ntb_cfg_request_dequeue(), which results in double list_del()\nfrom the ctl->request_queue (the list poison deference hints\nat it: 0xdead000000000122).\n\nDo not dequeue requests that don't have TB_CFG_REQUEST_ACTIVE\nbit set."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: thunderbolt: no desencolar dos veces una solicitud de configuraci\u00f3n Algunos de nuestros dispositivos fallan en tb_cfg_request_dequeue(): error de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdead000000000122 CPU: 6 PID: 91007 Comm: kworker/6:2 Tainted: GUW 6.6.65 RIP: 0010:tb_cfg_request_dequeue+0x2d/0xa0 Rastreo de llamadas: ? tb_cfg_request_dequeue+0x2d/0xa0 tb_cfg_request_work+0x33/0x80 worker_thread+0x386/0x8f0 kthread+0xed/0x110 ret_from_fork+0x38/0x50 ret_from_fork_asm+0x1b/0x30 Las circunstancias no est\u00e1n claras, sin embargo, la teor\u00eda es que tb_cfg_request_work() se puede programar dos veces para una solicitud: la primera vez a trav\u00e9s de frame.callback desde ring_work() y la segunda vez desde tb_cfg_request(). En ambas ocasiones, los kworkers ejecutar\u00e1n tb_cfg_request_dequeue(), lo que resulta en un doble list_del() desde ctl->request_queue (la deferencia de envenenamiento de lista lo insin\u00faa: 0xdead000000000122). No saque de la cola las solicitudes que no tengan establecido el bit TB_CFG_REQUEST_ACTIVE."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38175.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38175.json
index 9e821976294..b013be89e95 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38175.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38175.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38175",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T11:15:51.420",
- "lastModified": "2025-07-04T11:15:51.420",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix yet another UAF in binder_devices\n\nCommit e77aff5528a18 (\"binderfs: fix use-after-free in binder_devices\")\naddressed a use-after-free where devices could be released without first\nbeing removed from the binder_devices list. However, there is a similar\npath in binder_free_proc() that was missed:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in binder_remove_device+0xd4/0x100\n Write of size 8 at addr ffff0000c773b900 by task umount/467\n CPU: 12 UID: 0 PID: 467 Comm: umount Not tainted 6.15.0-rc7-00138-g57483a362741 #9 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n binder_remove_device+0xd4/0x100\n binderfs_evict_inode+0x230/0x2f0\n evict+0x25c/0x5dc\n iput+0x304/0x480\n dentry_unlink_inode+0x208/0x46c\n __dentry_kill+0x154/0x530\n [...]\n\n Allocated by task 463:\n __kmalloc_cache_noprof+0x13c/0x324\n binderfs_binder_device_create.isra.0+0x138/0xa60\n binder_ctl_ioctl+0x1ac/0x230\n [...]\n\n Freed by task 215:\n kfree+0x184/0x31c\n binder_proc_dec_tmpref+0x33c/0x4ac\n binder_deferred_func+0xc10/0x1108\n process_one_work+0x520/0xba4\n [...]\n ==================================================================\n\nCall binder_remove_device() within binder_free_proc() to ensure the\ndevice is removed from the binder_devices list before being kfreed."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binder: corrige otro UAF en binder_devices El commit e77aff5528a18 (\"binderfs: corrige uuse-after-free en binder_devices\") abord\u00f3 un use-after-free donde los dispositivos pod\u00edan liberarse sin eliminarse primero de la lista binder_devices. Sin embargo, hay una ruta similar en binder_free_proc() que se omiti\u00f3: ====================================================================== ERROR: KASAN: slab-use-after-free in binder_remove_device+0xd4/0x100 Write of size 8 at addr ffff0000c773b900 by task umount/467 CPU: 12 UID: 0 PID: 467 Comm: umount Not tainted 6.15.0-rc7-00138-g57483a362741 #9 PREEMPT Hardware name: linux,dummy-virt (DT) Call trace: binder_remove_device+0xd4/0x100 binderfs_evict_inode+0x230/0x2f0 evict+0x25c/0x5dc iput+0x304/0x480 dentry_unlink_inode+0x208/0x46c __dentry_kill+0x154/0x530 [...] Allocated by task 463: __kmalloc_cache_noprof+0x13c/0x324 binderfs_binder_device_create.isra.0+0x138/0xa60 binder_ctl_ioctl+0x1ac/0x230 [...] Freed by task 215: kfree+0x184/0x31c binder_proc_dec_tmpref+0x33c/0x4ac binder_deferred_func+0xc10/0x1108 process_one_work+0x520/0xba4 [...] ====================================================================== Llame a binder_remove_device() dentro de binder_free_proc() para asegurarse de que el dispositivo se elimine de la lista binder_devices antes de ser liberado."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38176.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38176.json
index fa392579721..8a19dcfd52c 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38176.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38176.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38176",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T11:15:51.543",
- "lastModified": "2025-07-04T11:15:51.543",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix use-after-free in binderfs_evict_inode()\n\nRunning 'stress-ng --binderfs 16 --timeout 300' under KASAN-enabled\nkernel, I've noticed the following:\n\nBUG: KASAN: slab-use-after-free in binderfs_evict_inode+0x1de/0x2d0\nWrite of size 8 at addr ffff88807379bc08 by task stress-ng-binde/1699\n\nCPU: 0 UID: 0 PID: 1699 Comm: stress-ng-binde Not tainted 6.14.0-rc7-g586de92313fc-dirty #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\nCall Trace:\n \n dump_stack_lvl+0x1c2/0x2a0\n ? __pfx_dump_stack_lvl+0x10/0x10\n ? __pfx__printk+0x10/0x10\n ? __pfx_lock_release+0x10/0x10\n ? __virt_addr_valid+0x18c/0x540\n ? __virt_addr_valid+0x469/0x540\n print_report+0x155/0x840\n ? __virt_addr_valid+0x18c/0x540\n ? __virt_addr_valid+0x469/0x540\n ? __phys_addr+0xba/0x170\n ? binderfs_evict_inode+0x1de/0x2d0\n kasan_report+0x147/0x180\n ? binderfs_evict_inode+0x1de/0x2d0\n binderfs_evict_inode+0x1de/0x2d0\n ? __pfx_binderfs_evict_inode+0x10/0x10\n evict+0x524/0x9f0\n ? __pfx_lock_release+0x10/0x10\n ? __pfx_evict+0x10/0x10\n ? do_raw_spin_unlock+0x4d/0x210\n ? _raw_spin_unlock+0x28/0x50\n ? iput+0x697/0x9b0\n __dentry_kill+0x209/0x660\n ? shrink_kill+0x8d/0x2c0\n shrink_kill+0xa9/0x2c0\n shrink_dentry_list+0x2e0/0x5e0\n shrink_dcache_parent+0xa2/0x2c0\n ? __pfx_shrink_dcache_parent+0x10/0x10\n ? __pfx_lock_release+0x10/0x10\n ? __pfx_do_raw_spin_lock+0x10/0x10\n do_one_tree+0x23/0xe0\n shrink_dcache_for_umount+0xa0/0x170\n generic_shutdown_super+0x67/0x390\n kill_litter_super+0x76/0xb0\n binderfs_kill_super+0x44/0x90\n deactivate_locked_super+0xb9/0x130\n cleanup_mnt+0x422/0x4c0\n ? lockdep_hardirqs_on+0x9d/0x150\n task_work_run+0x1d2/0x260\n ? __pfx_task_work_run+0x10/0x10\n resume_user_mode_work+0x52/0x60\n syscall_exit_to_user_mode+0x9a/0x120\n do_syscall_64+0x103/0x210\n ? asm_sysvec_apic_timer_interrupt+0x1a/0x20\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0xcac57b\nCode: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa b8\nRSP: 002b:00007ffecf4226a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6\nRAX: 0000000000000000 RBX: 00007ffecf422720 RCX: 0000000000cac57b\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffecf422850\nRBP: 00007ffecf422850 R08: 0000000028d06ab1 R09: 7fffffffffffffff\nR10: 3fffffffffffffff R11: 0000000000000246 R12: 00007ffecf422718\nR13: 00007ffecf422710 R14: 00007f478f87b658 R15: 00007ffecf422830\n \n\nAllocated by task 1705:\n kasan_save_track+0x3e/0x80\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc_cache_noprof+0x213/0x3e0\n binderfs_binder_device_create+0x183/0xa80\n binder_ctl_ioctl+0x138/0x190\n __x64_sys_ioctl+0x120/0x1b0\n do_syscall_64+0xf6/0x210\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 1705:\n kasan_save_track+0x3e/0x80\n kasan_save_free_info+0x46/0x50\n __kasan_slab_free+0x62/0x70\n kfree+0x194/0x440\n evict+0x524/0x9f0\n do_unlinkat+0x390/0x5b0\n __x64_sys_unlink+0x47/0x50\n do_syscall_64+0xf6/0x210\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThis 'stress-ng' workload causes the concurrent deletions from\n'binder_devices' and so requires full-featured synchronization\nto prevent list corruption.\n\nI've found this issue independently but pretty sure that syzbot did\nthe same, so Reported-by: and Closes: should be applicable here as well."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binder: correcci\u00f3n de use-after-free en binderfs_evict_inode() Al ejecutar 'stress-ng --binderfs 16 --timeout 300' bajo un kernel habilitado para KASAN, he notado lo siguiente: ERROR: KASAN: slab-use-after-free in binderfs_evict_inode+0x1de/0x2d0 Write of size 8 at addr ffff88807379bc08 by task stress-ng-binde/1699 CPU: 0 UID: 0 PID: 1699 Comm: stress-ng-binde Not tainted 6.14.0-rc7-g586de92313fc-dirty #13 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 Call Trace: dump_stack_lvl+0x1c2/0x2a0 ? __pfx_dump_stack_lvl+0x10/0x10 ? __pfx__printk+0x10/0x10 ? __pfx_lock_release+0x10/0x10 ? __virt_addr_valid+0x18c/0x540 ? __virt_addr_valid+0x469/0x540 print_report+0x155/0x840 ? __virt_addr_valid+0x18c/0x540 ? __virt_addr_valid+0x469/0x540 ? __phys_addr+0xba/0x170 ? binderfs_evict_inode+0x1de/0x2d0 kasan_report+0x147/0x180 ? binderfs_evict_inode+0x1de/0x2d0 binderfs_evict_inode+0x1de/0x2d0 ? __pfx_binderfs_evict_inode+0x10/0x10 evict+0x524/0x9f0 ? __pfx_lock_release+0x10/0x10 ? __pfx_evict+0x10/0x10 ? do_raw_spin_unlock+0x4d/0x210 ? _raw_spin_unlock+0x28/0x50 ? iput+0x697/0x9b0 __dentry_kill+0x209/0x660 ? shrink_kill+0x8d/0x2c0 shrink_kill+0xa9/0x2c0 shrink_dentry_list+0x2e0/0x5e0 shrink_dcache_parent+0xa2/0x2c0 ? __pfx_shrink_dcache_parent+0x10/0x10 ? __pfx_lock_release+0x10/0x10 ? __pfx_do_raw_spin_lock+0x10/0x10 do_one_tree+0x23/0xe0 shrink_dcache_for_umount+0xa0/0x170 generic_shutdown_super+0x67/0x390 kill_litter_super+0x76/0xb0 binderfs_kill_super+0x44/0x90 deactivate_locked_super+0xb9/0x130 cleanup_mnt+0x422/0x4c0 ? lockdep_hardirqs_on+0x9d/0x150 task_work_run+0x1d2/0x260 ? __pfx_task_work_run+0x10/0x10 resume_user_mode_work+0x52/0x60 syscall_exit_to_user_mode+0x9a/0x120 do_syscall_64+0x103/0x210 ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0xcac57b Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa b8 RSP: 002b:00007ffecf4226a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 00007ffecf422720 RCX: 0000000000cac57b RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffecf422850 RBP: 00007ffecf422850 R08: 0000000028d06ab1 R09: 7fffffffffffffff R10: 3fffffffffffffff R11: 0000000000000246 R12: 00007ffecf422718 R13: 00007ffecf422710 R14: 00007f478f87b658 R15: 00007ffecf422830 Allocated by task 1705: kasan_save_track+0x3e/0x80 __kasan_kmalloc+0x8f/0xa0 __kmalloc_cache_noprof+0x213/0x3e0 binderfs_binder_device_create+0x183/0xa80 binder_ctl_ioctl+0x138/0x190 __x64_sys_ioctl+0x120/0x1b0 do_syscall_64+0xf6/0x210 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 1705: kasan_save_track+0x3e/0x80 kasan_save_free_info+0x46/0x50 __kasan_slab_free+0x62/0x70 kfree+0x194/0x440 evict+0x524/0x9f0 do_unlinkat+0x390/0x5b0 __x64_sys_unlink+0x47/0x50 do_syscall_64+0xf6/0x210 entry_SYSCALL_64_after_hwframe+0x77/0x7f Esta carga de trabajo \"stress-ng\" provoca eliminaciones simult\u00e1neas de \"binder_devices\" y, por lo tanto, requiere una sincronizaci\u00f3n completa para evitar la corrupci\u00f3n de listas. He encontrado este problema de forma independiente, pero estoy bastante seguro de que syzbot hizo lo mismo, por lo que \"Reportado por:\" y \"Cierra:\" tambi\u00e9n deber\u00edan aplicarse en este caso."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38177.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38177.json
index 37ddb03a43e..fd87c3d8343 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38177.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38177.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38177",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T13:15:24.033",
- "lastModified": "2025-07-04T13:15:24.033",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: make hfsc_qlen_notify() idempotent\n\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let's make it idempotent\nto ease qdisc_tree_reduce_backlog() callers' life:\n\n1. update_vf() decreases cl->cl_nactive, so we can check whether it is\nnon-zero before calling it.\n\n2. eltree_remove() always removes RB node cl->el_node, but we can use\n RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sch_hfsc: hace que hfsc_qlen_notify() sea idempotente. hfsc_qlen_notify() tampoco es idempotente y no es compatible con quienes lo llaman, como fq_codel_dequeue(). Vamos a convertirlo en idempotente para simplificar la tarea de quienes llaman a qdisc_tree_reduce_backlog(): 1. update_vf() reduce cl->cl_nactive, lo que permite comprobar si es distinto de cero antes de llamarlo. 2. eltree_remove() siempre elimina el nodo RB cl->el_node, pero podemos usar RB_EMPTY_NODE() + RB_CLEAR_NODE() para hacerlo seguro."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38178.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38178.json
index 134c9406ef6..54b01d21829 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38178.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38178.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38178",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.233",
- "lastModified": "2025-07-04T14:15:24.233",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/igen6: Fix NULL pointer dereference\n\nA kernel panic was reported with the following kernel log:\n\n EDAC igen6: Expected 2 mcs, but only 1 detected.\n BUG: unable to handle page fault for address: 000000000000d570\n ...\n Hardware name: Notebook V54x_6x_TU/V54x_6x_TU, BIOS Dasharo (coreboot+UEFI) v0.9.0 07/17/2024\n RIP: e030:ecclog_handler+0x7e/0xf0 [igen6_edac]\n ...\n igen6_probe+0x2a0/0x343 [igen6_edac]\n ...\n igen6_init+0xc5/0xff0 [igen6_edac]\n ...\n\nThis issue occurred because one memory controller was disabled by\nthe BIOS but the igen6_edac driver still checked all the memory\ncontrollers, including this absent one, to identify the source of\nthe error. Accessing the null MMIO for the absent memory controller\nresulted in the oops above.\n\nFix this issue by reverting the configuration structure to non-const\nand updating the field 'res_cfg->num_imc' to reflect the number of\ndetected memory controllers."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/igen6: Corregir desreferencia de puntero NULL Se inform\u00f3 un p\u00e1nico del kernel con el siguiente registro del kernel: EDAC igen6: Se esperaban 2 mcs, pero solo se detect\u00f3 1. ERROR: no se pudo gestionar el error de p\u00e1gina para la direcci\u00f3n: 000000000000d570 ... Nombre del hardware: Notebook V54x_6x_TU/V54x_6x_TU, BIOS Dasharo (coreboot+UEFI) v0.9.0 17/07/2024 RIP: e030:ecclog_handler+0x7e/0xf0 [igen6_edac] ... igen6_probe+0x2a0/0x343 [igen6_edac] ... igen6_init+0xc5/0xff0 [igen6_edac] ... Este problema se produjo porque el BIOS deshabilit\u00f3 un controlador de memoria, pero el controlador igen6_edac sigui\u00f3 comprobando todos los controladores de memoria, incluido el ausente, para identificar el origen del error. Acceder al MMIO nulo del controlador de memoria ausente provoc\u00f3 el error mencionado. Solucione este problema revirtiendo la estructura de configuraci\u00f3n a no constante y actualizando el campo 'res_cfg->num_imc' para reflejar la cantidad de controladores de memoria detectados."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38179.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38179.json
index b74920a94e8..b4cf1bd0976 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38179.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38179.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38179",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.553",
- "lastModified": "2025-07-04T14:15:24.553",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix max_sge overflow in smb_extract_folioq_to_rdma()\n\nThis fixes the following problem:\n\n[ 749.901015] [ T8673] run fstests cifs/001 at 2025-06-17 09:40:30\n[ 750.346409] [ T9870] ==================================================================\n[ 750.346814] [ T9870] BUG: KASAN: slab-out-of-bounds in smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.347330] [ T9870] Write of size 8 at addr ffff888011082890 by task xfs_io/9870\n[ 750.347705] [ T9870]\n[ 750.348077] [ T9870] CPU: 0 UID: 0 PID: 9870 Comm: xfs_io Kdump: loaded Not tainted 6.16.0-rc2-metze.02+ #1 PREEMPT(voluntary)\n[ 750.348082] [ T9870] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006\n[ 750.348085] [ T9870] Call Trace:\n[ 750.348086] [ T9870] \n[ 750.348088] [ T9870] dump_stack_lvl+0x76/0xa0\n[ 750.348106] [ T9870] print_report+0xd1/0x640\n[ 750.348116] [ T9870] ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 750.348120] [ T9870] ? kasan_complete_mode_report_info+0x26/0x210\n[ 750.348124] [ T9870] kasan_report+0xe7/0x130\n[ 750.348128] [ T9870] ? smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.348262] [ T9870] ? smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.348377] [ T9870] __asan_report_store8_noabort+0x17/0x30\n[ 750.348381] [ T9870] smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.348496] [ T9870] smbd_post_send_iter+0x1990/0x3070 [cifs]\n[ 750.348625] [ T9870] ? __pfx_smbd_post_send_iter+0x10/0x10 [cifs]\n[ 750.348741] [ T9870] ? update_stack_state+0x2a0/0x670\n[ 750.348749] [ T9870] ? cifs_flush+0x153/0x320 [cifs]\n[ 750.348870] [ T9870] ? cifs_flush+0x153/0x320 [cifs]\n[ 750.348990] [ T9870] ? update_stack_state+0x2a0/0x670\n[ 750.348995] [ T9870] smbd_send+0x58c/0x9c0 [cifs]\n[ 750.349117] [ T9870] ? __pfx_smbd_send+0x10/0x10 [cifs]\n[ 750.349231] [ T9870] ? unwind_get_return_address+0x65/0xb0\n[ 750.349235] [ T9870] ? __pfx_stack_trace_consume_entry+0x10/0x10\n[ 750.349242] [ T9870] ? arch_stack_walk+0xa7/0x100\n[ 750.349250] [ T9870] ? stack_trace_save+0x92/0xd0\n[ 750.349254] [ T9870] __smb_send_rqst+0x931/0xec0 [cifs]\n[ 750.349374] [ T9870] ? kernel_text_address+0x173/0x190\n[ 750.349379] [ T9870] ? kasan_save_stack+0x39/0x70\n[ 750.349382] [ T9870] ? kasan_save_track+0x18/0x70\n[ 750.349385] [ T9870] ? __kasan_slab_alloc+0x9d/0xa0\n[ 750.349389] [ T9870] ? __pfx___smb_send_rqst+0x10/0x10 [cifs]\n[ 750.349508] [ T9870] ? smb2_mid_entry_alloc+0xb4/0x7e0 [cifs]\n[ 750.349626] [ T9870] ? cifs_call_async+0x277/0xb00 [cifs]\n[ 750.349746] [ T9870] ? cifs_issue_write+0x256/0x610 [cifs]\n[ 750.349867] [ T9870] ? netfs_do_issue_write+0xc2/0x340 [netfs]\n[ 750.349900] [ T9870] ? netfs_advance_write+0x45b/0x1270 [netfs]\n[ 750.349929] [ T9870] ? netfs_write_folio+0xd6c/0x1be0 [netfs]\n[ 750.349958] [ T9870] ? netfs_writepages+0x2e9/0xa80 [netfs]\n[ 750.349987] [ T9870] ? do_writepages+0x21f/0x590\n[ 750.349993] [ T9870] ? filemap_fdatawrite_wbc+0xe1/0x140\n[ 750.349997] [ T9870] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 750.350002] [ T9870] smb_send_rqst+0x22e/0x2f0 [cifs]\n[ 750.350131] [ T9870] ? __pfx_smb_send_rqst+0x10/0x10 [cifs]\n[ 750.350255] [ T9870] ? local_clock_noinstr+0xe/0xd0\n[ 750.350261] [ T9870] ? kasan_save_alloc_info+0x37/0x60\n[ 750.350268] [ T9870] ? __kasan_check_write+0x14/0x30\n[ 750.350271] [ T9870] ? _raw_spin_lock+0x81/0xf0\n[ 750.350275] [ T9870] ? __pfx__raw_spin_lock+0x10/0x10\n[ 750.350278] [ T9870] ? smb2_setup_async_request+0x293/0x580 [cifs]\n[ 750.350398] [ T9870] cifs_call_async+0x477/0xb00 [cifs]\n[ 750.350518] [ T9870] ? __pfx_smb2_writev_callback+0x10/0x10 [cifs]\n[ 750.350636] [ T9870] ? __pfx_cifs_call_async+0x10/0x10 [cifs]\n[ 750.350756] [ T9870] ? __pfx__raw_spin_lock+0x10/0x10\n[ 750.350760] [ T9870] ? __kasan_check_write+0x14/0x30\n[ 750.350763] [ T98\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: corregir desbordamiento de max_sge en smb_extract_folioq_to_rdma() Esto corrige el siguiente problema: [ 749.901015] [ T8673] ejecutar fstests cifs/001 a las 2025-06-17 09:40:30 [ 750.346409] [ T9870] ====================================================================== [ 750.346814] [ T9870] ERROR: KASAN: slab-out-of-bounds in smb_set_sge+0x2cc/0x3b0 [cifs] [ 750.347330] [ T9870] Write of size 8 at addr ffff888011082890 by task xfs_io/9870 [ 750.347705] [ T9870] [ 750.348077] [ T9870] CPU: 0 UID: 0 PID: 9870 Comm: xfs_io Kdump: loaded Not tainted 6.16.0-rc2-metze.02+ #1 PREEMPT(voluntary) [ 750.348082] [ T9870] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 [ 750.348085] [ T9870] Call Trace: [ 750.348086] [ T9870] [ 750.348088] [ T9870] dump_stack_lvl+0x76/0xa0 [ 750.348106] [ T9870] print_report+0xd1/0x640 [ 750.348116] [ T9870] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 750.348120] [ T9870] ? kasan_complete_mode_report_info+0x26/0x210 [ 750.348124] [ T9870] kasan_report+0xe7/0x130 [ 750.348128] [ T9870] ? smb_set_sge+0x2cc/0x3b0 [cifs] [ 750.348262] [ T9870] ? smb_set_sge+0x2cc/0x3b0 [cifs] [ 750.348377] [ T9870] __asan_report_store8_noabort+0x17/0x30 [ 750.348381] [ T9870] smb_set_sge+0x2cc/0x3b0 [cifs] [ 750.348496] [ T9870] smbd_post_send_iter+0x1990/0x3070 [cifs] [ 750.348625] [ T9870] ? __pfx_smbd_post_send_iter+0x10/0x10 [cifs] [ 750.348741] [ T9870] ? update_stack_state+0x2a0/0x670 [ 750.348749] [ T9870] ? cifs_flush+0x153/0x320 [cifs] [ 750.348870] [ T9870] ? cifs_flush+0x153/0x320 [cifs] [ 750.348990] [ T9870] ? update_stack_state+0x2a0/0x670 [ 750.348995] [ T9870] smbd_send+0x58c/0x9c0 [cifs] [ 750.349117] [ T9870] ? __pfx_smbd_send+0x10/0x10 [cifs] [ 750.349231] [ T9870] ? unwind_get_return_address+0x65/0xb0 [ 750.349235] [ T9870] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 750.349242] [ T9870] ? arch_stack_walk+0xa7/0x100 [ 750.349250] [ T9870] ? stack_trace_save+0x92/0xd0 [ 750.349254] [ T9870] __smb_send_rqst+0x931/0xec0 [cifs] [ 750.349374] [ T9870] ? kernel_text_address+0x173/0x190 [ 750.349379] [ T9870] ? kasan_save_stack+0x39/0x70 [ 750.349382] [ T9870] ? kasan_save_track+0x18/0x70 [ 750.349385] [ T9870] ? __kasan_slab_alloc+0x9d/0xa0 [ 750.349389] [ T9870] ? __pfx___smb_send_rqst+0x10/0x10 [cifs] [ 750.349508] [ T9870] ? smb2_mid_entry_alloc+0xb4/0x7e0 [cifs] [ 750.349626] [ T9870] ? cifs_call_async+0x277/0xb00 [cifs] [ 750.349746] [ T9870] ? cifs_issue_write+0x256/0x610 [cifs] [ 750.349867] [ T9870] ? netfs_do_issue_write+0xc2/0x340 [netfs] [ 750.349900] [ T9870] ? netfs_advance_write+0x45b/0x1270 [netfs] [ 750.349929] [ T9870] ? netfs_write_folio+0xd6c/0x1be0 [netfs] [ 750.349958] [ T9870] ? netfs_writepages+0x2e9/0xa80 [netfs] [ 750.349987] [ T9870] ? do_writepages+0x21f/0x590 [ 750.349993] [ T9870] ? filemap_fdatawrite_wbc+0xe1/0x140 [ 750.349997] [ T9870] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 750.350002] [ T9870] smb_send_rqst+0x22e/0x2f0 [cifs] [ 750.350131] [ T9870] ? __pfx_smb_send_rqst+0x10/0x10 [cifs] [ 750.350255] [ T9870] ? local_clock_noinstr+0xe/0xd0 [ 750.350261] [ T9870] ? kasan_save_alloc_info+0x37/0x60 [ 750.350268] [ T9870] ? __kasan_check_write+0x14/0x30 [ 750.350271] [ T9870] ? _raw_spin_lock+0x81/0xf0 [ 750.350275] [ T9870] ? __pfx__raw_spin_lock+0x10/0x10 [ 750.350278] [ T9870] ? smb2_setup_async_request+0x293/0x580 [cifs] [ 750.350398] [ T9870] cifs_call_async+0x477/0xb00 [cifs] [ 750.350518] [ T9870] ? __pfx_smb2_writev_callback+0x10/0x10 [cifs] [ 750.350636] [ T9870] ? __pfx_cifs_call_async+0x10/0x10 [cifs] [ 750.350756] [ T9870] ? __pfx__raw_spin_lock+0x10/0x10 [ 750.350760] [ T9870] ? __kasan_check_write+0x14/0x30 [ 750.350763] [ T98 ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38180.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38180.json
index fefebca05a9..9ed0ccb6a7a 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38180.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38180.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38180",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.700",
- "lastModified": "2025-07-04T14:15:24.700",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: fix /proc/net/atm/lec handling\n\n/proc/net/atm/lec must ensure safety against dev_lec[] changes.\n\nIt appears it had dev_put() calls without prior dev_hold(),\nleading to imbalance and UAF."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: atm: fix /proc/net/atm/lec. El manejo de /proc/net/atm/lec debe garantizar la seguridad contra cambios en dev_lec[]. Al parecer, se invocaban llamadas a dev_put() sin dev_hold() previo, lo que provocaba desequilibrio y UAF."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38181.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38181.json
index f6df058b7be..10e068774d3 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38181.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38181.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38181",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.860",
- "lastModified": "2025-07-04T14:15:24.860",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk->rsk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet's return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: calipso: Se corrigi\u00f3 un error de referencia nulo (null-ptr-deref) en calipso_req_{set,del}attr(). syzkaller report\u00f3 un error de referencia nulo (null-ptr-deref) en sock_omalloc() al asignar una opci\u00f3n de CALIPSO. [0] El valor nulo (NULL) corresponde a la estructura sock, obtenida por sk_to_full_sk() en calipso_req_setattr(). Desde el commit a1a5344ddbe8 (\"tcp: evitar dos operaciones at\u00f3micas para syncookies\"), reqsk->rsk_listener podr\u00eda ser nulo (NULL) cuando se devuelve una cookie SYN a su cliente, como lo indica el registro principal de cookies SYN. Aqu\u00ed hay 3 opciones para corregir el error: 1) Devolver 0 en calipso_req_setattr() 2) Devolver un error en calipso_req_setattr() 3) Siempre establecer rsk_listener 1) no es ir ya que omite LSM, pero 2) deshabilita efectivamente SYN Cookie para CALIPSO. 3) tampoco es ir ya que ha habido muchos esfuerzos para reducir las operaciones at\u00f3micas y hacer que TCP sea robusto contra DDoS. Vea tambi\u00e9n el commit 3b24d854cb35 (\"tcp/dccp: no toque el oyente sk_refcnt bajo synflood\"). A partir de el commit culpada, SYN Cookie ya no necesitaba refcounting, y nadie se ha topado con el error durante 9 a\u00f1os, por lo que a ning\u00fan usuario de CALIPSO le importar\u00e1 SYN Cookie. Vamos a devolver un error en calipso_req_setattr() y calipso_req_delattr() en el caso de SYN Cookie. Esto se puede reproducir mediante [1] en Fedora y ahora se agota el tiempo de conexi\u00f3n de connect() de nc. [0]: TCP: request_sock_TCPv6: Posible inundaci\u00f3n de SYN en el puerto [::]:20002. Enviando cookies. Ups: fallo de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] CPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:read_pnet include/net/net_namespace.h:406 [inline] RIP: 0010:sock_net include/net/sock.h:655 [inline] RIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806 Code: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b RSP: 0018:ffff88811af89038 EFLAGS: 00010216 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400 RDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030 RBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e R10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000 R13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050 FS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0 PKRU: 80000000 Call Trace: ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288 calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204 calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597 netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249 selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342 selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551 security_inet_conn_request+0x50/0xa0 security/security.c:4945 tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825 tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275 tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328 tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781 tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667 tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904 ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436 ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480 NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491 dst_input include/net/dst.h:469 [inline] ip6_rcv_finish net/ipv6/ip6_input.c ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38182.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38182.json
index ce48c523af8..efda361544d 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38182.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38182.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38182",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.990",
- "lastModified": "2025-07-04T14:15:24.990",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nublk: santizize the arguments from userspace when adding a device\n\nSanity check the values for queue depth and number of queues\nwe get from userspace when adding a device."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ublk: depurar los argumentos del espacio de usuario al agregar un dispositivo. Verificar la solidez de los valores de profundidad de cola y n\u00famero de colas que obtenemos del espacio de usuario al agregar un dispositivo."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38183.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38183.json
index 52839f23880..89a1d4b9c44 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38183.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38183.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38183",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.113",
- "lastModified": "2025-07-04T14:15:25.113",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get()\n\nBefore calling lan743x_ptp_io_event_clock_get(), the 'channel' value\nis checked against the maximum value of PCI11X1X_PTP_IO_MAX_CHANNELS(8).\nThis seems correct and aligns with the PTP interrupt status register\n(PTP_INT_STS) specifications.\n\nHowever, lan743x_ptp_io_event_clock_get() writes to ptp->extts[] with\nonly LAN743X_PTP_N_EXTTS(4) elements, using channel as an index:\n\n lan743x_ptp_io_event_clock_get(..., u8 channel,...)\n {\n ...\n /* Update Local timestamp */\n extts = &ptp->extts[channel];\n extts->ts.tv_sec = sec;\n ...\n }\n\nTo avoid an out-of-bounds write and utilize all the supported GPIO\ninputs, set LAN743X_PTP_N_EXTTS to 8.\n\nDetected using the static analysis tool - Svace."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: lan743x: correcci\u00f3n de una posible escritura fuera de los l\u00edmites en lan743x_ptp_io_event_clock_get(). Antes de llamar a lan743x_ptp_io_event_clock_get(), el valor del canal se compara con el valor m\u00e1ximo de PCI11X1X_PTP_IO_MAX_CHANNELS(8). Esto parece correcto y se ajusta a las especificaciones del registro de estado de interrupci\u00f3n PTP (PTP_INT_STS). Sin embargo, lan743x_ptp_io_event_clock_get() escribe en ptp->extts[] solo con elementos LAN743X_PTP_N_EXTTS(4), usando el canal como \u00edndice: lan743x_ptp_io_event_clock_get(..., u8 channel,...) { ... /* Actualizar marca de tiempo local */ extts = &ptp->extts[channel]; extts->ts.tv_sec = sec; ... } Para evitar una escritura fuera de los l\u00edmites y utilizar todas las entradas GPIO compatibles, configure LAN743X_PTP_N_EXTTS en 8. Detectado usando la herramienta de an\u00e1lisis est\u00e1tico - Svace."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38184.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38184.json
index c6cb7cc630a..9df64cfdc8a 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38184.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38184.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38184",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.237",
- "lastModified": "2025-07-04T14:15:25.237",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer\n\nThe reproduction steps:\n1. create a tun interface\n2. enable l2 bearer\n3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun\n\ntipc: Started in network mode\ntipc: Node identity 8af312d38a21, cluster identity 4711\ntipc: Enabled bearer , priority 1\nOops: general protection fault\nKASAN: null-ptr-deref in range\nCPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT\nHardware name: QEMU Ubuntu 24.04 PC\nRIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0\n\nthe ub was in fact a struct dev.\n\nwhen bid != 0 && skip_cnt != 0, bearer_list[bid] may be NULL or\nother media when other thread changes it.\n\nfix this by checking media_id."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tipc: corregir null-ptr-deref al adquirir la IP remota del portador Ethernet Pasos de reproducci\u00f3n: 1. crear una interfaz tun 2. habilitar el portador l2 3. TIPC_NL_UDP_GET_REMOTEIP con el nombre del medio establecido en tun tipc: iniciado en modo de red tipc: identidad del nodo 8af312d38a21, identidad del cl\u00faster 4711 tipc: portador habilitado , prioridad 1 Oops: error de protecci\u00f3n general KASAN: null-ptr-deref en el rango CPU: 1 UID: 1000 PID: 559 Comm: poc No contaminado 6.16.0-rc1+ #117 PREEMPT Nombre del hardware: QEMU Ubuntu 24.04 PC RIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0 el ub era de hecho un struct dev. cuando bid != 0 y skip_cnt != 0, bearer_list[bid] puede ser NULL u otro medio cuando otro hilo lo cambia. solucione esto comprobando media_id."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38185.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38185.json
index 06752babc23..a6164eec1d2 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38185.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38185.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38185",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.377",
- "lastModified": "2025-07-04T14:15:25.377",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: atmtcp: Free invalid length skb in atmtcp_c_send().\n\nsyzbot reported the splat below. [0]\n\nvcc_sendmsg() copies data passed from userspace to skb and passes\nit to vcc->dev->ops->send().\n\natmtcp_c_send() accesses skb->data as struct atmtcp_hdr after\nchecking if skb->len is 0, but it's not enough.\n\nAlso, when skb->len == 0, skb and sk (vcc) were leaked because\ndev_kfree_skb() is not called and sk_wmem_alloc adjustment is missing\nto revert atm_account_tx() in vcc_sendmsg(), which is expected\nto be done in atm_pop_raw().\n\nLet's properly free skb with an invalid length in atmtcp_c_send().\n\n[0]:\nBUG: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294\n atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294\n vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644\n sock_sendmsg_nosec net/socket.c:712 [inline]\n __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n __sys_sendmsg net/socket.c:2652 [inline]\n __do_sys_sendmsg net/socket.c:2657 [inline]\n __se_sys_sendmsg net/socket.c:2655 [inline]\n __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655\n x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4154 [inline]\n slab_alloc_node mm/slub.c:4197 [inline]\n kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249\n kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579\n __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670\n alloc_skb include/linux/skbuff.h:1336 [inline]\n vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628\n sock_sendmsg_nosec net/socket.c:712 [inline]\n __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n __sys_sendmsg net/socket.c:2652 [inline]\n __do_sys_sendmsg net/socket.c:2657 [inline]\n __se_sys_sendmsg net/socket.c:2655 [inline]\n __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655\n x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: atm: atmtcp: Free invalid length skb in atmtcp_c_send(). syzbot report\u00f3 el splat a continuaci\u00f3n. [0] vcc_sendmsg() copia los datos pasados del espacio de usuario a skb y los pasa a vcc->dev->ops->send(). atmtcp_c_send() accede a skb->data como struct atmtcp_hdr despu\u00e9s de verificar si skb->len es 0, pero no es suficiente. Adem\u00e1s, cuando skb->len == 0, skb y sk (vcc) se filtraron porque no se llama a dev_kfree_skb() y falta el ajuste sk_wmem_alloc para revertir atm_account_tx() en vcc_sendmsg(), lo que se espera que se haga en atm_pop_raw(). Liberemos adecuadamente skb con una longitud no v\u00e1lida en atmtcp_c_send(). [0]: ERROR: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294 atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294 vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmsg net/socket.c:2652 [inline] __do_sys_sendmsg net/socket.c:2657 [inline] __se_sys_sendmsg net/socket.c:2655 [inline] __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: slab_post_alloc_hook mm/slub.c:4154 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249 kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579 __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670 alloc_skb include/linux/skbuff.h:1336 [inline] vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmsg net/socket.c:2652 [inline] __do_sys_sendmsg net/socket.c:2657 [inline] __se_sys_sendmsg net/socket.c:2655 [inline] __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f CPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38186.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38186.json
index c1cb0f4944a..8c860cf624d 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38186.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38186.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38186",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.520",
- "lastModified": "2025-07-04T14:15:25.520",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start()\n\nBefore the commit under the Fixes tag below, bnxt_ulp_stop() and\nbnxt_ulp_start() were always invoked in pairs. After that commit,\nthe new bnxt_ulp_restart() can be invoked after bnxt_ulp_stop()\nhas been called. This may result in the RoCE driver's aux driver\n.suspend() method being invoked twice. The 2nd bnxt_re_suspend()\ncall will crash when it dereferences a NULL pointer:\n\n(NULL ib_device): Handle device suspend call\nBUG: kernel NULL pointer dereference, address: 0000000000000b78\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP PTI\nCPU: 20 UID: 0 PID: 181 Comm: kworker/u96:5 Tainted: G S 6.15.0-rc1 #4 PREEMPT(voluntary)\nTainted: [S]=CPU_OUT_OF_SPEC\nHardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017\nWorkqueue: bnxt_pf_wq bnxt_sp_task [bnxt_en]\nRIP: 0010:bnxt_re_suspend+0x45/0x1f0 [bnxt_re]\nCode: 8b 05 a7 3c 5b f5 48 89 44 24 18 31 c0 49 8b 5c 24 08 4d 8b 2c 24 e8 ea 06 0a f4 48 c7 c6 04 60 52 c0 48 89 df e8 1b ce f9 ff <48> 8b 83 78 0b 00 00 48 8b 80 38 03 00 00 a8 40 0f 85 b5 00 00 00\nRSP: 0018:ffffa2e84084fd88 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001\nRDX: 0000000000000000 RSI: ffffffffb4b6b934 RDI: 00000000ffffffff\nRBP: ffffa1760954c9c0 R08: 0000000000000000 R09: c0000000ffffdfff\nR10: 0000000000000001 R11: ffffa2e84084fb50 R12: ffffa176031ef070\nR13: ffffa17609775000 R14: ffffa17603adc180 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffffa17daa397000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000b78 CR3: 00000004aaa30003 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\nbnxt_ulp_stop+0x69/0x90 [bnxt_en]\nbnxt_sp_task+0x678/0x920 [bnxt_en]\n? __schedule+0x514/0xf50\nprocess_scheduled_works+0x9d/0x400\nworker_thread+0x11c/0x260\n? __pfx_worker_thread+0x10/0x10\nkthread+0xfe/0x1e0\n? __pfx_kthread+0x10/0x10\nret_from_fork+0x2b/0x40\n? __pfx_kthread+0x10/0x10\nret_from_fork_asm+0x1a/0x30\n\nCheck the BNXT_EN_FLAG_ULP_STOPPED flag and do not proceed if the flag\nis already set. This will preserve the original symmetrical\nbnxt_ulp_stop() and bnxt_ulp_start().\n\nAlso, inside bnxt_ulp_start(), clear the BNXT_EN_FLAG_ULP_STOPPED\nflag after taking the mutex to avoid any race condition. And for\nsymmetry, only proceed in bnxt_ulp_start() if the\nBNXT_EN_FLAG_ULP_STOPPED is set."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bnxt_en: Se corrige la doble invocaci\u00f3n de bnxt_ulp_stop()/bnxt_ulp_start(). Antes de la confirmaci\u00f3n bajo la etiqueta \"Correcciones\", bnxt_ulp_stop() y bnxt_ulp_start() siempre se invocaban en pares. Tras dicha confirmaci\u00f3n, se puede invocar el nuevo bnxt_ulp_restart() tras llamar a bnxt_ulp_stop(). Esto puede provocar que el m\u00e9todo .suspend() del controlador auxiliar del controlador RoCE se invoque dos veces. La segunda llamada bnxt_re_suspend() se bloquear\u00e1 cuando desreferencia un puntero NULL: (NULL ib_device): Manejar llamada de suspensi\u00f3n del dispositivo ERROR: kernel NULL pointer dereference, address: 0000000000000b78 PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP PTI CPU: 20 UID: 0 PID: 181 Comm: kworker/u96:5 Tainted: G S 6.15.0-rc1 #4 PREEMPT(voluntary) Tainted: [S]=CPU_OUT_OF_SPEC Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017 Workqueue: bnxt_pf_wq bnxt_sp_task [bnxt_en] RIP: 0010:bnxt_re_suspend+0x45/0x1f0 [bnxt_re] Code: 8b 05 a7 3c 5b f5 48 89 44 24 18 31 c0 49 8b 5c 24 08 4d 8b 2c 24 e8 ea 06 0a f4 48 c7 c6 04 60 52 c0 48 89 df e8 1b ce f9 ff <48> 8b 83 78 0b 00 00 48 8b 80 38 03 00 00 a8 40 0f 85 b5 00 00 00 RSP: 0018:ffffa2e84084fd88 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffffb4b6b934 RDI: 00000000ffffffff RBP: ffffa1760954c9c0 R08: 0000000000000000 R09: c0000000ffffdfff R10: 0000000000000001 R11: ffffa2e84084fb50 R12: ffffa176031ef070 R13: ffffa17609775000 R14: ffffa17603adc180 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffffa17daa397000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000b78 CR3: 00000004aaa30003 CR4: 00000000003706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bnxt_ulp_stop+0x69/0x90 [bnxt_en] bnxt_sp_task+0x678/0x920 [bnxt_en] ? __schedule+0x514/0xf50 process_scheduled_works+0x9d/0x400 worker_thread+0x11c/0x260 ? __pfx_worker_thread+0x10/0x10 kthread+0xfe/0x1e0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2b/0x40 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 Compruebe el indicador BNXT_EN_FLAG_ULP_STOPPED y no contin\u00fae si ya est\u00e1 activado. Esto conservar\u00e1 las operaciones sim\u00e9tricas originales bnxt_ulp_stop() y bnxt_ulp_start(). Adem\u00e1s, dentro de bnxt_ulp_start(), borre el indicador BNXT_EN_FLAG_ULP_STOPPED despu\u00e9s de tomar el mutex para evitar cualquier condici\u00f3n de ejecuci\u00f3n. Y para la simetr\u00eda, solo proceda en bnxt_ulp_start() si BNXT_EN_FLAG_ULP_STOPPED est\u00e1 configurado."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38187.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38187.json
index c646f41cad5..c7769bf9ef0 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38187.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38187.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38187",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.640",
- "lastModified": "2025-07-04T14:15:25.640",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix a use-after-free in r535_gsp_rpc_push()\n\nThe RPC container is released after being passed to r535_gsp_rpc_send().\n\nWhen sending the initial fragment of a large RPC and passing the\ncaller's RPC container, the container will be freed prematurely. Subsequent\nattempts to send remaining fragments will therefore result in a\nuse-after-free.\n\nAllocate a temporary RPC container for holding the initial fragment of a\nlarge RPC when sending. Free the caller's container when all fragments\nare successfully sent.\n\n[ Rebase onto Blackwell changes. - Danilo ]"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau: se corrige un error de use-after-free en r535_gsp_rpc_push(). El contenedor RPC se libera tras pasarse a r535_gsp_rpc_send(). Al enviar el fragmento inicial de una RPC grande y pasar el contenedor RPC del emisor, este se liberar\u00e1 prematuramente. Por lo tanto, los intentos posteriores de enviar los fragmentos restantes resultar\u00e1n en un error de use-after-free. Asigne un contenedor RPC temporal para almacenar el fragmento inicial de una RPC grande durante el env\u00edo. Libere el contenedor del emisor cuando todos los fragmentos se hayan enviado correctamente. [Rebase sobre los cambios de Blackwell. - Danilo]"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38188.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38188.json
index e5e385da57c..b171b7e7c1c 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38188.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38188.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38188",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.760",
- "lastModified": "2025-07-04T14:15:25.760",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/a7xx: Call CP_RESET_CONTEXT_STATE\n\nCalling this packet is necessary when we switch contexts because there\nare various pieces of state used by userspace to synchronize between BR\nand BV that are persistent across submits and we need to make sure that\nthey are in a \"safe\" state when switching contexts. Otherwise a\nuserspace submission in one context could cause another context to\nfunction incorrectly and hang, effectively a denial of service (although\nwithout leaking data). This was missed during initial a7xx bringup.\n\nPatchwork: https://patchwork.freedesktop.org/patch/654924/"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/a7xx: Llamada a CP_RESET_CONTEXT_STATE. Llamar a este paquete es necesario al cambiar de contexto, ya que el espacio de usuario utiliza varios fragmentos de estado para sincronizar entre BR y BV que son persistentes entre env\u00edos, y debemos asegurarnos de que est\u00e9n en un estado seguro al cambiar de contexto. De lo contrario, un env\u00edo del espacio de usuario en un contexto podr\u00eda provocar que otro contexto funcione incorrectamente y se cuelgue, lo que constituye una denegaci\u00f3n de servicio (aunque sin fugas de datos). Esto se pas\u00f3 por alto durante la activaci\u00f3n inicial de a7xx. Patchwork: https://patchwork.freedesktop.org/patch/654924/"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38189.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38189.json
index 910a09e70a1..d8df10f1477 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38189.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38189.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38189",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.883",
- "lastModified": "2025-07-04T14:15:25.883",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`\n\nThe following kernel Oops was recently reported by Mesa CI:\n\n[ 800.139824] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000588\n[ 800.148619] Mem abort info:\n[ 800.151402] ESR = 0x0000000096000005\n[ 800.155141] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 800.160444] SET = 0, FnV = 0\n[ 800.163488] EA = 0, S1PTW = 0\n[ 800.166619] FSC = 0x05: level 1 translation fault\n[ 800.171487] Data abort info:\n[ 800.174357] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n[ 800.179832] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 800.184873] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 800.190176] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001014c2000\n[ 800.196607] [0000000000000588] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[ 800.205305] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n[ 800.211564] Modules linked in: vc4 snd_soc_hdmi_codec drm_display_helper v3d cec gpu_sched drm_dma_helper drm_shmem_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm i2c_brcmstb snd_timer snd backlight\n[ 800.234448] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1 Debian 1:6.12.25-1+rpt1\n[ 800.244182] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)\n[ 800.250005] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 800.256959] pc : v3d_job_update_stats+0x60/0x130 [v3d]\n[ 800.262112] lr : v3d_job_update_stats+0x48/0x130 [v3d]\n[ 800.267251] sp : ffffffc080003e60\n[ 800.270555] x29: ffffffc080003e60 x28: ffffffd842784980 x27: 0224012000000000\n[ 800.277687] x26: ffffffd84277f630 x25: ffffff81012fd800 x24: 0000000000000020\n[ 800.284818] x23: ffffff8040238b08 x22: 0000000000000570 x21: 0000000000000158\n[ 800.291948] x20: 0000000000000000 x19: ffffff8040238000 x18: 0000000000000000\n[ 800.299078] x17: ffffffa8c1bd2000 x16: ffffffc080000000 x15: 0000000000000000\n[ 800.306208] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 800.313338] x11: 0000000000000040 x10: 0000000000001a40 x9 : ffffffd83b39757c\n[ 800.320468] x8 : ffffffd842786420 x7 : 7fffffffffffffff x6 : 0000000000ef32b0\n[ 800.327598] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : ffffffd842784980\n[ 800.334728] x2 : 0000000000000004 x1 : 0000000000010002 x0 : 000000ba4c0ca382\n[ 800.341859] Call trace:\n[ 800.344294] v3d_job_update_stats+0x60/0x130 [v3d]\n[ 800.349086] v3d_irq+0x124/0x2e0 [v3d]\n[ 800.352835] __handle_irq_event_percpu+0x58/0x218\n[ 800.357539] handle_irq_event+0x54/0xb8\n[ 800.361369] handle_fasteoi_irq+0xac/0x240\n[ 800.365458] handle_irq_desc+0x48/0x68\n[ 800.369200] generic_handle_domain_irq+0x24/0x38\n[ 800.373810] gic_handle_irq+0x48/0xd8\n[ 800.377464] call_on_irq_stack+0x24/0x58\n[ 800.381379] do_interrupt_handler+0x88/0x98\n[ 800.385554] el1_interrupt+0x34/0x68\n[ 800.389123] el1h_64_irq_handler+0x18/0x28\n[ 800.393211] el1h_64_irq+0x64/0x68\n[ 800.396603] default_idle_call+0x3c/0x168\n[ 800.400606] do_idle+0x1fc/0x230\n[ 800.403827] cpu_startup_entry+0x40/0x50\n[ 800.407742] rest_init+0xe4/0xf0\n[ 800.410962] start_kernel+0x5e8/0x790\n[ 800.414616] __primary_switched+0x80/0x90\n[ 800.418622] Code: 8b170277 8b160296 11000421 b9000861 (b9401ac1)\n[ 800.424707] ---[ end trace 0000000000000000 ]---\n[ 800.457313] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---\n\nThis issue happens when the file descriptor is closed before the jobs\nsubmitted by it are completed. When the job completes, we update the\nglobal GPU stats and the per-fd GPU stats, which are exposed through\nfdinfo. If the file descriptor was closed, then the struct `v3d_file_priv`\nand its stats were already freed and we can't update the per-fd stats.\n\nTherefore, if the file descriptor was already closed, don't u\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/v3d: Evitar la desreferencia de puntero NULL en `v3d_job_update_stats()` El siguiente error del kernel fue informado recientemente por Mesa CI: [ 800.139824] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000588 [ 800.148619] Mem abort info: [ 800.151402] ESR = 0x0000000096000005 [ 800.155141] EC = 0x25: DABT (current EL), IL = 32 bits [ 800.160444] SET = 0, FnV = 0 [ 800.163488] EA = 0, S1PTW = 0 [ 800.166619] FSC = 0x05: level 1 translation fault [ 800.171487] Data abort info: [ 800.174357] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 800.179832] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 800.184873] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 800.190176] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001014c2000 [ 800.196607] [0000000000000588] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 [ 800.205305] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 800.211564] Modules linked in: vc4 snd_soc_hdmi_codec drm_display_helper v3d cec gpu_sched drm_dma_helper drm_shmem_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm i2c_brcmstb snd_timer snd backlight [ 800.234448] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1 Debian 1:6.12.25-1+rpt1 [ 800.244182] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT) [ 800.250005] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 800.256959] pc : v3d_job_update_stats+0x60/0x130 [v3d] [ 800.262112] lr : v3d_job_update_stats+0x48/0x130 [v3d] [ 800.267251] sp : ffffffc080003e60 [ 800.270555] x29: ffffffc080003e60 x28: ffffffd842784980 x27: 0224012000000000 [ 800.277687] x26: ffffffd84277f630 x25: ffffff81012fd800 x24: 0000000000000020 [ 800.284818] x23: ffffff8040238b08 x22: 0000000000000570 x21: 0000000000000158 [ 800.291948] x20: 0000000000000000 x19: ffffff8040238000 x18: 0000000000000000 [ 800.299078] x17: ffffffa8c1bd2000 x16: ffffffc080000000 x15: 0000000000000000 [ 800.306208] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 800.313338] x11: 0000000000000040 x10: 0000000000001a40 x9 : ffffffd83b39757c [ 800.320468] x8 : ffffffd842786420 x7 : 7fffffffffffffff x6 : 0000000000ef32b0 [ 800.327598] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : ffffffd842784980 [ 800.334728] x2 : 0000000000000004 x1 : 0000000000010002 x0 : 000000ba4c0ca382 [ 800.341859] Call trace: [ 800.344294] v3d_job_update_stats+0x60/0x130 [v3d] [ 800.349086] v3d_irq+0x124/0x2e0 [v3d] [ 800.352835] __handle_irq_event_percpu+0x58/0x218 [ 800.357539] handle_irq_event+0x54/0xb8 [ 800.361369] handle_fasteoi_irq+0xac/0x240 [ 800.365458] handle_irq_desc+0x48/0x68 [ 800.369200] generic_handle_domain_irq+0x24/0x38 [ 800.373810] gic_handle_irq+0x48/0xd8 [ 800.377464] call_on_irq_stack+0x24/0x58 [ 800.381379] do_interrupt_handler+0x88/0x98 [ 800.385554] el1_interrupt+0x34/0x68 [ 800.389123] el1h_64_irq_handler+0x18/0x28 [ 800.393211] el1h_64_irq+0x64/0x68 [ 800.396603] default_idle_call+0x3c/0x168 [ 800.400606] do_idle+0x1fc/0x230 [ 800.403827] cpu_startup_entry+0x40/0x50 [ 800.407742] rest_init+0xe4/0xf0 [ 800.410962] start_kernel+0x5e8/0x790 [ 800.414616] __primary_switched+0x80/0x90 [ 800.418622] Code: 8b170277 8b160296 11000421 b9000861 (b9401ac1) [ 800.424707] ---[fin del seguimiento 0000000000000000 ]--- [800.457313] ---[fin del p\u00e1nico del kernel - no se sincroniza: Oops: Excepci\u00f3n fatal en la interrupci\u00f3n ]--- Este problema ocurre cuando el descriptor de archivo se cierra antes de que se completen los trabajos enviados por \u00e9l. Al completarse el trabajo, actualizamos las estad\u00edsticas globales de la GPU y las estad\u00edsticas de la GPU por archivo de datos, que se exponen mediante fdinfo. Si el descriptor de archivo se cerr\u00f3, la estructura `v3d_file_priv` y sus estad\u00edsticas ya se liberaron, por lo que no podemos actualizar las estad\u00edsticas por archivo de datos. Por lo tanto, si el descriptor de archivo ya se cerr\u00f3, no se debe usar `--truncated---`."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38190.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38190.json
index 453258b258c..0fd92488880 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38190.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38190.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38190",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.017",
- "lastModified": "2025-07-04T14:15:26.017",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: Revert atm_account_tx() if copy_from_iter_full() fails.\n\nIn vcc_sendmsg(), we account skb->truesize to sk->sk_wmem_alloc by\natm_account_tx().\n\nIt is expected to be reverted by atm_pop_raw() later called by\nvcc->dev->ops->send(vcc, skb).\n\nHowever, vcc_sendmsg() misses the same revert when copy_from_iter_full()\nfails, and then we will leak a socket.\n\nLet's factorise the revert part as atm_return_tx() and call it in\nthe failure path.\n\nNote that the corresponding sk_wmem_alloc operation can be found in\nalloc_tx() as of the blamed commit.\n\n $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: atm: Revertir atm_account_tx() si copy_from_iter_full() falla. En vcc_sendmsg(), contabilizamos skb->truesize como sk->sk_wmem_alloc mediante atm_account_tx(). Se espera que sea revertido por atm_pop_raw(), posteriormente llamado por vcc->dev->ops->send(vcc, skb). Sin embargo, vcc_sendmsg() no realiza la misma reversi\u00f3n cuando copy_from_iter_full() falla, y entonces se filtrar\u00e1 un socket. Factoricemos la parte de la reversi\u00f3n como atm_return_tx() y la llamemos en la ruta de error. Tenga en cuenta que la operaci\u00f3n sk_wmem_alloc correspondiente se puede encontrar en alloc_tx() a partir de la confirmaci\u00f3n culpable. $ git culpa -L:alloc_tx net/atm/common.c c55fa3ccccc2c~"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38191.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38191.json
index 0987421a7c6..77f640184dc 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38191.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38191.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38191",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.157",
- "lastModified": "2025-07-04T14:15:26.157",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix null pointer dereference in destroy_previous_session\n\nIf client set ->PreviousSessionId on kerberos session setup stage,\nNULL pointer dereference error will happen. Since sess->user is not\nset yet, It can pass the user argument as NULL to destroy_previous_session.\nsess->user will be set in ksmbd_krb5_authenticate(). So this patch move\ncalling destroy_previous_session() after ksmbd_krb5_authenticate()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige la desreferencia de puntero nulo en destroy_previous_session. Si el cliente configura ->PreviousSessionId durante la configuraci\u00f3n de la sesi\u00f3n Kerberos, se producir\u00e1 un error de desreferencia de puntero nulo. Dado que sess->user a\u00fan no est\u00e1 configurado, se puede pasar el argumento de usuario como nulo a destroy_previous_session. Sess->user se configurar\u00e1 en ksmbd_krb5_authenticate(). Por lo tanto, este parche modifica la llamada a destroy_previous_session() despu\u00e9s de ksmbd_krb5_authenticate()."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38192.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38192.json
index 2658b32c7ec..19ac9154e7b 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38192.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38192.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38192",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.280",
- "lastModified": "2025-07-04T14:15:26.280",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: clear the dst when changing skb protocol\n\nA not-so-careful NAT46 BPF program can crash the kernel\nif it indiscriminately flips ingress packets from v4 to v6:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n ip6_rcv_core (net/ipv6/ip6_input.c:190:20)\n ipv6_rcv (net/ipv6/ip6_input.c:306:8)\n process_backlog (net/core/dev.c:6186:4)\n napi_poll (net/core/dev.c:6906:9)\n net_rx_action (net/core/dev.c:7028:13)\n do_softirq (kernel/softirq.c:462:3)\n netif_rx (net/core/dev.c:5326:3)\n dev_loopback_xmit (net/core/dev.c:4015:2)\n ip_mc_finish_output (net/ipv4/ip_output.c:363:8)\n NF_HOOK (./include/linux/netfilter.h:314:9)\n ip_mc_output (net/ipv4/ip_output.c:400:5)\n dst_output (./include/net/dst.h:459:9)\n ip_local_out (net/ipv4/ip_output.c:130:9)\n ip_send_skb (net/ipv4/ip_output.c:1496:8)\n udp_send_skb (net/ipv4/udp.c:1040:8)\n udp_sendmsg (net/ipv4/udp.c:1328:10)\n\nThe output interface has a 4->6 program attached at ingress.\nWe try to loop the multicast skb back to the sending socket.\nIngress BPF runs as part of netif_rx(), pushes a valid v6 hdr\nand changes skb->protocol to v6. We enter ip6_rcv_core which\ntries to use skb_dst(). But the dst is still an IPv4 one left\nafter IPv4 mcast output.\n\nClear the dst in all BPF helpers which change the protocol.\nTry to preserve metadata dsts, those may carry non-routing\nmetadata."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: borrar el dst al cambiar el protocolo skb Un programa BPF NAT46 no tan cuidadoso puede hacer que el kernel se bloquee si cambia indiscriminadamente los paquetes de entrada de v4 a v6: ERROR: kernel NULL pointer dereference, address: 0000000000000000 ip6_rcv_core (net/ipv6/ip6_input.c:190:20) ipv6_rcv (net/ipv6/ip6_input.c:306:8) process_backlog (net/core/dev.c:6186:4) napi_poll (net/core/dev.c:6906:9) net_rx_action (net/core/dev.c:7028:13) do_softirq (kernel/softirq.c:462:3) netif_rx (net/core/dev.c:5326:3) dev_loopback_xmit (net/core/dev.c:4015:2) ip_mc_finish_output (net/ipv4/ip_output.c:363:8) NF_HOOK (./include/linux/netfilter.h:314:9) ip_mc_output (net/ipv4/ip_output.c:400:5) dst_output (./include/net/dst.h:459:9) ip_local_out (net/ipv4/ip_output.c:130:9) ip_send_skb (net/ipv4/ip_output.c:1496:8) udp_send_skb (net/ipv4/udp.c:1040:8) udp_sendmsg (net/ipv4/udp.c:1328:10) La interfaz de salida tiene un programa 4->6 conectado en la entrada. Intentamos devolver el skb de multidifusi\u00f3n al socket de env\u00edo. El BPF de entrada se ejecuta como parte de netif_rx(), env\u00eda un hdr v6 v\u00e1lido y cambia el protocolo skb a v6. Introducimos ip6_rcv_core, que intenta usar skb_dst(). Sin embargo, el dst sigue siendo IPv4 tras la salida de mcast IPv4. Borre el dst en todos los ayudantes de BPF que cambien el protocolo. Intente conservar los dst de metadatos, ya que pueden contener metadatos no relacionados con el enrutamiento."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38193.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38193.json
index 4a802925482..7d40a3d40bb 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38193.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38193.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38193",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.403",
- "lastModified": "2025-07-04T14:15:26.403",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: reject invalid perturb period\n\nGerrard Tai reported that SFQ perturb_period has no range check yet,\nand this can be used to trigger a race condition fixed in a separate patch.\n\nWe want to make sure ctl->perturb_period * HZ will not overflow\nand is positive.\n\n\ntc qd add dev lo root sfq perturb -10 # negative value : error\nError: sch_sfq: invalid perturb period.\n\ntc qd add dev lo root sfq perturb 1000000000 # too big : error\nError: sch_sfq: invalid perturb period.\n\ntc qd add dev lo root sfq perturb 2000000 # acceptable value\ntc -s -d qd sh dev lo\nqdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec\n Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: sch_sfq: rechaza un per\u00edodo de perturbaci\u00f3n no v\u00e1lido. Gerrard Tai inform\u00f3 que SFQ perturb_period a\u00fan no tiene comprobaci\u00f3n de rango, lo que puede usarse para activar una condici\u00f3n de ejecuci\u00f3n corregida en un parche independiente. Queremos asegurarnos de que ctl->perturb_period * HZ no se desborde y sea positivo. tc qd add dev lo root sfq perturb -10 # valor negativo: error. Error: sch_sfq: per\u00edodo de perturbaci\u00f3n no v\u00e1lido. tc qd add dev lo root sfq perturb 100000000 # demasiado grande: error. Error: sch_sfq: per\u00edodo de perturbaci\u00f3n no v\u00e1lido. tc qd add dev lo root sfq perturb 2000000 # valor aceptable tc -s -d qd sh dev lo qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb Depth 127 flows 128 divisor 1024 perturb 2000000sec Enviados 0 bytes 0 paquete (eliminados 0, sobrepasa los l\u00edmites 0, vuelve a poner en cola 0) backlog 0b 0p vuelve a poner en cola 0"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38194.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38194.json
index 766efc01c6b..339821e95cc 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38194.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38194.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38194",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.530",
- "lastModified": "2025-07-04T14:15:26.530",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: check that raw node were preallocated before writing summary\n\nSyzkaller detected a kernel bug in jffs2_link_node_ref, caused by fault\ninjection in jffs2_prealloc_raw_node_refs. jffs2_sum_write_sumnode doesn't\ncheck return value of jffs2_prealloc_raw_node_refs and simply lets any\nerror propagate into jffs2_sum_write_data, which eventually calls\njffs2_link_node_ref in order to link the summary to an expectedly allocated\nnode.\n\nkernel BUG at fs/jffs2/nodelist.c:592!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nCPU: 1 PID: 31277 Comm: syz-executor.7 Not tainted 6.1.128-syzkaller-00139-ge10f83ca10a1 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:jffs2_link_node_ref+0x570/0x690 fs/jffs2/nodelist.c:592\nCall Trace:\n \n jffs2_sum_write_data fs/jffs2/summary.c:841 [inline]\n jffs2_sum_write_sumnode+0xd1a/0x1da0 fs/jffs2/summary.c:874\n jffs2_do_reserve_space+0xa18/0xd60 fs/jffs2/nodemgmt.c:388\n jffs2_reserve_space+0x55f/0xaa0 fs/jffs2/nodemgmt.c:197\n jffs2_write_inode_range+0x246/0xb50 fs/jffs2/write.c:362\n jffs2_write_end+0x726/0x15d0 fs/jffs2/file.c:301\n generic_perform_write+0x314/0x5d0 mm/filemap.c:3856\n __generic_file_write_iter+0x2ae/0x4d0 mm/filemap.c:3973\n generic_file_write_iter+0xe3/0x350 mm/filemap.c:4005\n call_write_iter include/linux/fs.h:2265 [inline]\n do_iter_readv_writev+0x20f/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10c/0x170 fs/splice.c:950\n splice_direct_to_actor+0x337/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nFix this issue by checking return value of jffs2_prealloc_raw_node_refs\nbefore calling jffs2_sum_write_data.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jffs2: comprobar que los nodos sin procesar se hayan preasignado antes de escribir el resumen Syzkaller detect\u00f3 un error del kernel en jffs2_link_node_ref, causado por la inyecci\u00f3n de un fallo en jffs2_prealloc_raw_node_refs. jffs2_sum_write_sumnode no comprueba el valor de retorno de jffs2_prealloc_raw_node_refs y simplemente permite que cualquier error se propague a jffs2_sum_write_data, que eventualmente llama a jffs2_link_node_ref para vincular el resumen a un nodo asignado como se esperaba. ERROR de fs/jffs2/nodelist.c:592! invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 31277 Comm: syz-executor.7 Not tainted 6.1.128-syzkaller-00139-ge10f83ca10a1 #0 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:jffs2_link_node_ref+0x570/0x690 fs/jffs2/nodelist.c:592 Call Trace: jffs2_sum_write_data fs/jffs2/summary.c:841 [inline] jffs2_sum_write_sumnode+0xd1a/0x1da0 fs/jffs2/summary.c:874 jffs2_do_reserve_space+0xa18/0xd60 fs/jffs2/nodemgmt.c:388 jffs2_reserve_space+0x55f/0xaa0 fs/jffs2/nodemgmt.c:197 jffs2_write_inode_range+0x246/0xb50 fs/jffs2/write.c:362 jffs2_write_end+0x726/0x15d0 fs/jffs2/file.c:301 generic_perform_write+0x314/0x5d0 mm/filemap.c:3856 __generic_file_write_iter+0x2ae/0x4d0 mm/filemap.c:3973 generic_file_write_iter+0xe3/0x350 mm/filemap.c:4005 call_write_iter include/linux/fs.h:2265 [inline] do_iter_readv_writev+0x20f/0x3c0 fs/read_write.c:735 do_iter_write+0x186/0x710 fs/read_write.c:861 vfs_iter_write+0x70/0xa0 fs/read_write.c:902 iter_file_splice_write+0x73b/0xc90 fs/splice.c:685 do_splice_from fs/splice.c:763 [inline] direct_splice_actor+0x10c/0x170 fs/splice.c:950 splice_direct_to_actor+0x337/0xa10 fs/splice.c:896 do_splice_direct+0x1a9/0x280 fs/splice.c:1002 do_sendfile+0xb13/0x12c0 fs/read_write.c:1255 __do_sys_sendfile64 fs/read_write.c:1323 [inline] __se_sys_sendfile64 fs/read_write.c:1309 [inline] __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Fix this issue by checking return value of jffs2_prealloc_raw_node_refs before calling jffs2_sum_write_data. Solucione este problema comprobando el valor de retorno de jffs2_prealloc_raw_node_refs antes de llamar a jffs2_sum_write_data. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38195.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38195.json
index e39d29a2163..ae7a6c6d3b4 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38195.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38195.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38195",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.667",
- "lastModified": "2025-07-04T14:15:26.667",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()\n\nERROR INFO:\n\nCPU 25 Unable to handle kernel paging request at virtual address 0x0\n ...\n Call Trace:\n [<900000000023c30c>] huge_pte_offset+0x3c/0x58\n [<900000000057fd4c>] hugetlb_follow_page_mask+0x74/0x438\n [<900000000051fee8>] __get_user_pages+0xe0/0x4c8\n [<9000000000522414>] faultin_page_range+0x84/0x380\n [<9000000000564e8c>] madvise_vma_behavior+0x534/0xa48\n [<900000000056689c>] do_madvise+0x1bc/0x3e8\n [<9000000000566df4>] sys_madvise+0x24/0x38\n [<90000000015b9e88>] do_syscall+0x78/0x98\n [<9000000000221f18>] handle_syscall+0xb8/0x158\n\nIn some cases, pmd may be NULL and rely on NULL as the return value for\nprocessing, so it is necessary to determine this situation here."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LoongArch: Se corrige el p\u00e1nico causado por NULL-PMD en huge_pte_offset() INFORMACI\u00d3N DE ERROR: CPU 25 No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 0x0 ... Seguimiento de llamadas: [<900000000023c30c>] huge_pte_offset+0x3c/0x58 [<900000000057fd4c>] hugetlb_follow_page_mask+0x74/0x438 [<900000000051fee8>] __get_user_pages+0xe0/0x4c8 [<9000000000522414>] faultin_page_range+0x84/0x380 [<9000000000564e8c>] madvise_vma_behavior+0x534/0xa48 [<900000000056689c>] do_madvise+0x1bc/0x3e8 [<9000000000566df4>] sys_madvise+0x24/0x38 [<90000000015b9e88>] do_syscall+0x78/0x98 [<9000000000221f18>] handle_syscall+0xb8/0x158 En algunos casos, pmd puede ser NULL y depender de NULL como valor de retorno para el procesamiento, por lo que es necesario determinar esta situaci\u00f3n aqu\u00ed."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38196.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38196.json
index 283db9ebcda..fd5983144c5 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38196.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38196.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38196",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.787",
- "lastModified": "2025-07-04T14:15:26.787",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/rsrc: validate buffer count with offset for cloning\n\nsyzbot reports that it can trigger a WARN_ON() for kmalloc() attempt\nthat's too big:\n\nWARNING: CPU: 0 PID: 6488 at mm/slub.c:5024 __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024\nModules linked in:\nCPU: 0 UID: 0 PID: 6488 Comm: syz-executor312 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\npstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024\nlr : __do_kmalloc_node mm/slub.c:-1 [inline]\nlr : __kvmalloc_node_noprof+0x3b4/0x640 mm/slub.c:5012\nsp : ffff80009cfd7a90\nx29: ffff80009cfd7ac0 x28: ffff0000dd52a120 x27: 0000000000412dc0\nx26: 0000000000000178 x25: ffff7000139faf70 x24: 0000000000000000\nx23: ffff800082f4cea8 x22: 00000000ffffffff x21: 000000010cd004a8\nx20: ffff0000d75816c0 x19: ffff0000dd52a000 x18: 00000000ffffffff\nx17: ffff800092f39000 x16: ffff80008adbe9e4 x15: 0000000000000005\nx14: 1ffff000139faf1c x13: 0000000000000000 x12: 0000000000000000\nx11: ffff7000139faf21 x10: 0000000000000003 x9 : ffff80008f27b938\nx8 : 0000000000000002 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 00000000ffffffff x4 : 0000000000400dc0 x3 : 0000000200000000\nx2 : 000000010cd004a8 x1 : ffff80008b3ebc40 x0 : 0000000000000001\nCall trace:\n __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 (P)\n kvmalloc_array_node_noprof include/linux/slab.h:1065 [inline]\n io_rsrc_data_alloc io_uring/rsrc.c:206 [inline]\n io_clone_buffers io_uring/rsrc.c:1178 [inline]\n io_register_clone_buffers+0x484/0xa14 io_uring/rsrc.c:1287\n __io_uring_register io_uring/register.c:815 [inline]\n __do_sys_io_uring_register io_uring/register.c:926 [inline]\n __se_sys_io_uring_register io_uring/register.c:903 [inline]\n __arm64_sys_io_uring_register+0x42c/0xea8 io_uring/register.c:903\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767\n el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n\nwhich is due to offset + buffer_count being too large. The registration\ncode checks only the total count of buffers, but given that the indexing\nis an array, it should also check offset + count. That can't exceed\nIORING_MAX_REG_BUFFERS either, as there's no way to reach buffers beyond\nthat limit.\n\nThere's no issue with registrering a table this large, outside of the\nfact that it's pointless to register buffers that cannot be reached, and\nthat it can trigger this kmalloc() warning for attempting an allocation\nthat is too large."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/rsrc: validar el recuento de b\u00fafer con desplazamiento para la clonaci\u00f3n syzbot informa que puede activar un WARN_ON() para un intento de kmalloc() que es demasiado grande: CPU: 0 PID: 6488 at mm/slub.c:5024 __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 Modules linked in: CPU: 0 UID: 0 PID: 6488 Comm: syz-executor312 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 lr : __do_kmalloc_node mm/slub.c:-1 [inline] lr : __kvmalloc_node_noprof+0x3b4/0x640 mm/slub.c:5012 sp : ffff80009cfd7a90 x29: ffff80009cfd7ac0 x28: ffff0000dd52a120 x27: 0000000000412dc0 x26: 0000000000000178 x25: ffff7000139faf70 x24: 0000000000000000 x23: ffff800082f4cea8 x22: 00000000ffffffff x21: 000000010cd004a8 x20: ffff0000d75816c0 x19: ffff0000dd52a000 x18: 00000000ffffffff x17: ffff800092f39000 x16: ffff80008adbe9e4 x15: 0000000000000005 x14: 1ffff000139faf1c x13: 0000000000000000 x12: 0000000000000000 x11: ffff7000139faf21 x10: 0000000000000003 x9 : ffff80008f27b938 x8 : 0000000000000002 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 00000000ffffffff x4 : 0000000000400dc0 x3 : 0000000200000000 x2 : 000000010cd004a8 x1 : ffff80008b3ebc40 x0 : 0000000000000001 Call trace: __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 (P) kvmalloc_array_node_noprof include/linux/slab.h:1065 [inline] io_rsrc_data_alloc io_uring/rsrc.c:206 [inline] io_clone_buffers io_uring/rsrc.c:1178 [inline] io_register_clone_buffers+0x484/0xa14 io_uring/rsrc.c:1287 __io_uring_register io_uring/register.c:815 [inline] __do_sys_io_uring_register io_uring/register.c:926 [inline] __se_sys_io_uring_register io_uring/register.c:903 [inline] __arm64_sys_io_uring_register+0x42c/0xea8 io_uring/register.c:903 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Esto se debe a que offset + buffer_count es demasiado grande. El c\u00f3digo de registro solo verifica el recuento total de b\u00faferes, pero dado que la indexaci\u00f3n es una matriz, tambi\u00e9n deber\u00eda verificar offset + count. Esto tampoco puede superar IORING_MAX_REG_BUFFERS, ya que no es posible acceder a b\u00faferes m\u00e1s all\u00e1 de ese l\u00edmite. Registrar una tabla tan grande no presenta ning\u00fan problema, salvo que no tiene sentido registrar b\u00faferes inaccesibles y que puede activar la advertencia de kmalloc() por intentar una asignaci\u00f3n demasiado grande."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38197.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38197.json
index d18364db025..a913486a283 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38197.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38197.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38197",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.913",
- "lastModified": "2025-07-04T14:15:26.913",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: dell_rbu: Fix list usage\n\nPass the correct list head to list_for_each_entry*() when looping through\nthe packet list.\n\nWithout this patch, reading the packet data via sysfs will show the data\nincorrectly (because it starts at the wrong packet), and clearing the\npacket list will result in a NULL pointer dereference."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: platform/x86: dell_rbu: Correcci\u00f3n del uso de la lista. Pasar la cabecera de lista correcta a list_for_each_entry*() al recorrer la lista de paquetes. Sin esta correcci\u00f3n, la lectura de los datos del paquete mediante sysfs mostrar\u00e1 los datos incorrectamente (ya que comienzan en el paquete incorrecto), y al borrar la lista de paquetes se producir\u00e1 una desreferencia de puntero nulo."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38198.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38198.json
index 99216e3a4ad..fe7e27324d7 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38198.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38198.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38198",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:27.040",
- "lastModified": "2025-07-04T14:15:27.040",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Make sure modelist not set on unregistered console\n\nIt looks like attempting to write to the \"store_modes\" sysfs node will\nrun afoul of unregistered consoles:\n\nUBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28\nindex -1 is out of range for type 'fb_info *[32]'\n...\n fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122\n fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048\n fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673\n store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113\n dev_attr_store+0x55/0x80 drivers/base/core.c:2439\n\nstatic struct fb_info *fbcon_registered_fb[FB_MAX];\n...\nstatic signed char con2fb_map[MAX_NR_CONSOLES];\n...\nstatic struct fb_info *fbcon_info_from_console(int console)\n...\n return fbcon_registered_fb[con2fb_map[console]];\n\nIf con2fb_map contains a -1 things go wrong here. Instead, return NULL,\nas callers of fbcon_info_from_console() are trying to compare against\nexisting \"info\" pointers, so error handling should kick in correctly."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbcon: Aseg\u00farese de que modelist no est\u00e9 configurado en una consola no registrada Parece que intentar escribir en el nodo sysfs \"store_modes\" entrar\u00e1 en conflicto con las consolas no registradas: UBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28 index -1 is out of range for type 'fb_info *[32]' ... fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122 fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048 fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673 store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113 dev_attr_store+0x55/0x80 drivers/base/core.c:2439 static struct fb_info *fbcon_registered_fb[FB_MAX]; ... static signed char con2fb_map[MAX_NR_CONSOLES]; ... static struct fb_info *fbcon_info_from_console(int console) ... return fbcon_registered_fb[con2fb_map[console]]; Si con2fb_map contiene un valor de -1, la situaci\u00f3n podr\u00eda fallar. En su lugar, se devuelve NULL, ya que quienes llaman a fbcon_info_from_console() intentan comparar con punteros \"info\" existentes, por lo que la gesti\u00f3n de errores deber\u00eda funcionar correctamente."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-381xx/CVE-2025-38199.json b/CVE-2025/CVE-2025-381xx/CVE-2025-38199.json
index 42411e347f2..80bc79487fa 100644
--- a/CVE-2025/CVE-2025-381xx/CVE-2025-38199.json
+++ b/CVE-2025/CVE-2025-381xx/CVE-2025-38199.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38199",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:27.707",
- "lastModified": "2025-07-04T14:15:27.707",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix memory leak due to multiple rx_stats allocation\n\nrx_stats for each arsta is allocated when adding a station.\narsta->rx_stats will be freed when a station is removed.\n\nRedundant allocations are occurring when the same station is added\nmultiple times. This causes ath12k_mac_station_add() to be called\nmultiple times, and rx_stats is allocated each time. As a result there\nis memory leaks.\n\nPrevent multiple allocations of rx_stats when ath12k_mac_station_add()\nis called repeatedly by checking if rx_stats is already allocated\nbefore allocating again. Allocate arsta->rx_stats if arsta->rx_stats\nis NULL respectively.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: Se solucion\u00f3 una fuga de memoria debido a la asignaci\u00f3n m\u00faltiple de rx_stats. rx_stats para cada arsta se asigna al a\u00f1adir una estaci\u00f3n. arsta->rx_stats se liberar\u00e1 al eliminar una estaci\u00f3n. Se producen asignaciones redundantes cuando se a\u00f1ade la misma estaci\u00f3n varias veces. Esto provoca que ath12k_mac_station_add() se invoque varias veces y que rx_stats se asigne cada vez. Como resultado, se producen fugas de memoria. Evite las asignaciones m\u00faltiples de rx_stats cuando ath12k_mac_station_add() se invoque repetidamente comprobando si rx_stats ya est\u00e1 asignado antes de volver a asignarlo. Asigne arsta->rx_stats si arsta->rx_stats es NULL, respectivamente. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1 Probado en: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38200.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38200.json
index eda57262ac4..1aadc029897 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38200.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38200.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38200",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:27.877",
- "lastModified": "2025-07-04T14:15:27.877",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix MMIO write access to an invalid page in i40e_clear_hw\n\nWhen the device sends a specific input, an integer underflow can occur, leading\nto MMIO write access to an invalid page.\n\nPrevent the integer underflow by changing the type of related variables."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i40e: se corrige el acceso de escritura MMIO a una p\u00e1gina no v\u00e1lida en i40e_clear_hw. Cuando el dispositivo env\u00eda una entrada espec\u00edfica, puede producirse un desbordamiento de enteros, lo que provoca el acceso de escritura MMIO a una p\u00e1gina no v\u00e1lida. Para evitar este desbordamiento, cambie el tipo de las variables relacionadas."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38201.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38201.json
index 529d966250e..af8f30698bc 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38201.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38201.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38201",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.000",
- "lastModified": "2025-07-04T14:15:28.000",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX\n\nOtherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof()\nwhen resizing hashtable because __GFP_NOWARN is unset.\n\nSimilar to:\n\n b541ba7d1f5a (\"netfilter: conntrack: clamp maximum hashtable size to INT_MAX\")"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_set_pipapo: fijar el tama\u00f1o m\u00e1ximo del contenedor de mapas a INT_MAX. De lo contrario, es posible que se active WARN_ON_ONCE en __kvmalloc_node_noprof() al redimensionar la tabla hash porque __GFP_NOWARN no est\u00e1 configurado. Similar a: b541ba7d1f5a (\"netfilter: conntrack: fijar el tama\u00f1o m\u00e1ximo de la tabla hash a INT_MAX\")"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38202.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38202.json
index 0e2511a633d..148a84c8524 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38202.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38202.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38202",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.117",
- "lastModified": "2025-07-04T14:15:28.117",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()\n\nbpf_map_lookup_percpu_elem() helper is also available for sleepable bpf\nprogram. When BPF JIT is disabled or under 32-bit host,\nbpf_map_lookup_percpu_elem() will not be inlined. Using it in a\nsleepable bpf program will trigger the warning in\nbpf_map_lookup_percpu_elem(), because the bpf program only holds\nrcu_read_lock_trace lock. Therefore, add the missed check."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: La comprobaci\u00f3n de rcu_read_lock_trace_held() en bpf_map_lookup_percpu_elem() tambi\u00e9n est\u00e1 disponible para programas bpf en suspensi\u00f3n. Cuando BPF JIT est\u00e1 deshabilitado o en un host de 32 bits, bpf_map_lookup_percpu_elem() no se incluir\u00e1 en l\u00ednea. Su uso en un programa bpf en suspensi\u00f3n activar\u00e1 la advertencia en bpf_map_lookup_percpu_elem(), ya que el programa bpf solo mantiene el bloqueo rcu_read_lock_trace. Por lo tanto, se debe agregar la comprobaci\u00f3n omitida."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38203.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38203.json
index ad766a872fd..39f29c80e2d 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38203.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38203.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38203",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.247",
- "lastModified": "2025-07-04T14:15:28.247",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: Fix null-ptr-deref in jfs_ioc_trim\n\n[ Syzkaller Report ]\n\nOops: general protection fault, probably for non-canonical address\n0xdffffc0000000087: 0000 [#1\nKASAN: null-ptr-deref in range [0x0000000000000438-0x000000000000043f]\nCPU: 2 UID: 0 PID: 10614 Comm: syz-executor.0 Not tainted\n6.13.0-rc6-gfbfd64d25c7a-dirty #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nSched_ext: serialise (enabled+all), task: runnable_at=-30ms\nRIP: 0010:jfs_ioc_trim+0x34b/0x8f0\nCode: e7 e8 59 a4 87 fe 4d 8b 24 24 4d 8d bc 24 38 04 00 00 48 8d 93\n90 82 fe ff 4c 89 ff 31 f6\nRSP: 0018:ffffc900055f7cd0 EFLAGS: 00010206\nRAX: 0000000000000087 RBX: 00005866a9e67ff8 RCX: 000000000000000a\nRDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000000000001\nRBP: dffffc0000000000 R08: ffff88807c180003 R09: 1ffff1100f830000\nR10: dffffc0000000000 R11: ffffed100f830001 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000438\nFS: 00007fe520225640(0000) GS:ffff8880b7e80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005593c91b2c88 CR3: 000000014927c000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n? __die_body+0x61/0xb0\n? die_addr+0xb1/0xe0\n? exc_general_protection+0x333/0x510\n? asm_exc_general_protection+0x26/0x30\n? jfs_ioc_trim+0x34b/0x8f0\njfs_ioctl+0x3c8/0x4f0\n? __pfx_jfs_ioctl+0x10/0x10\n? __pfx_jfs_ioctl+0x10/0x10\n__se_sys_ioctl+0x269/0x350\n? __pfx___se_sys_ioctl+0x10/0x10\n? do_syscall_64+0xfb/0x210\ndo_syscall_64+0xee/0x210\n? syscall_exit_to_user_mode+0x1e0/0x330\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fe51f4903ad\nCode: c3 e8 a7 2b 00 00 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 f8 48\n89 f7 48 89 d6 48 89 ca 4d\nRSP: 002b:00007fe5202250c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fe51f5cbf80 RCX: 00007fe51f4903ad\nRDX: 0000000020000680 RSI: 00000000c0185879 RDI: 0000000000000005\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fe520225640\nR13: 000000000000000e R14: 00007fe51f44fca0 R15: 00007fe52021d000\n\nModules linked in:\n---[ end trace 0000000000000000 ]---\nRIP: 0010:jfs_ioc_trim+0x34b/0x8f0\nCode: e7 e8 59 a4 87 fe 4d 8b 24 24 4d 8d bc 24 38 04 00 00 48 8d 93\n90 82 fe ff 4c 89 ff 31 f6\nRSP: 0018:ffffc900055f7cd0 EFLAGS: 00010206\nRAX: 0000000000000087 RBX: 00005866a9e67ff8 RCX: 000000000000000a\nRDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000000000001\nRBP: dffffc0000000000 R08: ffff88807c180003 R09: 1ffff1100f830000\nR10: dffffc0000000000 R11: ffffed100f830001 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000438\nFS: 00007fe520225640(0000) GS:ffff8880b7e80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005593c91b2c88 CR3: 000000014927c000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nKernel panic - not syncing: Fatal exception\n\n[ Analysis ]\n\nWe believe that we have found a concurrency bug in the `fs/jfs` module\nthat results in a null pointer dereference. There is a closely related\nissue which has been fixed:\n\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6c1b3599b2feb5c7291f5ac3a36e5fa7cedb234\n\n... but, unfortunately, the accepted patch appears to still be\nsusceptible to a null pointer dereference under some interleavings.\n\nTo trigger the bug, we think that `JFS_SBI(ipbmap->i_sb)->bmap` is set\nto NULL in `dbFreeBits` and then dereferenced in `jfs_ioc_trim`. This\nbug manifests quite rarely under normal circumstances, but is\ntriggereable from a syz-program."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: Fix null-ptr-deref in jfs_ioc_trim [Informe de Syzkaller] Oops: fallo de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000087: 0000 [#1 KASAN: null-ptr-deref in range [0x0000000000000438-0x000000000000043f] CPU: 2 UID: 0 PID: 10614 Comm: syz-executor.0 Not tainted 6.13.0-rc6-gfbfd64d25c7a-dirty #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Sched_ext: serialise (enabled+all), task: runnable_at=-30ms RIP: 0010:jfs_ioc_trim+0x34b/0x8f0 Code: e7 e8 59 a4 87 fe 4d 8b 24 24 4d 8d bc 24 38 04 00 00 48 8d 93 90 82 fe ff 4c 89 ff 31 f6 RSP: 0018:ffffc900055f7cd0 EFLAGS: 00010206 RAX: 0000000000000087 RBX: 00005866a9e67ff8 RCX: 000000000000000a RDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000000000001 RBP: dffffc0000000000 R08: ffff88807c180003 R09: 1ffff1100f830000 R10: dffffc0000000000 R11: ffffed100f830001 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000438 FS: 00007fe520225640(0000) GS:ffff8880b7e80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005593c91b2c88 CR3: 000000014927c000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ? __die_body+0x61/0xb0 ? die_addr+0xb1/0xe0 ? exc_general_protection+0x333/0x510 ? asm_exc_general_protection+0x26/0x30 ? jfs_ioc_trim+0x34b/0x8f0 jfs_ioctl+0x3c8/0x4f0 ? __pfx_jfs_ioctl+0x10/0x10 ? __pfx_jfs_ioctl+0x10/0x10 __se_sys_ioctl+0x269/0x350 ? __pfx___se_sys_ioctl+0x10/0x10 ? do_syscall_64+0xfb/0x210 do_syscall_64+0xee/0x210 ? syscall_exit_to_user_mode+0x1e0/0x330 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe51f4903ad Code: c3 e8 a7 2b 00 00 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d RSP: 002b:00007fe5202250c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fe51f5cbf80 RCX: 00007fe51f4903ad RDX: 0000000020000680 RSI: 00000000c0185879 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe520225640 R13: 000000000000000e R14: 00007fe51f44fca0 R15: 00007fe52021d000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:jfs_ioc_trim+0x34b/0x8f0 Code: e7 e8 59 a4 87 fe 4d 8b 24 24 4d 8d bc 24 38 04 00 00 48 8d 93 90 82 fe ff 4c 89 ff 31 f6 RSP: 0018:ffffc900055f7cd0 EFLAGS: 00010206 RAX: 0000000000000087 RBX: 00005866a9e67ff8 RCX: 000000000000000a RDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000000000001 RBP: dffffc0000000000 R08: ffff88807c180003 R09: 1ffff1100f830000 R10: dffffc0000000000 R11: ffffed100f830001 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000438 FS: 00007fe520225640(0000) GS:ffff8880b7e80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005593c91b2c88 CR3: 000000014927c000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Kernel panic - not syncing: Fatal exception [ Analysis ] Creemos que hemos encontrado un error de concurrencia en el m\u00f3dulo `fs/jfs` que da como resultado una desreferencia de puntero nulo. Existe un problema estrechamente relacionado que ya se ha corregido: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6c1b3599b2feb5c7291f5ac3a36e5fa7cedb234... pero, lamentablemente, el parche aceptado parece seguir siendo susceptible a una desreferencia de puntero nulo en algunas intercalaciones. Creemos que para desencadenar el error, `JFS_SBI(ipbmap->i_sb)->bmap` se establece en NULL en `dbFreeBits` y luego se desreferencia en `jfs_ioc_trim`. Este error es poco frecuente en circunstancias normales, pero se puede desencadenar desde un programa syz."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38204.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38204.json
index c54150554ed..3fa63be8cc0 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38204.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38204.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38204",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.383",
- "lastModified": "2025-07-04T14:15:28.383",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds read in add_missing_indices\n\nstbl is s8 but it must contain offsets into slot which can go from 0 to\n127.\n\nAdded a bound check for that error and return -EIO if the check fails.\nAlso make jfs_readdir return with error if add_missing_indices returns\nwith an error."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: se corrige la lectura de array-index-out-of-bounds en add_missing_indices. El stbl es s8, pero debe contener desplazamientos en la ranura, que pueden ir de 0 a 127. Se a\u00f1adi\u00f3 una comprobaci\u00f3n de l\u00edmite para ese error y se devuelve -EIO si la comprobaci\u00f3n falla. Tambi\u00e9n se hace que jfs_readdir devuelva un error si add_missing_indices devuelve un error."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38205.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38205.json
index fc951437ce3..9022b9e0980 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38205.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38205.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38205",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.540",
- "lastModified": "2025-07-04T14:15:28.540",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid divide by zero by initializing dummy pitch to 1\n\n[Why]\nIf the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated\nthen they can lead to a divide by zero in downstream callers like\nCalculateVMAndRowBytes()\n\n[How]\nInitialize dummy value to a value to avoid divide by zero."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Evite la divisi\u00f3n por cero inicializando el paso ficticio en 1 [Por qu\u00e9] Si los valores ficticios en `populate_dummy_dml_surface_cfg()` no se actualizan, pueden provocar una divisi\u00f3n por cero en los llamadores posteriores como CalculateVMAndRowBytes() [C\u00f3mo] Inicialice el valor ficticio en un valor para evitar la divisi\u00f3n por cero."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38206.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38206.json
index 08836c63f46..639b3b1925a 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38206.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38206.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38206",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.703",
- "lastModified": "2025-07-04T14:15:28.703",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix double free in delayed_free\n\nThe double free could happen in the following path.\n\nexfat_create_upcase_table()\n exfat_create_upcase_table() : return error\n exfat_free_upcase_table() : free ->vol_utbl\n exfat_load_default_upcase_table : return error\n exfat_kill_sb()\n delayed_free()\n exfat_free_upcase_table() <--------- double free\nThis patch set ->vol_util as NULL after freeing it."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: corrige la doble liberaci\u00f3n en delayed_free La doble liberaci\u00f3n podr\u00eda ocurrir en la siguiente ruta. exfat_create_upcase_table() exfat_create_upcase_table() : devolver error exfat_free_upcase_table() : liberar ->vol_utbl exfat_load_default_upcase_table : devolver error exfat_kill_sb() delayed_free() exfat_free_upcase_table() <--------- doble liberaci\u00f3n Este parche establece ->vol_util como NULL despu\u00e9s de liberarlo."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38207.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38207.json
index 284ece0c910..34eb30a3561 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38207.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38207.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38207",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.823",
- "lastModified": "2025-07-04T14:15:28.823",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix uprobe pte be overwritten when expanding vma\n\nPatch series \"Fix uprobe pte be overwritten when expanding vma\".\n\n\nThis patch (of 4):\n\nWe encountered a BUG alert triggered by Syzkaller as follows:\n BUG: Bad rss-counter state mm:00000000b4a60fca type:MM_ANONPAGES val:1\n\nAnd we can reproduce it with the following steps:\n1. register uprobe on file at zero offset\n2. mmap the file at zero offset:\n addr1 = mmap(NULL, 2 * 4096, PROT_NONE, MAP_PRIVATE, fd, 0);\n3. mremap part of vma1 to new vma2:\n addr2 = mremap(addr1, 4096, 2 * 4096, MREMAP_MAYMOVE);\n4. mremap back to orig addr1:\n mremap(addr2, 4096, 4096, MREMAP_MAYMOVE | MREMAP_FIXED, addr1);\n\nIn step 3, the vma1 range [addr1, addr1 + 4096] will be remap to new vma2\nwith range [addr2, addr2 + 8192], and remap uprobe anon page from the vma1\nto vma2, then unmap the vma1 range [addr1, addr1 + 4096].\n\nIn step 4, the vma2 range [addr2, addr2 + 4096] will be remap back to the\naddr range [addr1, addr1 + 4096]. Since the addr range [addr1 + 4096,\naddr1 + 8192] still maps the file, it will take vma_merge_new_range to\nexpand the range, and then do uprobe_mmap in vma_complete. Since the\nmerged vma pgoff is also zero offset, it will install uprobe anon page to\nthe merged vma. However, the upcomming move_page_tables step, which use\nset_pte_at to remap the vma2 uprobe pte to the merged vma, will overwrite\nthe newly uprobe pte in the merged vma, and lead that pte to be orphan.\n\nSince the uprobe pte will be remapped to the merged vma, we can remove the\nunnecessary uprobe_mmap upon merged vma.\n\nThis problem was first found in linux-6.6.y and also exists in the\ncommunity syzkaller:\nhttps://lore.kernel.org/all/000000000000ada39605a5e71711@google.com/T/"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: se corrige la sobrescritura del archivo uprobe al expandir vma. Serie de parches \"Corregir la sobrescritura del archivo uprobe al expandir vma\". Este parche (de 4): Se detect\u00f3 una alerta de error generada por Syzkaller: Error: Estado incorrecto del contador RSS mm:00000000b4a60fca tipo:MM_ANONPAGES val:1. Se puede reproducir con los siguientes pasos: 1. Registrar uprobe en el archivo con desplazamiento cero. 2. Asignar el archivo con mmap en el desplazamiento cero: addr1 = mmap(NULL, 2 * 4096, PROT_NONE, MAP_PRIVATE, fd, 0); 3. Asignar con mremap parte de vma1 al nuevo vma2: addr2 = mremap(addr1, 4096, 2 * 4096, MREMAP_MAYMOVE); 4. mremap de vuelta a la direcci\u00f3n original 1: mremap(addr2, 4096, 4096, MREMAP_MAYMOVE | MREMAP_FIXED, addr1); En el paso 3, el rango vma1 [addr1, addr1 + 4096] se reasignar\u00e1 a la nueva vma2 con rango [addr2, addr2 + 8192] y se reasignar\u00e1 la p\u00e1gina uprobe anon de vma1 a vma2, luego desasignar\u00e1 el rango vma1 [addr1, addr1 + 4096]. En el paso 4, el rango vma2 [addr2, addr2 + 4096] se reasignar\u00e1 de nuevo al rango addr [addr1, addr1 + 4096]. Dado que el rango de direcciones [addr1 + 4096, addr1 + 8192] a\u00fan asigna el archivo, se requerir\u00e1 vma_merge_new_range para expandir el rango y luego ejecutar uprobe_mmap en vma_complete. Dado que el desplazamiento de la p\u00e1gina de la vma fusionada tambi\u00e9n tiene desplazamiento cero, se instalar\u00e1 uprobe anon page en la vma fusionada. Sin embargo, el siguiente paso `move_page_tables`, que usa `set_pte_at` para reasignar la pte de uprobe vma2 a la vma fusionada, sobrescribir\u00e1 la nueva pte de uprobe en la vma fusionada y la dejar\u00e1 hu\u00e9rfana. Dado que la pte de uprobe se reasignar\u00e1 a la vma fusionada, podemos eliminar uprobe_mmap innecesario al fusionar la vma. Este problema se encontr\u00f3 por primera vez en linux-6.6.y y tambi\u00e9n existe en la comunidad syzkaller: https://lore.kernel.org/all/000000000000ada39605a5e71711@google.com/T/"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38208.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38208.json
index b40f381c3ac..22c140b0cdb 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38208.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38208.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38208",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.950",
- "lastModified": "2025-07-04T14:15:28.950",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: add NULL check in automount_fullpath\n\npage is checked for null in __build_path_from_dentry_optional_prefix\nwhen tcon->origin_fullpath is not set. However, the check is missing when\nit is set.\nAdd a check to prevent a potential NULL pointer dereference."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: Se comprueba si la comprobaci\u00f3n de a\u00f1adir NULL en la p\u00e1gina automount_fullpath contiene valores nulos en __build_path_from_dentry_optional_prefix cuando tcon->origin_fullpath no est\u00e1 configurado. Sin embargo, la comprobaci\u00f3n no se encuentra disponible cuando s\u00ed lo est\u00e1. Se ha a\u00f1adido una comprobaci\u00f3n para evitar una posible desreferencia de punteros NULL."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38209.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38209.json
index f06b596c6b4..24eaf310913 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38209.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38209.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38209",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.080",
- "lastModified": "2025-07-04T14:15:29.080",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: remove tag set when second admin queue config fails\n\nCommit 104d0e2f6222 (\"nvme-fabrics: reset admin connection for secure\nconcatenation\") modified nvme_tcp_setup_ctrl() to call\nnvme_tcp_configure_admin_queue() twice. The first call prepares for\nDH-CHAP negotitation, and the second call is required for secure\nconcatenation. However, this change triggered BUG KASAN slab-use-after-\nfree in blk_mq_queue_tag_busy_iter(). This BUG can be recreated by\nrepeating the blktests test case nvme/063 a few times [1].\n\nWhen the BUG happens, nvme_tcp_create_ctrl() fails in the call chain\nbelow:\n\nnvme_tcp_create_ctrl()\n nvme_tcp_alloc_ctrl() new=true ... Alloc nvme_tcp_ctrl and admin_tag_set\n nvme_tcp_setup_ctrl() new=true\n nvme_tcp_configure_admin_queue() new=true ... Succeed\n nvme_alloc_admin_tag_set() ... Alloc the tag set for admin_tag_set\n nvme_stop_keep_alive()\n nvme_tcp_teardown_admin_queue() remove=false\n nvme_tcp_configure_admin_queue() new=false\n nvme_tcp_alloc_admin_queue() ... Fail, but do not call nvme_remove_admin_tag_set()\n nvme_uninit_ctrl()\n nvme_put_ctrl() ... Free up the nvme_tcp_ctrl and admin_tag_set\n\nThe first call of nvme_tcp_configure_admin_queue() succeeds with\nnew=true argument. The second call fails with new=false argument. This\nsecond call does not call nvme_remove_admin_tag_set() on failure, due to\nthe new=false argument. Then the admin tag set is not removed. However,\nnvme_tcp_create_ctrl() assumes that nvme_tcp_setup_ctrl() would call\nnvme_remove_admin_tag_set(). Then it frees up struct nvme_tcp_ctrl which\nhas admin_tag_set field. Later on, the timeout handler accesses the\nadmin_tag_set field and causes the BUG KASAN slab-use-after-free.\n\nTo not leave the admin tag set, call nvme_remove_admin_tag_set() when\nthe second nvme_tcp_configure_admin_queue() call fails. Do not return\nfrom nvme_tcp_setup_ctrl() on failure. Instead, jump to \"destroy_admin\"\ngo-to label to call nvme_tcp_teardown_admin_queue() which calls\nnvme_remove_admin_tag_set()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-tcp: eliminar el conjunto de etiquetas cuando falla la configuraci\u00f3n de la segunda cola de administraci\u00f3n. El commit 104d0e2f6222 (\"nvme-fabrics: restablecer la conexi\u00f3n de administraci\u00f3n para una concatenaci\u00f3n segura\") modific\u00f3 nvme_tcp_setup_ctrl() para llamar a nvme_tcp_configure_admin_queue() dos veces. La primera llamada prepara la negociaci\u00f3n DH-CHAP y la segunda es necesaria para la concatenaci\u00f3n segura. Sin embargo, este cambio activ\u00f3 el error \"slab-use-after-free\" en blk_mq_queue_tag_busy_iter()\". Este error se puede recrear repitiendo el caso de prueba blktests nvme/063 varias veces [1]. Cuando ocurre el ERROR, nvme_tcp_create_ctrl() falla en la siguiente cadena de llamadas: nvme_tcp_create_ctrl() nvme_tcp_alloc_ctrl() new=true ... Asignar nvme_tcp_ctrl y admin_tag_set nvme_tcp_setup_ctrl() new=true nvme_tcp_configure_admin_queue() new=true ... Correcto nvme_alloc_admin_tag_set() ... Asignar el conjunto de etiquetas para admin_tag_set nvme_stop_keep_alive() nvme_tcp_teardown_admin_queue() remove=false nvme_tcp_configure_admin_queue() new=false nvme_tcp_alloc_admin_queue() ... Falla, pero no se llama nvme_remove_admin_tag_set() nvme_uninit_ctrl() nvme_put_ctrl() ... Libera nvme_tcp_ctrl y admin_tag_set La primera llamada de nvme_tcp_configure_admin_queue() tiene \u00e9xito con el argumento new=true. La segunda llamada falla con el argumento new=false. Esta segunda llamada no llama a nvme_remove_admin_tag_set() en caso de error, debido al argumento new=false. Entonces, el conjunto de etiquetas admin no se elimina. Sin embargo, nvme_tcp_create_ctrl() supone que nvme_tcp_setup_ctrl() llamar\u00eda a nvme_remove_admin_tag_set(). Luego libera la estructura nvme_tcp_ctrl que tiene el campo admin_tag_set. Posteriormente, el controlador de tiempo de espera accede al campo admin_tag_set y provoca el error \"BUG KASAN slab-use-after-free\". Para mantener la etiqueta admin activa, llame a nvme_remove_admin_tag_set() cuando falle la segunda llamada a nvme_tcp_configure_admin_queue(). No regrese de nvme_tcp_setup_ctrl() en caso de error. En su lugar, vaya a la etiqueta \"destroy_admin\" para llamar a nvme_tcp_teardown_admin_queue(), que a su vez llama a nvme_remove_admin_tag_set()."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38210.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38210.json
index 27d02db1893..9dd2ffc71ee 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38210.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38210.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38210",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.207",
- "lastModified": "2025-07-04T14:15:29.207",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nconfigfs-tsm-report: Fix NULL dereference of tsm_ops\n\nUnlike sysfs, the lifetime of configfs objects is controlled by\nuserspace. There is no mechanism for the kernel to find and delete all\ncreated config-items. Instead, the configfs-tsm-report mechanism has an\nexpectation that tsm_unregister() can happen at any time and cause\nestablished config-item access to start failing.\n\nThat expectation is not fully satisfied. While tsm_report_read(),\ntsm_report_{is,is_bin}_visible(), and tsm_report_make_item() safely fail\nif tsm_ops have been unregistered, tsm_report_privlevel_store()\ntsm_report_provider_show() fail to check for ops registration. Add the\nmissing checks for tsm_ops having been removed.\n\nNow, in supporting the ability for tsm_unregister() to always succeed,\nit leaves the problem of what to do with lingering config-items. The\nexpectation is that the admin that arranges for the ->remove() (unbind)\nof the ${tsm_arch}-guest driver is also responsible for deletion of all\nopen config-items. Until that deletion happens, ->probe() (reload /\nbind) of the ${tsm_arch}-guest driver fails.\n\nThis allows for emergency shutdown / revocation of attestation\ninterfaces, and requires coordinated restart."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: configfs-tsm-report: Arregla la desreferencia NULL de tsm_ops A diferencia de sysfs, el tiempo de vida de los objetos configfs est\u00e1 controlado por el espacio de usuario. No hay ning\u00fan mecanismo para que el kernel encuentre y elimine todos los elementos de configuraci\u00f3n creados. En cambio, el mecanismo configfs-tsm-report tiene una expectativa de que tsm_unregister() puede suceder en cualquier momento y hacer que el acceso establecido a los elementos de configuraci\u00f3n empiece a fallar. Esa expectativa no se cumple por completo. Mientras que tsm_report_read(), tsm_report_{is,is_bin}_visible() y tsm_report_make_item() fallan de forma segura si se ha anulado el registro de tsm_ops, tsm_report_privlevel_store() y tsm_report_provider_show() no comprueban el registro de operaciones. A\u00f1ade las comprobaciones que faltan para que se hayan eliminado los tsm_ops. Ahora, al permitir que tsm_unregister() siempre se ejecute correctamente, se plantea el problema de qu\u00e9 hacer con los elementos de configuraci\u00f3n persistentes. Se espera que el administrador que gestiona la eliminaci\u00f3n del controlador invitado ${tsm_arch} tambi\u00e9n sea responsable de eliminar todos los elementos de configuraci\u00f3n abiertos. Hasta que se elimine, la recarga y la vinculaci\u00f3n del controlador invitado ${tsm_arch} falla. Esto permite el apagado o la revocaci\u00f3n de emergencia de las interfaces de atestaci\u00f3n y requiere un reinicio coordinado."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38211.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38211.json
index c27a983b9c8..bcb975b3ad5 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38211.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38211.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38211",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.337",
- "lastModified": "2025-07-04T14:15:29.337",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/iwcm: Fix use-after-free of work objects after cm_id destruction\n\nThe commit 59c68ac31e15 (\"iw_cm: free cm_id resources on the last\nderef\") simplified cm_id resource management by freeing cm_id once all\nreferences to the cm_id were removed. The references are removed either\nupon completion of iw_cm event handlers or when the application destroys\nthe cm_id. This commit introduced the use-after-free condition where\ncm_id_private object could still be in use by event handler works during\nthe destruction of cm_id. The commit aee2424246f9 (\"RDMA/iwcm: Fix a\nuse-after-free related to destroying CM IDs\") addressed this use-after-\nfree by flushing all pending works at the cm_id destruction.\n\nHowever, still another use-after-free possibility remained. It happens\nwith the work objects allocated for each cm_id_priv within\nalloc_work_entries() during cm_id creation, and subsequently freed in\ndealloc_work_entries() once all references to the cm_id are removed.\nIf the cm_id's last reference is decremented in the event handler work,\nthe work object for the work itself gets removed, and causes the use-\nafter-free BUG below:\n\n BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250\n Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091\n\n CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\n Workqueue: 0x0 (iw_cm_wq)\n Call Trace:\n \n dump_stack_lvl+0x6a/0x90\n print_report+0x174/0x554\n ? __virt_addr_valid+0x208/0x430\n ? __pwq_activate_work+0x1ff/0x250\n kasan_report+0xae/0x170\n ? __pwq_activate_work+0x1ff/0x250\n __pwq_activate_work+0x1ff/0x250\n pwq_dec_nr_in_flight+0x8c5/0xfb0\n process_one_work+0xc11/0x1460\n ? __pfx_process_one_work+0x10/0x10\n ? assign_work+0x16c/0x240\n worker_thread+0x5ef/0xfd0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x3b0/0x770\n ? __pfx_kthread+0x10/0x10\n ? rcu_is_watching+0x11/0xb0\n ? _raw_spin_unlock_irq+0x24/0x50\n ? rcu_is_watching+0x11/0xb0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x30/0x70\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \n\n Allocated by task 147416:\n kasan_save_stack+0x2c/0x50\n kasan_save_track+0x10/0x30\n __kasan_kmalloc+0xa6/0xb0\n alloc_work_entries+0xa9/0x260 [iw_cm]\n iw_cm_connect+0x23/0x4a0 [iw_cm]\n rdma_connect_locked+0xbfd/0x1920 [rdma_cm]\n nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]\n cma_cm_event_handler+0xae/0x320 [rdma_cm]\n cma_work_handler+0x106/0x1b0 [rdma_cm]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\n Freed by task 147091:\n kasan_save_stack+0x2c/0x50\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kfree+0x13a/0x4b0\n dealloc_work_entries+0x125/0x1f0 [iw_cm]\n iwcm_deref_id+0x6f/0xa0 [iw_cm]\n cm_work_handler+0x136/0x1ba0 [iw_cm]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\n Last potentially related work creation:\n kasan_save_stack+0x2c/0x50\n kasan_record_aux_stack+0xa3/0xb0\n __queue_work+0x2ff/0x1390\n queue_work_on+0x67/0xc0\n cm_event_handler+0x46a/0x820 [iw_cm]\n siw_cm_upcall+0x330/0x650 [siw]\n siw_cm_work_handler+0x6b9/0x2b20 [siw]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\nThis BUG is reproducible by repeating the blktests test case nvme/061\nfor the rdma transport and the siw driver.\n\nTo avoid the use-after-free of cm_id_private work objects, ensure that\nthe last reference to the cm_id is decremented not in the event handler\nworks, but in the cm_id destruction context. For that purpose, mo\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/iwcm: Correcci\u00f3n del use-after-free de objetos de trabajo despu\u00e9s de la destrucci\u00f3n de cm_id El commit 59c68ac31e15 (\"iw_cm: liberar recursos de cm_id en la \u00faltima desreferencia\") simplific\u00f3 la gesti\u00f3n de recursos de cm_id al liberar cm_id una vez que se eliminaron todas las referencias a cm_id. Las referencias se eliminan al completarse los controladores de eventos iw_cm o cuando la aplicaci\u00f3n destruye cm_id. Este commit introdujo la condici\u00f3n de use-after-free donde el objeto cm_id_private a\u00fan podr\u00eda estar en uso por los controladores de eventos durante la destrucci\u00f3n de cm_id. El commit aee2424246f9 (\"RDMA/iwcm: Correcci\u00f3n de un use-after-free relacionado con la destrucci\u00f3n de los ID de CM\") abord\u00f3 este use-after-free al vaciar todos los trabajos pendientes en la destrucci\u00f3n de cm_id. Sin embargo, a\u00fan quedaba otra posibilidad de use-after-free. Esto sucede con los objetos de trabajo asignados para cada cm_id_priv dentro de alloc_work_entries() durante la creaci\u00f3n de cm_id, y posteriormente se liberan en dealloc_work_entries() una vez que se eliminan todas las referencias a cm_id. Si la \u00faltima referencia de cm_id se decrementa en el manejador de eventos work, el objeto de trabajo para el trabajo en s\u00ed se elimina y causa el siguiente ERROR de use-after-free: ERROR: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250 Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091 CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014 Workqueue: 0x0 (iw_cm_wq) Call Trace: dump_stack_lvl+0x6a/0x90 print_report+0x174/0x554 ? __virt_addr_valid+0x208/0x430 ? __pwq_activate_work+0x1ff/0x250 kasan_report+0xae/0x170 ? __pwq_activate_work+0x1ff/0x250 __pwq_activate_work+0x1ff/0x250 pwq_dec_nr_in_flight+0x8c5/0xfb0 process_one_work+0xc11/0x1460 ? __pfx_process_one_work+0x10/0x10 ? assign_work+0x16c/0x240 worker_thread+0x5ef/0xfd0 ? __pfx_worker_thread+0x10/0x10 kthread+0x3b0/0x770 ? __pfx_kthread+0x10/0x10 ? rcu_is_watching+0x11/0xb0 ? _raw_spin_unlock_irq+0x24/0x50 ? rcu_is_watching+0x11/0xb0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x30/0x70 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 Allocated by task 147416: kasan_save_stack+0x2c/0x50 kasan_save_track+0x10/0x30 __kasan_kmalloc+0xa6/0xb0 alloc_work_entries+0xa9/0x260 [iw_cm] iw_cm_connect+0x23/0x4a0 [iw_cm] rdma_connect_locked+0xbfd/0x1920 [rdma_cm] nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma] cma_cm_event_handler+0xae/0x320 [rdma_cm] cma_work_handler+0x106/0x1b0 [rdma_cm] process_one_work+0x84f/0x1460 worker_thread+0x5ef/0xfd0 kthread+0x3b0/0x770 ret_from_fork+0x30/0x70 ret_from_fork_asm+0x1a/0x30 Freed by task 147091: kasan_save_stack+0x2c/0x50 kasan_save_track+0x10/0x30 kasan_save_free_info+0x37/0x60 __kasan_slab_free+0x4b/0x70 kfree+0x13a/0x4b0 dealloc_work_entries+0x125/0x1f0 [iw_cm] iwcm_deref_id+0x6f/0xa0 [iw_cm] cm_work_handler+0x136/0x1ba0 [iw_cm] process_one_work+0x84f/0x1460 worker_thread+0x5ef/0xfd0 kthread+0x3b0/0x770 ret_from_fork+0x30/0x70 ret_from_fork_asm+0x1a/0x30 Last potentially related work creation: kasan_save_stack+0x2c/0x50 kasan_record_aux_stack+0xa3/0xb0 __queue_work+0x2ff/0x1390 queue_work_on+0x67/0xc0 cm_event_handler+0x46a/0x820 [iw_cm] siw_cm_upcall+0x330/0x650 [siw] siw_cm_work_handler+0x6b9/0x2b20 [siw] process_one_work+0x84f/0x1460 worker_thread+0x5ef/0xfd0 kthread+0x3b0/0x770 ret_from_fork+0x30/0x70 ret_from_fork_asm+0x1a/0x30 Este error se puede reproducir repitiendo el caso de prueba blktests nvme/061 para el transporte rdma y el controlador siw. Para evitar el uso posterior a la liberaci\u00f3n de objetos de trabajo cm_id_private, aseg\u00farese de que la \u00faltima referencia a cm_id se decremente no en los trabajos del controlador de eventos, sino en el contexto de destrucci\u00f3n de cm_id. Para ello, mo ---truncated---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38212.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38212.json
index c904cd01954..537e91bde59 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38212.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38212.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38212",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.473",
- "lastModified": "2025-07-04T14:15:29.473",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough. If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipc: correcci\u00f3n para proteger las b\u00fasquedas IPCS mediante RCU. syzbot inform\u00f3 del descubrimiento de una vulnerabilidad de use-after-free, [0] [0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/ idr_for_each() est\u00e1 protegido por rwsem, pero esto no es suficiente. Si no est\u00e1 protegido por la regi\u00f3n cr\u00edtica de lectura de RCU, cuando idr_for_each() llama a radix_tree_node_free() mediante call_rcu() para liberar la estructura radix_tree_node, el nodo se liberar\u00e1 inmediatamente y, al leer el siguiente nodo en radix_tree_for_each_slot(), se podr\u00e1 leer la memoria ya liberada. Por lo tanto, necesitamos agregar c\u00f3digo para asegurarnos de que idr_for_each() est\u00e9 protegido dentro de la regi\u00f3n cr\u00edtica de lectura de RCU cuando lo llamamos en shm_destroy_orphaned()."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38213.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38213.json
index 780ad8bb3f0..1997704aabb 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38213.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38213.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38213",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.710",
- "lastModified": "2025-07-04T14:15:29.710",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvgacon: Add check for vc_origin address range in vgacon_scroll()\n\nOur in-house Syzkaller reported the following BUG (twice), which we\nbelieved was the same issue with [1]:\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in vcs_scr_readw+0xc2/0xd0 drivers/tty/vt/vt.c:4740\nRead of size 2 at addr ffff88800f5bef60 by task syz.7.2620/12393\n...\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x72/0xa0 lib/dump_stack.c:106\n print_address_description.constprop.0+0x6b/0x3d0 mm/kasan/report.c:364\n print_report+0xba/0x280 mm/kasan/report.c:475\n kasan_report+0xa9/0xe0 mm/kasan/report.c:588\n vcs_scr_readw+0xc2/0xd0 drivers/tty/vt/vt.c:4740\n vcs_write_buf_noattr drivers/tty/vt/vc_screen.c:493 [inline]\n vcs_write+0x586/0x840 drivers/tty/vt/vc_screen.c:690\n vfs_write+0x219/0x960 fs/read_write.c:584\n ksys_write+0x12e/0x260 fs/read_write.c:639\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n ...\n \n\nAllocated by task 5614:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n ____kasan_kmalloc mm/kasan/common.c:374 [inline]\n __kasan_kmalloc+0x8f/0xa0 mm/kasan/common.c:383\n kasan_kmalloc include/linux/kasan.h:201 [inline]\n __do_kmalloc_node mm/slab_common.c:1007 [inline]\n __kmalloc+0x62/0x140 mm/slab_common.c:1020\n kmalloc include/linux/slab.h:604 [inline]\n kzalloc include/linux/slab.h:721 [inline]\n vc_do_resize+0x235/0xf40 drivers/tty/vt/vt.c:1193\n vgacon_adjust_height+0x2d4/0x350 drivers/video/console/vgacon.c:1007\n vgacon_font_set+0x1f7/0x240 drivers/video/console/vgacon.c:1031\n con_font_set drivers/tty/vt/vt.c:4628 [inline]\n con_font_op+0x4da/0xa20 drivers/tty/vt/vt.c:4675\n vt_k_ioctl+0xa10/0xb30 drivers/tty/vt/vt_ioctl.c:474\n vt_ioctl+0x14c/0x1870 drivers/tty/vt/vt_ioctl.c:752\n tty_ioctl+0x655/0x1510 drivers/tty/tty_io.c:2779\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:871 [inline]\n __se_sys_ioctl+0x12d/0x190 fs/ioctl.c:857\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nLast potentially related work creation:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n __kasan_record_aux_stack+0x94/0xa0 mm/kasan/generic.c:492\n __call_rcu_common.constprop.0+0xc3/0xa10 kernel/rcu/tree.c:2713\n netlink_release+0x620/0xc20 net/netlink/af_netlink.c:802\n __sock_release+0xb5/0x270 net/socket.c:663\n sock_close+0x1e/0x30 net/socket.c:1425\n __fput+0x408/0xab0 fs/file_table.c:384\n __fput_sync+0x4c/0x60 fs/file_table.c:465\n __do_sys_close fs/open.c:1580 [inline]\n __se_sys_close+0x68/0xd0 fs/open.c:1565\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n __kasan_record_aux_stack+0x94/0xa0 mm/kasan/generic.c:492\n __call_rcu_common.constprop.0+0xc3/0xa10 kernel/rcu/tree.c:2713\n netlink_release+0x620/0xc20 net/netlink/af_netlink.c:802\n __sock_release+0xb5/0x270 net/socket.c:663\n sock_close+0x1e/0x30 net/socket.c:1425\n __fput+0x408/0xab0 fs/file_table.c:384\n task_work_run+0x154/0x240 kernel/task_work.c:239\n exit_task_work include/linux/task_work.h:45 [inline]\n do_exit+0x8e5/0x1320 kernel/exit.c:874\n do_group_exit+0xcd/0x280 kernel/exit.c:1023\n get_signal+0x1675/0x1850 kernel/signal.c:2905\n arch_do_signal_or_restart+0x80/0x3b0 arch/x86/kernel/signal.c:310\n exit_to_user_mode_loop kernel/entry/common.c:111 [inline]\n exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]\n __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]\n syscall_exit_to_user_mode+0x1b3/0x1e0 kernel/entry/common.c:218\n do_syscall_64+0x66/0x110 arch/x86/ent\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vgacon: Agregar comprobaci\u00f3n para el rango de direcciones vc_origin en vgacon_scroll() Nuestro Syzkaller interno inform\u00f3 el siguiente ERROR (dos veces), que cre\u00edamos que era el mismo problema con [1]: ====================================================================== ERROR: KASAN: slab-out-of-bounds in vcs_scr_readw+0xc2/0xd0 drivers/tty/vt/vt.c:4740 Read of size 2 at addr ffff88800f5bef60 by task syz.7.2620/12393 ... Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x72/0xa0 lib/dump_stack.c:106 print_address_description.constprop.0+0x6b/0x3d0 mm/kasan/report.c:364 print_report+0xba/0x280 mm/kasan/report.c:475 kasan_report+0xa9/0xe0 mm/kasan/report.c:588 vcs_scr_readw+0xc2/0xd0 drivers/tty/vt/vt.c:4740 vcs_write_buf_noattr drivers/tty/vt/vc_screen.c:493 [inline] vcs_write+0x586/0x840 drivers/tty/vt/vc_screen.c:690 vfs_write+0x219/0x960 fs/read_write.c:584 ksys_write+0x12e/0x260 fs/read_write.c:639 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x78/0xe2 ... Allocated by task 5614: kasan_save_stack+0x20/0x40 mm/kasan/common.c:45 kasan_set_track+0x25/0x30 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:374 [inline] __kasan_kmalloc+0x8f/0xa0 mm/kasan/common.c:383 kasan_kmalloc include/linux/kasan.h:201 [inline] __do_kmalloc_node mm/slab_common.c:1007 [inline] __kmalloc+0x62/0x140 mm/slab_common.c:1020 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:721 [inline] vc_do_resize+0x235/0xf40 drivers/tty/vt/vt.c:1193 vgacon_adjust_height+0x2d4/0x350 drivers/video/console/vgacon.c:1007 vgacon_font_set+0x1f7/0x240 drivers/video/console/vgacon.c:1031 con_font_set drivers/tty/vt/vt.c:4628 [inline] con_font_op+0x4da/0xa20 drivers/tty/vt/vt.c:4675 vt_k_ioctl+0xa10/0xb30 drivers/tty/vt/vt_ioctl.c:474 vt_ioctl+0x14c/0x1870 drivers/tty/vt/vt_ioctl.c:752 tty_ioctl+0x655/0x1510 drivers/tty/tty_io.c:2779 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:871 [inline] __se_sys_ioctl+0x12d/0x190 fs/ioctl.c:857 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x78/0xe2 Last potentially related work creation: kasan_save_stack+0x20/0x40 mm/kasan/common.c:45 __kasan_record_aux_stack+0x94/0xa0 mm/kasan/generic.c:492 __call_rcu_common.constprop.0+0xc3/0xa10 kernel/rcu/tree.c:2713 netlink_release+0x620/0xc20 net/netlink/af_netlink.c:802 __sock_release+0xb5/0x270 net/socket.c:663 sock_close+0x1e/0x30 net/socket.c:1425 __fput+0x408/0xab0 fs/file_table.c:384 __fput_sync+0x4c/0x60 fs/file_table.c:465 __do_sys_close fs/open.c:1580 [inline] __se_sys_close+0x68/0xd0 fs/open.c:1565 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x78/0xe2 Second to last potentially related work creation: kasan_save_stack+0x20/0x40 mm/kasan/common.c:45 __kasan_record_aux_stack+0x94/0xa0 mm/kasan/generic.c:492 __call_rcu_common.constprop.0+0xc3/0xa10 kernel/rcu/tree.c:2713 netlink_release+0x620/0xc20 net/netlink/af_netlink.c:802 __sock_release+0xb5/0x270 net/socket.c:663 sock_close+0x1e/0x30 net/socket.c:1425 __fput+0x408/0xab0 fs/file_table.c:384 task_work_run+0x154/0x240 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:45 [inline] do_exit+0x8e5/0x1320 kernel/exit.c:874 do_group_exit+0xcd/0x280 kernel/exit.c:1023 get_signal+0x1675/0x1850 kernel/signal.c:2905 arch_do_signal_or_restart+0x80/0x3b0 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x1b3/0x1e0 kernel/entry/common.c:218 do_syscall_64+0x66/0x110 arch/x86/ent ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38214.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38214.json
index a63afacdb81..bdd7416d50b 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38214.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38214.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38214",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.843",
- "lastModified": "2025-07-04T14:15:29.843",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var\n\nIf fb_add_videomode() in fb_set_var() fails to allocate memory for\nfb_videomode, later it may lead to a null-ptr dereference in\nfb_videomode_to_var(), as the fb_info is registered while not having the\nmode in modelist that is expected to be there, i.e. the one that is\ndescribed in fb_info->var.\n\n================================================================\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901\nCall Trace:\n display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929\n fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071\n resize_screen drivers/tty/vt/vt.c:1176 [inline]\n vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263\n fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720\n fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776\n do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128\n fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203\n vfs_ioctl fs/ioctl.c:48 [inline]\n __do_sys_ioctl fs/ioctl.c:753 [inline]\n __se_sys_ioctl fs/ioctl.c:739 [inline]\n __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739\n do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x67/0xd1\n================================================================\n\nThe reason is that fb_info->var is being modified in fb_set_var(), and\nthen fb_videomode_to_var() is called. If it fails to add the mode to\nfb_info->modelist, fb_set_var() returns error, but does not restore the\nold value of fb_info->var. Restore fb_info->var on failure the same way\nit is done earlier in the function.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: Corregir fb_set_var para evitar la desreferencia null-ptr en fb_videomode_to_var Si fb_add_videomode() en fb_set_var() no puede asignar memoria para fb_videomode, m\u00e1s tarde puede conducir a una desreferencia null-ptr en fb_videomode_to_var(), ya que fb_info se registra sin tener el modo en modelist que se espera que est\u00e9 all\u00ed, es decir, el que se describe en fb_info->var.\n================================================================ \ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901 Call Trace: display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929 fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071 resize_screen drivers/tty/vt/vt.c:1176 [inline] vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263 fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720 fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776 do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x67/0xd1 ================================================================ \nEl motivo es que fb_info->var se modifica en fb_set_var() y, a continuaci\u00f3n, se llama a fb_videomode_to_var(). Si no se logra agregar el modo a fb_info->modelist, fb_set_var() devuelve un error, pero no restaura el valor anterior de fb_info->var. Si falla, restaure fb_info->var de la misma forma que se hizo anteriormente en la funci\u00f3n. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38215.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38215.json
index 8bb93c25490..3ac60fa9844 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38215.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38215.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38215",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.980",
- "lastModified": "2025-07-06T10:15:23.897",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var\n\nIf fb_add_videomode() in do_register_framebuffer() fails to allocate\nmemory for fb_videomode, it will later lead to a null-ptr dereference in\nfb_videomode_to_var(), as the fb_info is registered while not having the\nmode in modelist that is expected to be there, i.e. the one that is\ndescribed in fb_info->var.\n\n================================================================\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901\nCall Trace:\n display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929\n fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071\n resize_screen drivers/tty/vt/vt.c:1176 [inline]\n vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263\n fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720\n fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776\n do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128\n fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203\n vfs_ioctl fs/ioctl.c:48 [inline]\n __do_sys_ioctl fs/ioctl.c:753 [inline]\n __se_sys_ioctl fs/ioctl.c:739 [inline]\n __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739\n do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x67/0xd1\n================================================================\n\nEven though fbcon_init() checks beforehand if fb_match_mode() in\nvar_to_display() fails, it can not prevent the panic because fbcon_init()\ndoes not return error code. Considering this and the comment in the code\nabout fb_match_mode() returning NULL - \"This should not happen\" - it is\nbetter to prevent registering the fb_info if its mode was not set\nsuccessfully. Also move fb_add_videomode() closer to the beginning of\ndo_register_framebuffer() to avoid having to do the cleanup on fail.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: Corregir do_register_framebuffer para evitar la desreferencia null-ptr en fb_videomode_to_var Si fb_add_videomode() en do_register_framebuffer() no puede asignar memoria para fb_videomode, m\u00e1s tarde provocar\u00e1 una desreferencia null-ptr en fb_videomode_to_var(), ya que fb_info se registra sin tener el modo en modelist que se espera que est\u00e9 all\u00ed, es decir, el que se describe en fb_info->var. ================================================================ \ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901 Call Trace: display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929 fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071 resize_screen drivers/tty/vt/vt.c:1176 [inline] vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263 fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720 fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776 do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x67/0xd1 ================================================================\nAunque fbcon_init() comprueba previamente si fb_match_mode() en var_to_display() falla, no puede evitar el p\u00e1nico, ya que fbcon_init() no devuelve un c\u00f3digo de error. Considerando esto y el comentario en el c\u00f3digo sobre que fb_match_mode() devuelve NULL (\"Esto no deber\u00eda ocurrir\"), es mejor evitar el registro de fb_info si su modo no se configur\u00f3 correctamente. Tambi\u00e9n mueva fb_add_videomode() m\u00e1s cerca del inicio de do_register_framebuffer() para evitar tener que realizar la limpieza en caso de fallo. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller. "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38216.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38216.json
index e72d2283958..08b3a21d122 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38216.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38216.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38216",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.103",
- "lastModified": "2025-07-04T14:15:30.103",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Restore context entry setup order for aliased devices\n\nCommit 2031c469f816 (\"iommu/vt-d: Add support for static identity domain\")\nchanged the context entry setup during domain attachment from a\nset-and-check policy to a clear-and-reset approach. This inadvertently\nintroduced a regression affecting PCI aliased devices behind PCIe-to-PCI\nbridges.\n\nSpecifically, keyboard and touchpad stopped working on several Apple\nMacbooks with below messages:\n\n kernel: platform pxa2xx-spi.3: Adding to iommu group 20\n kernel: input: Apple SPI Keyboard as\n /devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00\n\nFix this by restoring the previous context setup order."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: Restaurar el orden de configuraci\u00f3n de la entrada de contexto para dispositivos con alias. El commit 2031c469f816 (\"iommu/vt-d: A\u00f1adir compatibilidad con dominio de identidad est\u00e1tica\") cambi\u00f3 la configuraci\u00f3n de la entrada de contexto durante la conexi\u00f3n del dominio, de una pol\u00edtica de \"establecer y comprobar\" a una de \"borrar y restablecer\". Esto introdujo inadvertidamente una regresi\u00f3n que afectaba a los dispositivos con alias PCI tras puentes PCIe a PCI. Espec\u00edficamente, el teclado y el panel t\u00e1ctil dejaron de funcionar en varias Apple Macbooks con los siguientes mensajes: kernel: platform pxa2xx-spi.3: Adding to iommu group 20 kernel: input: Apple SPI Keyboard as /devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0 kernel: DMAR: DRHD: handling fault status reg 3 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr 0xffffa000 [fault reason 0x06] PTE Read access is not set kernel: DMAR: DRHD: handling fault status reg 3 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr 0xffffa000 [fault reason 0x06] PTE Read access is not set kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00 kernel: DMAR: DRHD: handling fault status reg 3 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr 0xffffa000 [fault reason 0x06] PTE Read access is not set kernel: DMAR: DRHD: handling fault status reg 3 kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00 Solucione esto restaurando el orden de configuraci\u00f3n del contexto anterior."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38217.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38217.json
index 7d2da7a4181..f62baa45d13 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38217.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38217.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38217",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.227",
- "lastModified": "2025-07-04T14:15:30.227",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (ftsteutates) Fix TOCTOU race in fts_read()\n\nIn the fts_read() function, when handling hwmon_pwm_auto_channels_temp,\nthe code accesses the shared variable data->fan_source[channel] twice\nwithout holding any locks. It is first checked against\nFTS_FAN_SOURCE_INVALID, and if the check passes, it is read again\nwhen used as an argument to the BIT() macro.\n\nThis creates a Time-of-Check to Time-of-Use (TOCTOU) race condition.\nAnother thread executing fts_update_device() can modify the value of\ndata->fan_source[channel] between the check and its use. If the value\nis changed to FTS_FAN_SOURCE_INVALID (0xff) during this window, the\nBIT() macro will be called with a large shift value (BIT(255)).\nA bit shift by a value greater than or equal to the type width is\nundefined behavior and can lead to a crash or incorrect values being\nreturned to userspace.\n\nFix this by reading data->fan_source[channel] into a local variable\nonce, eliminating the race condition. Additionally, add a bounds check\nto ensure the value is less than BITS_PER_LONG before passing it to\nthe BIT() macro, making the code more robust against undefined behavior.\n\nThis possible bug was found by an experimental static analysis tool\ndeveloped by our team."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (ftsteutates) Corregir la ejecuci\u00f3n TOCTOU en fts_read() En la funci\u00f3n fts_read(), al manejar hwmon_pwm_auto_channels_temp, el c\u00f3digo accede a la variable compartida data->fan_source[channel] dos veces sin mantener ning\u00fan bloqueo. Primero se compara con FTS_FAN_SOURCE_INVALID y, si la comprobaci\u00f3n es correcta, se vuelve a leer cuando se usa como argumento de la macro BIT(). Esto crea una condici\u00f3n de ejecuci\u00f3n de tiempo de comprobaci\u00f3n a tiempo de uso (TOCTOU). Otro hilo que ejecute fts_update_device() puede modificar el valor de data->fan_source[channel] entre la comprobaci\u00f3n y su uso. Si el valor se cambia a FTS_FAN_SOURCE_INVALID (0xff) durante esta ventana, se llamar\u00e1 a la macro BIT() con un valor de desplazamiento grande (BIT(255)). Un desplazamiento de bits por un valor mayor o igual al ancho del tipo es un comportamiento indefinido que puede provocar un fallo o la devoluci\u00f3n de valores incorrectos al espacio de usuario. Para solucionarlo, lea data->fan_source[channel] en una variable local una vez, eliminando as\u00ed la condici\u00f3n de ejecuci\u00f3n. Adem\u00e1s, a\u00f1ada una comprobaci\u00f3n de los l\u00edmites para garantizar que el valor sea menor que BITS_PER_LONG antes de pasarlo a la macro BIT(), lo que aumenta la robustez del c\u00f3digo frente a comportamientos indefinidos. Este posible error fue detectado por una herramienta de an\u00e1lisis est\u00e1tico experimental desarrollada por nuestro equipo."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38218.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38218.json
index f4a589903eb..b53b24ad2a8 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38218.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38218.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38218",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.353",
- "lastModified": "2025-07-04T14:15:30.353",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on sit_bitmap_size\n\nw/ below testcase, resize will generate a corrupted image which\ncontains inconsistent metadata, so when mounting such image, it\nwill trigger kernel panic:\n\ntouch img\ntruncate -s $((512*1024*1024*1024)) img\nmkfs.f2fs -f img $((256*1024*1024))\nresize.f2fs -s -i img -t $((1024*1024*1024))\nmount img /mnt/f2fs\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/segment.h:863!\nOops: invalid opcode: 0000 [#1] SMP PTI\nCPU: 11 UID: 0 PID: 3922 Comm: mount Not tainted 6.15.0-rc1+ #191 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:f2fs_ra_meta_pages+0x47c/0x490\n\nCall Trace:\n f2fs_build_segment_manager+0x11c3/0x2600\n f2fs_fill_super+0xe97/0x2840\n mount_bdev+0xf4/0x140\n legacy_get_tree+0x2b/0x50\n vfs_get_tree+0x29/0xd0\n path_mount+0x487/0xaf0\n __x64_sys_mount+0x116/0x150\n do_syscall_64+0x82/0x190\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7fdbfde1bcfe\n\nThe reaseon is:\n\nsit_i->bitmap_size is 192, so size of sit bitmap is 192*8=1536, at maximum\nthere are 1536 sit blocks, however MAIN_SEGS is 261893, so that sit_blk_cnt\nis 4762, build_sit_entries() -> current_sit_addr() tries to access\nout-of-boundary in sit_bitmap at offset from [1536, 4762), once sit_bitmap\nand sit_bitmap_mirror is not the same, it will trigger f2fs_bug_on().\n\nLet's add sanity check in f2fs_sanity_check_ckpt() to avoid panic."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para realizar una comprobaci\u00f3n de cordura en sit_bitmap_size con el siguiente caso de prueba, el cambio de tama\u00f1o generar\u00e1 una imagen da\u00f1ada que contiene metadatos inconsistentes, por lo que al montar dicha imagen, activar\u00e1 el p\u00e1nico del kernel: touch img truncate -s $((512*1024*1024*1024)) img mkfs.f2fs -f img $((256*1024*1024)) resize.f2fs -s -i img -t $((1024*1024*1024)) mount img /mnt/f2fs ------------[ cut here ]------------ kernel BUG at fs/f2fs/segment.h:863! Oops: invalid opcode: 0000 [#1] SMP PTI CPU: 11 UID: 0 PID: 3922 Comm: mount Not tainted 6.15.0-rc1+ #191 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:f2fs_ra_meta_pages+0x47c/0x490 Call Trace: f2fs_build_segment_manager+0x11c3/0x2600 f2fs_fill_super+0xe97/0x2840 mount_bdev+0xf4/0x140 legacy_get_tree+0x2b/0x50 vfs_get_tree+0x29/0xd0 path_mount+0x487/0xaf0 __x64_sys_mount+0x116/0x150 do_syscall_64+0x82/0x190 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fdbfde1bcfe La raz\u00f3n es: sit_i->bitmap_size es 192, por lo que el tama\u00f1o del mapa de bits sit es 192*8=1536, como m\u00e1ximo hay 1536 bloques sit, sin embargo MAIN_SEGS es 261893, por lo que sit_blk_cnt es 4762, build_sit_entries() -> current_sit_addr() intenta acceder fuera de los l\u00edmites en sit_bitmap en el desplazamiento de [1536, 4762), si sit_bitmap y sit_bitmap_mirror no coinciden, se activar\u00e1 f2fs_bug_on(). Agreguemos una comprobaci\u00f3n de validez en f2fs_sanity_check_ckpt() para evitar problemas."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38219.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38219.json
index 7dab33b4519..1c5d5b6c47a 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38219.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38219.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38219",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.473",
- "lastModified": "2025-07-04T14:15:30.473",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: prevent kernel warning due to negative i_nlink from corrupted image\n\nWARNING: CPU: 1 PID: 9426 at fs/inode.c:417 drop_nlink+0xac/0xd0\nhome/cc/linux/fs/inode.c:417\nModules linked in:\nCPU: 1 UID: 0 PID: 9426 Comm: syz-executor568 Not tainted\n6.14.0-12627-g94d471a4f428 #2 PREEMPT(full)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nRIP: 0010:drop_nlink+0xac/0xd0 home/cc/linux/fs/inode.c:417\nCode: 48 8b 5d 28 be 08 00 00 00 48 8d bb 70 07 00 00 e8 f9 67 e6 ff\nf0 48 ff 83 70 07 00 00 5b 5d e9 9a 12 82 ff e8 95 12 82 ff 90\n<0f> 0b 90 c7 45 48 ff ff ff ff 5b 5d e9 83 12 82 ff e8 fe 5f e6\nff\nRSP: 0018:ffffc900026b7c28 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8239710f\nRDX: ffff888041345a00 RSI: ffffffff8239717b RDI: 0000000000000005\nRBP: ffff888054509ad0 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000000 R11: ffffffff9ab36f08 R12: ffff88804bb40000\nR13: ffff8880545091e0 R14: 0000000000008000 R15: ffff8880545091e0\nFS: 000055555d0c5880(0000) GS:ffff8880eb3e3000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f915c55b178 CR3: 0000000050d20000 CR4: 0000000000352ef0\nCall Trace:\n \n f2fs_i_links_write home/cc/linux/fs/f2fs/f2fs.h:3194 [inline]\n f2fs_drop_nlink+0xd1/0x3c0 home/cc/linux/fs/f2fs/dir.c:845\n f2fs_delete_entry+0x542/0x1450 home/cc/linux/fs/f2fs/dir.c:909\n f2fs_unlink+0x45c/0x890 home/cc/linux/fs/f2fs/namei.c:581\n vfs_unlink+0x2fb/0x9b0 home/cc/linux/fs/namei.c:4544\n do_unlinkat+0x4c5/0x6a0 home/cc/linux/fs/namei.c:4608\n __do_sys_unlink home/cc/linux/fs/namei.c:4654 [inline]\n __se_sys_unlink home/cc/linux/fs/namei.c:4652 [inline]\n __x64_sys_unlink+0xc5/0x110 home/cc/linux/fs/namei.c:4652\n do_syscall_x64 home/cc/linux/arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xc7/0x250 home/cc/linux/arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fb3d092324b\nCode: 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66\n2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 57 00 00 00 0f 05\n<48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01\n48\nRSP: 002b:00007ffdc232d938 EFLAGS: 00000206 ORIG_RAX: 0000000000000057\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb3d092324b\nRDX: 00007ffdc232d960 RSI: 00007ffdc232d960 RDI: 00007ffdc232d9f0\nRBP: 00007ffdc232d9f0 R08: 0000000000000001 R09: 00007ffdc232d7c0\nR10: 00000000fffffffd R11: 0000000000000206 R12: 00007ffdc232eaf0\nR13: 000055555d0cebb0 R14: 00007ffdc232d958 R15: 0000000000000001\n "
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: evitar advertencia del kernel debido a i_nlink negativo de una imagen da\u00f1ada ADVERTENCIA: CPU: 1 PID: 9426 at fs/inode.c:417 drop_nlink+0xac/0xd0 home/cc/linux/fs/inode.c:417 Modules linked in: CPU: 1 UID: 0 PID: 9426 Comm: syz-executor568 Not tainted 6.14.0-12627-g94d471a4f428 #2 PREEMPT(full) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 RIP: 0010:drop_nlink+0xac/0xd0 home/cc/linux/fs/inode.c:417 Code: 48 8b 5d 28 be 08 00 00 00 48 8d bb 70 07 00 00 e8 f9 67 e6 ff f0 48 ff 83 70 07 00 00 5b 5d e9 9a 12 82 ff e8 95 12 82 ff 90 <0f> 0b 90 c7 45 48 ff ff ff ff 5b 5d e9 83 12 82 ff e8 fe 5f e6 ff RSP: 0018:ffffc900026b7c28 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8239710f RDX: ffff888041345a00 RSI: ffffffff8239717b RDI: 0000000000000005 RBP: ffff888054509ad0 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff9ab36f08 R12: ffff88804bb40000 R13: ffff8880545091e0 R14: 0000000000008000 R15: ffff8880545091e0 FS: 000055555d0c5880(0000) GS:ffff8880eb3e3000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f915c55b178 CR3: 0000000050d20000 CR4: 0000000000352ef0 Call Trace: f2fs_i_links_write home/cc/linux/fs/f2fs/f2fs.h:3194 [inline] f2fs_drop_nlink+0xd1/0x3c0 home/cc/linux/fs/f2fs/dir.c:845 f2fs_delete_entry+0x542/0x1450 home/cc/linux/fs/f2fs/dir.c:909 f2fs_unlink+0x45c/0x890 home/cc/linux/fs/f2fs/namei.c:581 vfs_unlink+0x2fb/0x9b0 home/cc/linux/fs/namei.c:4544 do_unlinkat+0x4c5/0x6a0 home/cc/linux/fs/namei.c:4608 __do_sys_unlink home/cc/linux/fs/namei.c:4654 [inline] __se_sys_unlink home/cc/linux/fs/namei.c:4652 [inline] __x64_sys_unlink+0xc5/0x110 home/cc/linux/fs/namei.c:4652 do_syscall_x64 home/cc/linux/arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc7/0x250 home/cc/linux/arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb3d092324b Code: 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffdc232d938 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb3d092324b RDX: 00007ffdc232d960 RSI: 00007ffdc232d960 RDI: 00007ffdc232d9f0 RBP: 00007ffdc232d9f0 R08: 0000000000000001 R09: 00007ffdc232d7c0 R10: 00000000fffffffd R11: 0000000000000206 R12: 00007ffdc232eaf0 R13: 000055555d0cebb0 R14: 00007ffdc232d958 R15: 0000000000000001 "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38220.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38220.json
index 967a3d87f39..8de27e91568 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38220.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38220.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38220",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.597",
- "lastModified": "2025-07-04T14:15:30.597",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: only dirty folios when data journaling regular files\n\nfstest generic/388 occasionally reproduces a crash that looks as\nfollows:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n...\nCall Trace:\n \n ext4_block_zero_page_range+0x30c/0x380 [ext4]\n ext4_truncate+0x436/0x440 [ext4]\n ext4_process_orphan+0x5d/0x110 [ext4]\n ext4_orphan_cleanup+0x124/0x4f0 [ext4]\n ext4_fill_super+0x262d/0x3110 [ext4]\n get_tree_bdev_flags+0x132/0x1d0\n vfs_get_tree+0x26/0xd0\n vfs_cmd_create+0x59/0xe0\n __do_sys_fsconfig+0x4ed/0x6b0\n do_syscall_64+0x82/0x170\n ...\n\nThis occurs when processing a symlink inode from the orphan list. The\npartial block zeroing code in the truncate path calls\next4_dirty_journalled_data() -> folio_mark_dirty(). The latter calls\nmapping->a_ops->dirty_folio(), but symlink inodes are not assigned an\na_ops vector in ext4, hence the crash.\n\nTo avoid this problem, update the ext4_dirty_journalled_data() helper to\nonly mark the folio dirty on regular files (for which a_ops is\nassigned). This also matches the journaling logic in the ext4_symlink()\ncreation path, where ext4_handle_dirty_metadata() is called directly."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: solo folios sucios cuando se registran datos de archivos normales fstest generic/388 ocasionalmente reproduce un fallo que se parece a lo siguiente: ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000000 ... Seguimiento de llamadas: ext4_block_zero_page_range+0x30c/0x380 [ext4] ext4_truncate+0x436/0x440 [ext4] ext4_process_orphan+0x5d/0x110 [ext4] ext4_orphan_cleanup+0x124/0x4f0 [ext4] ext4_fill_super+0x262d/0x3110 [ext4] get_tree_bdev_flags+0x132/0x1d0 vfs_get_tree+0x26/0xd0 vfs_cmd_create+0x59/0xe0 __do_sys_fsconfig+0x4ed/0x6b0 do_syscall_64+0x82/0x170 ... Esto ocurre al procesar un inodo de enlace simb\u00f3lico de la lista de hu\u00e9rfanos. El c\u00f3digo de puesta a cero parcial de bloques en la ruta de truncamiento llama a ext4_dirty_journalled_data() -> folio_mark_dirty(). Este \u00faltimo llama a mapping->a_ops->dirty_folio(), pero los inodos de enlace simb\u00f3lico no tienen asignado un vector a_ops en ext4, lo que explica el fallo. Para evitar este problema, actualice el asistente ext4_dirty_journalled_data() para que solo marque el folio como sucio en archivos normales (para los que se asigna a_ops). Esto tambi\u00e9n coincide con la l\u00f3gica de registro en la ruta de creaci\u00f3n de ext4_symlink(), donde se llama directamente a ext4_handle_dirty_metadata()."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38221.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38221.json
index 6312f9cf7bd..58b3ed65822 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38221.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38221.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38221",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.723",
- "lastModified": "2025-07-04T14:15:30.723",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix out of bounds punch offset\n\nPunching a hole with a start offset that exceeds max_end is not\npermitted and will result in a negative length in the\ntruncate_inode_partial_folio() function while truncating the page cache,\npotentially leading to undesirable consequences.\n\nA simple reproducer:\n\n truncate -s 9895604649994 /mnt/foo\n xfs_io -c \"pwrite 8796093022208 4096\" /mnt/foo\n xfs_io -c \"fpunch 8796093022213 25769803777\" /mnt/foo\n\n kernel BUG at include/linux/highmem.h:275!\n Oops: invalid opcode: 0000 [#1] SMP PTI\n CPU: 3 UID: 0 PID: 710 Comm: xfs_io Not tainted 6.15.0-rc3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\n RIP: 0010:zero_user_segments.constprop.0+0xd7/0x110\n RSP: 0018:ffffc90001cf3b38 EFLAGS: 00010287\n RAX: 0000000000000005 RBX: ffffea0001485e40 RCX: 0000000000001000\n RDX: 000000000040b000 RSI: 0000000000000005 RDI: 000000000040b000\n RBP: 000000000040affb R08: ffff888000000000 R09: ffffea0000000000\n R10: 0000000000000003 R11: 00000000fffc7fc5 R12: 0000000000000005\n R13: 000000000040affb R14: ffffea0001485e40 R15: ffff888031cd3000\n FS: 00007f4f63d0b780(0000) GS:ffff8880d337d000(0000)\n knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000001ae0b038 CR3: 00000000536aa000 CR4: 00000000000006f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n truncate_inode_partial_folio+0x3dd/0x620\n truncate_inode_pages_range+0x226/0x720\n ? bdev_getblk+0x52/0x3e0\n ? ext4_get_group_desc+0x78/0x150\n ? crc32c_arch+0xfd/0x180\n ? __ext4_get_inode_loc+0x18c/0x840\n ? ext4_inode_csum+0x117/0x160\n ? jbd2_journal_dirty_metadata+0x61/0x390\n ? __ext4_handle_dirty_metadata+0xa0/0x2b0\n ? kmem_cache_free+0x90/0x5a0\n ? jbd2_journal_stop+0x1d5/0x550\n ? __ext4_journal_stop+0x49/0x100\n truncate_pagecache_range+0x50/0x80\n ext4_truncate_page_cache_block_range+0x57/0x3a0\n ext4_punch_hole+0x1fe/0x670\n ext4_fallocate+0x792/0x17d0\n ? __count_memcg_events+0x175/0x2a0\n vfs_fallocate+0x121/0x560\n ksys_fallocate+0x51/0xc0\n __x64_sys_fallocate+0x24/0x40\n x64_sys_call+0x18d2/0x4170\n do_syscall_64+0xa7/0x220\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix this by filtering out cases where the punching start offset exceeds\nmax_end."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: correcci\u00f3n de un desplazamiento de perforaci\u00f3n fuera de los l\u00edmites. Perforar un agujero con un desplazamiento inicial superior a max_end no est\u00e1 permitido y resultar\u00e1 en una longitud negativa en la funci\u00f3n truncate_inode_partial_folio() al truncar la cach\u00e9 de p\u00e1gina, lo que podr\u00eda tener consecuencias indeseables. Un simple reproductor: truncate -s 9895604649994 /mnt/foo xfs_io -c \"pwrite 8796093022208 4096\" /mnt/foo xfs_io -c \"fpunch 8796093022213 25769803777\" /mnt/foo kernel BUG at include/linux/highmem.h:275! Oops: invalid opcode: 0000 [#1] SMP PTI CPU: 3 UID: 0 PID: 710 Comm: xfs_io Not tainted 6.15.0-rc3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014 RIP: 0010:zero_user_segments.constprop.0+0xd7/0x110 RSP: 0018:ffffc90001cf3b38 EFLAGS: 00010287 RAX: 0000000000000005 RBX: ffffea0001485e40 RCX: 0000000000001000 RDX: 000000000040b000 RSI: 0000000000000005 RDI: 000000000040b000 RBP: 000000000040affb R08: ffff888000000000 R09: ffffea0000000000 R10: 0000000000000003 R11: 00000000fffc7fc5 R12: 0000000000000005 R13: 000000000040affb R14: ffffea0001485e40 R15: ffff888031cd3000 FS: 00007f4f63d0b780(0000) GS:ffff8880d337d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000001ae0b038 CR3: 00000000536aa000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Rastreo de llamadas: truncate_inode_partial_folio+0x3dd/0x620 truncate_inode_pages_range+0x226/0x720 ? bdev_getblk+0x52/0x3e0 ? ext4_get_group_desc+0x78/0x150 ? crc32c_arch+0xfd/0x180 ? __ext4_get_inode_loc+0x18c/0x840 ? ext4_inode_csum+0x117/0x160 ? jbd2_journal_dirty_metadata+0x61/0x390 ? __ext4_handle_dirty_metadata+0xa0/0x2b0 ? kmem_cache_free+0x90/0x5a0 ? jbd2_journal_stop+0x1d5/0x550 ? __ext4_journal_stop+0x49/0x100 truncate_pagecache_range+0x50/0x80 ext4_truncate_page_cache_block_range+0x57/0x3a0 ext4_punch_hole+0x1fe/0x670 ext4_fallocate+0x792/0x17d0 ? __count_memcg_events+0x175/0x2a0 vfs_fallocate+0x121/0x560 ksys_fallocate+0x51/0xc0 __x64_sys_fallocate+0x24/0x40 x64_sys_call+0x18d2/0x4170 do_syscall_64+0xa7/0x220 entry_SYSCALL_64_after_hwframe+0x76/0x7e Solucione esto filtrando los casos en los que el desplazamiento de inicio de perforaci\u00f3n exceda max_end."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38222.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38222.json
index f7883bbd81c..cdd806bee2e 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38222.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38222.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38222",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.850",
- "lastModified": "2025-07-04T14:15:30.850",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: inline: fix len overflow in ext4_prepare_inline_data\n\nWhen running the following code on an ext4 filesystem with inline_data\nfeature enabled, it will lead to the bug below.\n\n fd = open(\"file1\", O_RDWR | O_CREAT | O_TRUNC, 0666);\n ftruncate(fd, 30);\n pwrite(fd, \"a\", 1, (1UL << 40) + 5UL);\n\nThat happens because write_begin will succeed as when\next4_generic_write_inline_data calls ext4_prepare_inline_data, pos + len\nwill be truncated, leading to ext4_prepare_inline_data parameter to be 6\ninstead of 0x10000000006.\n\nThen, later when write_end is called, we hit:\n\n BUG_ON(pos + len > EXT4_I(inode)->i_inline_size);\n\nat ext4_write_inline_data.\n\nFix it by using a loff_t type for the len parameter in\next4_prepare_inline_data instead of an unsigned int.\n\n[ 44.545164] ------------[ cut here ]------------\n[ 44.545530] kernel BUG at fs/ext4/inline.c:240!\n[ 44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[ 44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full) 112853fcebfdb93254270a7959841d2c6aa2c8bb\n[ 44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100\n[ 44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b <0f> 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49\n[ 44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216\n[ 44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006\n[ 44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738\n[ 44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\n[ 44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000\n[ 44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738\n[ 44.546523] FS: 00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000\n[ 44.546523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0\n[ 44.546523] PKRU: 55555554\n[ 44.546523] Call Trace:\n[ 44.546523] \n[ 44.546523] ext4_write_inline_data_end+0x126/0x2d0\n[ 44.546523] generic_perform_write+0x17e/0x270\n[ 44.546523] ext4_buffered_write_iter+0xc8/0x170\n[ 44.546523] vfs_write+0x2be/0x3e0\n[ 44.546523] __x64_sys_pwrite64+0x6d/0xc0\n[ 44.546523] do_syscall_64+0x6a/0xf0\n[ 44.546523] ? __wake_up+0x89/0xb0\n[ 44.546523] ? xas_find+0x72/0x1c0\n[ 44.546523] ? next_uptodate_folio+0x317/0x330\n[ 44.546523] ? set_pte_range+0x1a6/0x270\n[ 44.546523] ? filemap_map_pages+0x6ee/0x840\n[ 44.546523] ? ext4_setattr+0x2fa/0x750\n[ 44.546523] ? do_pte_missing+0x128/0xf70\n[ 44.546523] ? security_inode_post_setattr+0x3e/0xd0\n[ 44.546523] ? ___pte_offset_map+0x19/0x100\n[ 44.546523] ? handle_mm_fault+0x721/0xa10\n[ 44.546523] ? do_user_addr_fault+0x197/0x730\n[ 44.546523] ? do_syscall_64+0x76/0xf0\n[ 44.546523] ? arch_exit_to_user_mode_prepare+0x1e/0x60\n[ 44.546523] ? irqentry_exit_to_user_mode+0x79/0x90\n[ 44.546523] entry_SYSCALL_64_after_hwframe+0x55/0x5d\n[ 44.546523] RIP: 0033:0x7f42999c6687\n[ 44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff\n[ 44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012\n[ 44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687\n[ 44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003\n[ 44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000\n[ 44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: inline: corregir desbordamiento de len en ext4_prepare_inline_data Al ejecutar el siguiente c\u00f3digo en un sistema de archivos ext4 con la funci\u00f3n inline_data habilitada, se producir\u00e1 el siguiente error. fd = open(\"file1\", O_RDWR | O_CREAT | O_TRUNC, 0666); ftruncate(fd, 30); pwrite(fd, \"a\", 1, (1UL << 40) + 5UL); Esto sucede porque write_begin tendr\u00e1 \u00e9xito, ya que cuando ext4_generic_write_inline_data llama a ext4_prepare_inline_data, pos + len se truncar\u00e1, lo que har\u00e1 que el par\u00e1metro ext4_prepare_inline_data sea 6 en lugar de 0x10000000006. Luego, al llamar a write_end, encontramos: BUG_ON(pos + len > EXT4_I(inode)->i_inline_size); en ext4_write_inline_data. Se soluciona usando un tipo loff_t para el par\u00e1metro len en ext4_prepare_inline_data en lugar de un entero sin signo. [ 44.545164] ------------[ corte aqu\u00ed ]------------ [ 44.545530] kernel BUG at fs/ext4/inline.c:240! [ 44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI [ 44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full) 112853fcebfdb93254270a7959841d2c6aa2c8bb [ 44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100 [ 44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b <0f> 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49 [ 44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216 [ 44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006 [ 44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738 [ 44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000 [ 44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738 [ 44.546523] FS: 00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000 [ 44.546523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0 [ 44.546523] PKRU: 55555554 [ 44.546523] Call Trace: [ 44.546523] [ 44.546523] ext4_write_inline_data_end+0x126/0x2d0 [ 44.546523] generic_perform_write+0x17e/0x270 [ 44.546523] ext4_buffered_write_iter+0xc8/0x170 [ 44.546523] vfs_write+0x2be/0x3e0 [ 44.546523] __x64_sys_pwrite64+0x6d/0xc0 [ 44.546523] do_syscall_64+0x6a/0xf0 [ 44.546523] ? __wake_up+0x89/0xb0 [ 44.546523] ? xas_find+0x72/0x1c0 [ 44.546523] ? next_uptodate_folio+0x317/0x330 [ 44.546523] ? set_pte_range+0x1a6/0x270 [ 44.546523] ? filemap_map_pages+0x6ee/0x840 [ 44.546523] ? ext4_setattr+0x2fa/0x750 [ 44.546523] ? do_pte_missing+0x128/0xf70 [ 44.546523] ? security_inode_post_setattr+0x3e/0xd0 [ 44.546523] ? ___pte_offset_map+0x19/0x100 [ 44.546523] ? handle_mm_fault+0x721/0xa10 [ 44.546523] ? do_user_addr_fault+0x197/0x730 [ 44.546523] ? do_syscall_64+0x76/0xf0 [ 44.546523] ? arch_exit_to_user_mode_prepare+0x1e/0x60 [ 44.546523] ? irqentry_exit_to_user_mode+0x79/0x90 [ 44.546523] entry_SYSCALL_64_after_hwframe+0x55/0x5d [ 44.546523] RIP: 0033:0x7f42999c6687 [ 44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012 [ 44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687 [ 44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003 [ 44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000 [ 44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000 ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38223.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38223.json
index 8045c47d1be..a15c8a044bf 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38223.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38223.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38223",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.987",
- "lastModified": "2025-07-04T14:15:30.987",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: avoid kernel BUG for encrypted inode with unaligned file size\n\nThe generic/397 test hits a BUG_ON for the case of encrypted inode with\nunaligned file size (for example, 33K or 1K):\n\n[ 877.737811] run fstests generic/397 at 2025-01-03 12:34:40\n[ 877.875761] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 877.876130] libceph: client4614 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 877.991965] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 877.992334] libceph: client4617 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.017234] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.017594] libceph: client4620 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.031394] xfs_io (pid 18988) is setting deprecated v1 encryption policy; recommend upgrading to v2.\n[ 878.054528] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.054892] libceph: client4623 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.070287] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.070704] libceph: client4626 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.264586] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.265258] libceph: client4629 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.374578] -----------[ cut here ]------------\n[ 878.374586] kernel BUG at net/ceph/messenger.c:1070!\n[ 878.375150] Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 878.378145] CPU: 2 UID: 0 PID: 4759 Comm: kworker/2:9 Not tainted 6.13.0-rc5+ #1\n[ 878.378969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 878.380167] Workqueue: ceph-msgr ceph_con_workfn\n[ 878.381639] RIP: 0010:ceph_msg_data_cursor_init+0x42/0x50\n[ 878.382152] Code: 89 17 48 8b 46 70 55 48 89 47 08 c7 47 18 00 00 00 00 48 89 e5 e8 de cc ff ff 5d 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc 0f 0b <0f> 0b 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90\n[ 878.383928] RSP: 0018:ffffb4ffc7cbbd28 EFLAGS: 00010287\n[ 878.384447] RAX: ffffffff82bb9ac0 RBX: ffff981390c2f1f8 RCX: 0000000000000000\n[ 878.385129] RDX: 0000000000009000 RSI: ffff981288232b58 RDI: ffff981390c2f378\n[ 878.385839] RBP: ffffb4ffc7cbbe18 R08: 0000000000000000 R09: 0000000000000000\n[ 878.386539] R10: 0000000000000000 R11: 0000000000000000 R12: ffff981390c2f030\n[ 878.387203] R13: ffff981288232b58 R14: 0000000000000029 R15: 0000000000000001\n[ 878.387877] FS: 0000000000000000(0000) GS:ffff9814b7900000(0000) knlGS:0000000000000000\n[ 878.388663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 878.389212] CR2: 00005e106a0554e0 CR3: 0000000112bf0001 CR4: 0000000000772ef0\n[ 878.389921] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 878.390620] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 878.391307] PKRU: 55555554\n[ 878.391567] Call Trace:\n[ 878.391807] \n[ 878.392021] ? show_regs+0x71/0x90\n[ 878.392391] ? die+0x38/0xa0\n[ 878.392667] ? do_trap+0xdb/0x100\n[ 878.392981] ? do_error_trap+0x75/0xb0\n[ 878.393372] ? ceph_msg_data_cursor_init+0x42/0x50\n[ 878.393842] ? exc_invalid_op+0x53/0x80\n[ 878.394232] ? ceph_msg_data_cursor_init+0x42/0x50\n[ 878.394694] ? asm_exc_invalid_op+0x1b/0x20\n[ 878.395099] ? ceph_msg_data_cursor_init+0x42/0x50\n[ 878.395583] ? ceph_con_v2_try_read+0xd16/0x2220\n[ 878.396027] ? _raw_spin_unlock+0xe/0x40\n[ 878.396428] ? raw_spin_rq_unlock+0x10/0x40\n[ 878.396842] ? finish_task_switch.isra.0+0x97/0x310\n[ 878.397338] ? __schedule+0x44b/0x16b0\n[ 878.397738] ceph_con_workfn+0x326/0x750\n[ 878.398121] process_one_work+0x188/0x3d0\n[ 878.398522] ? __pfx_worker_thread+0x10/0x10\n[ 878.398929] worker_thread+0x2b5/0x3c0\n[ 878.399310] ? __pfx_worker_thread+0x10/0x10\n[ 878.399727] kthread+0xe1/0x120\n[ 878.400031] ? __pfx_kthread+0x10/0x10\n[ 878.400431] ret_from_fork+0x43/0x70\n[ 878.400771] ? __pfx_kthread+0x10/0x10\n[ 878.401127] ret_from_fork_asm+0x1a/0x30\n[ 878.401543] \n[ 878.401760] Modules l\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ceph: evitar el error del kernel para el inodo cifrado con un tama\u00f1o de archivo no alineado La prueba generic/397 alcanza un BUG_ON para el caso del inodo cifrado con un tama\u00f1o de archivo no alineado (por ejemplo, 33K o 1K): [ 877.737811] run fstests generic/397 at 2025-01-03 12:34:40 [ 877.875761] libceph: mon0 (2)127.0.0.1:40674 session established [ 877.876130] libceph: client4614 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949 [ 877.991965] libceph: mon0 (2)127.0.0.1:40674 session established [ 877.992334] libceph: client4617 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949 [ 878.017234] libceph: mon0 (2)127.0.0.1:40674 session established [ 878.017594] libceph: client4620 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949 [ 878.031394] xfs_io (pid 18988) is setting deprecated v1 encryption policy; recommend upgrading to v2. [ 878.054528] libceph: mon0 (2)127.0.0.1:40674 session established [ 878.054892] libceph: client4623 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949 [ 878.070287] libceph: mon0 (2)127.0.0.1:40674 session established [ 878.070704] libceph: client4626 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949 [ 878.264586] libceph: mon0 (2)127.0.0.1:40674 session established [ 878.265258] libceph: client4629 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949 [ 878.374578] -----------[ cut here ]------------ [ 878.374586] kernel BUG at net/ceph/messenger.c:1070! [ 878.375150] Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 878.378145] CPU: 2 UID: 0 PID: 4759 Comm: kworker/2:9 Not tainted 6.13.0-rc5+ #1 [ 878.378969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 878.380167] Workqueue: ceph-msgr ceph_con_workfn [ 878.381639] RIP: 0010:ceph_msg_data_cursor_init+0x42/0x50 [ 878.382152] Code: 89 17 48 8b 46 70 55 48 89 47 08 c7 47 18 00 00 00 00 48 89 e5 e8 de cc ff ff 5d 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc 0f 0b <0f> 0b 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 [ 878.383928] RSP: 0018:ffffb4ffc7cbbd28 EFLAGS: 00010287 [ 878.384447] RAX: ffffffff82bb9ac0 RBX: ffff981390c2f1f8 RCX: 0000000000000000 [ 878.385129] RDX: 0000000000009000 RSI: ffff981288232b58 RDI: ffff981390c2f378 [ 878.385839] RBP: ffffb4ffc7cbbe18 R08: 0000000000000000 R09: 0000000000000000 [ 878.386539] R10: 0000000000000000 R11: 0000000000000000 R12: ffff981390c2f030 [ 878.387203] R13: ffff981288232b58 R14: 0000000000000029 R15: 0000000000000001 [ 878.387877] FS: 0000000000000000(0000) GS:ffff9814b7900000(0000) knlGS:0000000000000000 [ 878.388663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 878.389212] CR2: 00005e106a0554e0 CR3: 0000000112bf0001 CR4: 0000000000772ef0 [ 878.389921] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 878.390620] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 878.391307] PKRU: 55555554 [ 878.391567] Call Trace: [ 878.391807] [ 878.392021] ? show_regs+0x71/0x90 [ 878.392391] ? die+0x38/0xa0 [ 878.392667] ? do_trap+0xdb/0x100 [ 878.392981] ? do_error_trap+0x75/0xb0 [ 878.393372] ? ceph_msg_data_cursor_init+0x42/0x50 [ 878.393842] ? exc_invalid_op+0x53/0x80 [ 878.394232] ? ceph_msg_data_cursor_init+0x42/0x50 [ 878.394694] ? asm_exc_invalid_op+0x1b/0x20 [ 878.395099] ? ceph_msg_data_cursor_init+0x42/0x50 [ 878.395583] ? ceph_con_v2_try_read+0xd16/0x2220 [ 878.396027] ? _raw_spin_unlock+0xe/0x40 [ 878.396428] ? raw_spin_rq_unlock+0x10/0x40 [ 878.396842] ? finish_task_switch.isra.0+0x97/0x310 [ 878.397338] ? __schedule+0x44b/0x16b0 [ 878.397738] ceph_con_workfn+0x326/0x750 [ 878.398121] process_one_work+0x188/0x3d0 [ 878.398522] ? __pfx_worker_thread+0x10/0x10 [ 878.398929] worker_thread+0x2b5/0x3c0 [ 878.399310] ? __pfx_worker_thread+0x10/0x10 [ 878.399727] kthread+0xe1/0x120 [ 878.400031] ? __pfx_kthread+0x10/0x10 [ 878.400431] ret_from_fork+0x43/0x70 [ 878.400771] ? __pfx_kthread+0x10/0x10 [ 878.401127] ret_from_fork_asm+0x1a/0x30 [ 878.401543] [ 878.401760] M\u00f3dulos l ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38224.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38224.json
index 11fbb2d5725..5e204da12ac 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38224.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38224.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38224",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:31.110",
- "lastModified": "2025-07-04T14:15:31.110",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: kvaser_pciefd: refine error prone echo_skb_max handling logic\n\necho_skb_max should define the supported upper limit of echo_skb[]\nallocated inside the netdevice's priv. The corresponding size value\nprovided by this driver to alloc_candev() is KVASER_PCIEFD_CAN_TX_MAX_COUNT\nwhich is 17.\n\nBut later echo_skb_max is rounded up to the nearest power of two (for the\nmax case, that would be 32) and the tx/ack indices calculated further\nduring tx/rx may exceed the upper array boundary. Kasan reported this for\nthe ack case inside kvaser_pciefd_handle_ack_packet(), though the xmit\nfunction has actually caught the same thing earlier.\n\n BUG: KASAN: slab-out-of-bounds in kvaser_pciefd_handle_ack_packet+0x2d7/0x92a drivers/net/can/kvaser_pciefd.c:1528\n Read of size 8 at addr ffff888105e4f078 by task swapper/4/0\n\n CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Not tainted 6.15.0 #12 PREEMPT(voluntary)\n Call Trace:\n \n dump_stack_lvl lib/dump_stack.c:122\n print_report mm/kasan/report.c:521\n kasan_report mm/kasan/report.c:634\n kvaser_pciefd_handle_ack_packet drivers/net/can/kvaser_pciefd.c:1528\n kvaser_pciefd_read_packet drivers/net/can/kvaser_pciefd.c:1605\n kvaser_pciefd_read_buffer drivers/net/can/kvaser_pciefd.c:1656\n kvaser_pciefd_receive_irq drivers/net/can/kvaser_pciefd.c:1684\n kvaser_pciefd_irq_handler drivers/net/can/kvaser_pciefd.c:1733\n __handle_irq_event_percpu kernel/irq/handle.c:158\n handle_irq_event kernel/irq/handle.c:210\n handle_edge_irq kernel/irq/chip.c:833\n __common_interrupt arch/x86/kernel/irq.c:296\n common_interrupt arch/x86/kernel/irq.c:286\n \n\nTx max count definitely matters for kvaser_pciefd_tx_avail(), but for seq\nnumbers' generation that's not the case - we're free to calculate them as\nwould be more convenient, not taking tx max count into account. The only\ndownside is that the size of echo_skb[] should correspond to the max seq\nnumber (not tx max count), so in some situations a bit more memory would\nbe consumed than could be.\n\nThus make the size of the underlying echo_skb[] sufficient for the rounded\nmax tx value.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: kvaser_pciefd: refinar la l\u00f3gica de manejo de echo_skb_max, propensa a errores. echo_skb_max deber\u00eda definir el l\u00edmite superior admitido de echo_skb[] asignado dentro del priv del dispositivo de red. El valor de tama\u00f1o correspondiente proporcionado por este controlador a alloc_candev() es KVASER_PCIEFD_CAN_TX_MAX_COUNT, que es 17. Sin embargo, posteriormente, echo_skb_max se redondea a la potencia de dos m\u00e1s cercana (para el caso m\u00e1ximo, ser\u00eda 32) y los \u00edndices de transmisi\u00f3n/recepci\u00f3n calculados posteriormente durante la transmisi\u00f3n/recepci\u00f3n pueden superar el l\u00edmite superior de la matriz. Kasan inform\u00f3 esto para el caso de confirmaci\u00f3n dentro de kvaser_pciefd_handle_ack_packet(), aunque la funci\u00f3n xmit ya hab\u00eda detectado el mismo problema anteriormente. ERROR: KASAN: slab-out-of-bounds in kvaser_pciefd_handle_ack_packet+0x2d7/0x92a drivers/net/can/kvaser_pciefd.c:1528 Read of size 8 at addr ffff888105e4f078 by task swapper/4/0 CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Not tainted 6.15.0 #12 PREEMPT(voluntary) Call Trace: dump_stack_lvl lib/dump_stack.c:122 print_report mm/kasan/report.c:521 kasan_report mm/kasan/report.c:634 kvaser_pciefd_handle_ack_packet drivers/net/can/kvaser_pciefd.c:1528 kvaser_pciefd_read_packet drivers/net/can/kvaser_pciefd.c:1605 kvaser_pciefd_read_buffer drivers/net/can/kvaser_pciefd.c:1656 kvaser_pciefd_receive_irq drivers/net/can/kvaser_pciefd.c:1684 kvaser_pciefd_irq_handler drivers/net/can/kvaser_pciefd.c:1733 __handle_irq_event_percpu kernel/irq/handle.c:158 handle_irq_event kernel/irq/handle.c:210 handle_edge_irq kernel/irq/chip.c:833 __common_interrupt arch/x86/kernel/irq.c:296 common_interrupt arch/x86/kernel/irq.c:286 El recuento m\u00e1ximo de transmisiones es importante para kvaser_pciefd_tx_avail(), pero no para la generaci\u00f3n de n\u00fameros de secuencia. Podemos calcularlo como nos convenga, sin tener en cuenta el recuento m\u00e1ximo de transmisiones. La \u00fanica desventaja es que el tama\u00f1o de echo_skb[] deber\u00eda corresponder al n\u00famero m\u00e1ximo de secuencia (no al recuento m\u00e1ximo de transmisiones), por lo que, en algunos casos, se consumir\u00eda m\u00e1s memoria de la que se podr\u00eda. Por lo tanto, el tama\u00f1o de echo_skb[] subyacente debe ser suficiente para el valor m\u00e1ximo de transmisi\u00f3n redondeado. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38225.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38225.json
index d24097db0e2..51f6406ae76 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38225.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38225.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38225",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:31.237",
- "lastModified": "2025-07-06T10:15:24.010",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imx-jpeg: Cleanup after an allocation error\n\nWhen allocation failures are not cleaned up by the driver, further\nallocation errors will be false-positives, which will cause buffers to\nremain uninitialized and cause NULL pointer dereferences.\nEnsure proper cleanup of failed allocations to prevent these issues."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: imx-jpeg: Limpieza tras un error de asignaci\u00f3n. Si el controlador no corrige los fallos de asignaci\u00f3n, los errores de asignaci\u00f3n posteriores ser\u00e1n falsos positivos, lo que provocar\u00e1 que los b\u00faferes permanezcan sin inicializar y desreferencias de punteros nulos. Aseg\u00farese de que las asignaciones fallidas se limpien correctamente para evitar estos problemas."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38226.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38226.json
index 67c52ccd44f..6a9532c8689 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38226.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38226.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38226",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:31.367",
- "lastModified": "2025-07-04T14:15:31.367",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vivid: Change the siize of the composing\n\nsyzkaller found a bug:\n\nBUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]\nBUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705\nWrite of size 1440 at addr ffffc9000d0ffda0 by task vivid-000-vid-c/5304\n\nCPU: 0 UID: 0 PID: 5304 Comm: vivid-000-vid-c Not tainted 6.14.0-rc2-syzkaller-00039-g09fbf3d50205 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n\nCall Trace:\n \n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\n tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]\n tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705\n vivid_fillbuff drivers/media/test-drivers/vivid/vivid-kthread-cap.c:470 [inline]\n vivid_thread_vid_cap_tick+0xf8e/0x60d0 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:629\n vivid_thread_vid_cap+0x8aa/0xf30 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:767\n kthread+0x7a9/0x920 kernel/kthread.c:464\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \n\nThe composition size cannot be larger than the size of fmt_cap_rect.\nSo execute v4l2_rect_map_inside() even if has_compose_cap == 0."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: vivid: Cambiar el tama\u00f1o de la composici\u00f3n syzkaller encontr\u00f3 un error: ERROR: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline] BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705 Write of size 1440 at addr ffffc9000d0ffda0 by task vivid-000-vid-c/5304 CPU: 0 UID: 0 PID: 5304 Comm: vivid-000-vid-c Not tainted 6.14.0-rc2-syzkaller-00039-g09fbf3d50205 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106 tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline] tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705 vivid_fillbuff drivers/media/test-drivers/vivid/vivid-kthread-cap.c:470 [inline] vivid_thread_vid_cap_tick+0xf8e/0x60d0 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:629 vivid_thread_vid_cap+0x8aa/0xf30 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:767 kthread+0x7a9/0x920 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 The composition size cannot be larger than the size of fmt_cap_rect. So execute v4l2_rect_map_inside() even if has_compose_cap == 0. "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38227.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38227.json
index 2b96fb29105..b1708bc1e55 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38227.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38227.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38227",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.153",
- "lastModified": "2025-07-04T14:15:32.153",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: Terminating the subsequent process of initialization failure\n\nsyzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]\n\nAfter PSI initialization fails, the si member is accessed again, resulting\nin this uaf.\n\nAfter si initialization fails, the subsequent process needs to be exited.\n\n[1]\nBUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline]\nBUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524\nRead of size 8 at addr ffff88802fa42acc by task syz.2.37/6059\n\nCPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0\nHardware name: Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n\n__dump_stack lib/dump_stack.c:94 [inline]\ndump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\nprint_address_description mm/kasan/report.c:408 [inline]\nprint_report+0xc3/0x670 mm/kasan/report.c:521\nkasan_report+0xd9/0x110 mm/kasan/report.c:634\nvidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78\nvidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524\nvidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194\nvidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239\ndmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973\ndvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]\ndvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537\ndvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564\ndvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]\ndvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246\n__fput+0x3ff/0xb70 fs/file_table.c:464\ntask_work_run+0x14e/0x250 kernel/task_work.c:227\nexit_task_work include/linux/task_work.h:40 [inline]\ndo_exit+0xad8/0x2d70 kernel/exit.c:938\ndo_group_exit+0xd3/0x2a0 kernel/exit.c:1087\n__do_sys_exit_group kernel/exit.c:1098 [inline]\n__se_sys_exit_group kernel/exit.c:1096 [inline]\n__x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096\nx64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f871d58d169\nCode: Unable to access opcode bytes at 0x7f871d58d13f.\nRSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169\nRDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0\nR10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003\nR13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840\n \n\nAllocated by task 6059:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970\n vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423\n vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519\n vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194\n vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239\n dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973\n dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]\n dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537\n dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564\n dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]\n dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246\n __fput+0x3ff/0xb70 fs/file_tabl\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: vidtv: Al finalizar el proceso posterior a un fallo de inicializaci\u00f3n, syzbot report\u00f3 una lectura slab-use-after-free en vidtv_mux_init. [1] Tras un fallo en la inicializaci\u00f3n de PSI, se accede de nuevo al miembro si, lo que genera este uaf. Tras un fallo en la inicializaci\u00f3n de si, es necesario finalizar el proceso posterior. [1] ERROR: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline] BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059 CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0 Hardware name: Google Compute Engine, BIOS Google 02/12/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xd9/0x110 mm/kasan/report.c:634 vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_table.c:464 task_work_run+0x14e/0x250 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096 x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f871d58d169 Code: Unable to access opcode bytes at 0x7f871d58d13f. RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840 Allocated by task 6059: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970 vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423 vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline] dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline] dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246 __fput+0x3ff/0xb70 fs/file_tabl ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38228.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38228.json
index 6bc5e52dbeb..00bf6dec031 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38228.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38228.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38228",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.290",
- "lastModified": "2025-07-04T14:15:32.290",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imagination: fix a potential memory leak in e5010_probe()\n\nAdd video_device_release() to release the memory allocated by\nvideo_device_alloc() if something goes wrong."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: imaginaci\u00f3n: corrige una posible p\u00e9rdida de memoria en e5010_probe() Agrega video_device_release() para liberar la memoria asignada por video_device_alloc() si algo sale mal."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38229.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38229.json
index e99c49d453f..f60dc7bf075 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38229.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38229.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38229",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.410",
- "lastModified": "2025-07-04T14:15:32.410",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: cxusb: no longer judge rbuf when the write fails\n\nsyzbot reported a uninit-value in cxusb_i2c_xfer. [1]\n\nOnly when the write operation of usb_bulk_msg() in dvb_usb_generic_rw()\nsucceeds and rlen is greater than 0, the read operation of usb_bulk_msg()\nwill be executed to read rlen bytes of data from the dvb device into the\nrbuf.\n\nIn this case, although rlen is 1, the write operation failed which resulted\nin the dvb read operation not being executed, and ultimately variable i was\nnot initialized.\n\n[1]\nBUG: KMSAN: uninit-value in cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\nBUG: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\n cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n __i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1\n i2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315\n i2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343\n i2c_master_send include/linux/i2c.h:109 [inline]\n i2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183\n do_loop_readv_writev fs/read_write.c:848 [inline]\n vfs_writev+0x963/0x14e0 fs/read_write.c:1057\n do_writev+0x247/0x5c0 fs/read_write.c:1101\n __do_sys_writev fs/read_write.c:1169 [inline]\n __se_sys_writev fs/read_write.c:1166 [inline]\n __x64_sys_writev+0x98/0xe0 fs/read_write.c:1166\n x64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: cxusb: ya no juzga rbuf cuando falla la escritura. syzbot report\u00f3 un valor no inicializado en cxusb_i2c_xfer. [1] Solo cuando la operaci\u00f3n de escritura de usb_bulk_msg() en dvb_usb_generic_rw() se realiza correctamente y rlen es mayor que 0, se ejecutar\u00e1 la operaci\u00f3n de lectura de usb_bulk_msg() para leer rlen bytes de datos del dispositivo dvb en rbuf. En este caso, aunque rlen es 1, la operaci\u00f3n de escritura fall\u00f3, lo que provoc\u00f3 que la operaci\u00f3n de lectura de dvb no se ejecutara y, en \u00faltima instancia, la variable i no se inicializara. [1] ERROR: KMSAN: valor no inicializado en cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [en l\u00ednea] ERROR: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196 cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline] cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196 __i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1 i2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315 i2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343 i2c_master_send include/linux/i2c.h:109 [inline] i2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183 do_loop_readv_writev fs/read_write.c:848 [inline] vfs_writev+0x963/0x14e0 fs/read_write.c:1057 do_writev+0x247/0x5c0 fs/read_write.c:1101 __do_sys_writev fs/read_write.c:1169 [inline] __se_sys_writev fs/read_write.c:1166 [inline] __x64_sys_writev+0x98/0xe0 fs/read_write.c:1166 x64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f "
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38230.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38230.json
index 157041e5782..e8a15b136ea 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38230.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38230.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38230",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.550",
- "lastModified": "2025-07-06T10:15:24.120",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: validate AG parameters in dbMount() to prevent crashes\n\nValidate db_agheight, db_agwidth, and db_agstart in dbMount to catch\ncorrupted metadata early and avoid undefined behavior in dbAllocAG.\nLimits are derived from L2LPERCTL, LPERCTL/MAXAG, and CTLTREESIZE:\n\n- agheight: 0 to L2LPERCTL/2 (0 to 5) ensures shift\n (L2LPERCTL - 2*agheight) >= 0.\n- agwidth: 1 to min(LPERCTL/MAXAG, 2^(L2LPERCTL - 2*agheight))\n ensures agperlev >= 1.\n - Ranges: 1-8 (agheight 0-3), 1-4 (agheight 4), 1 (agheight 5).\n - LPERCTL/MAXAG = 1024/128 = 8 limits leaves per AG;\n 2^(10 - 2*agheight) prevents division to 0.\n- agstart: 0 to CTLTREESIZE-1 - agwidth*(MAXAG-1) keeps ti within\n stree (size 1365).\n - Ranges: 0-1237 (agwidth 1), 0-348 (agwidth 8).\n\nUBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:1400:9\nshift exponent -335544310 is negative\nCPU: 0 UID: 0 PID: 5822 Comm: syz-executor130 Not tainted 6.14.0-rc5-syzkaller #0\nHardware name: Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n \n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x3c8/0x420 lib/ubsan.c:468\n dbAllocAG+0x1087/0x10b0 fs/jfs/jfs_dmap.c:1400\n dbDiscardAG+0x352/0xa20 fs/jfs/jfs_dmap.c:1613\n jfs_ioc_trim+0x45a/0x6b0 fs/jfs/jfs_discard.c:105\n jfs_ioctl+0x2cd/0x3e0 fs/jfs/ioctl.c:131\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: validar par\u00e1metros AG en dbMount() para evitar fallos Validar db_agheight, db_agwidth y db_agstart en dbMount para detectar metadatos da\u00f1ados de forma temprana y evitar un comportamiento indefinido en dbAllocAG. Los l\u00edmites se derivan de L2LPERCTL, LPERCTL/MAXAG y CTLTREESIZE: - agheight: 0 a L2LPERCTL/2 (0 a 5) garantiza un desplazamiento (L2LPERCTL - 2*agheight) >= 0. - agwidth: 1 a min(LPERCTL/MAXAG, 2^(L2LPERCTL - 2*agheight)) garantiza un agperlev >= 1. - Rangos: 1-8 (agheight 0-3), 1-4 (agheight 4), 1 (agheight 5). - LPERCTL/MAXAG = 1024/128 = 8 limita las hojas por AG; 2^(10 - 2*agheight) evita la divisi\u00f3n a 0. - agstart: 0 a CTLTREESIZE-1 - agwidth*(MAXAG-1) mantiene ti dentro de stree (tama\u00f1o 1365). - Rangos: 0-1237 (agwidth 1), 0-348 (agwidth 8). UBSAN: cambio fuera de l\u00edmites en fs/jfs/jfs_dmap.c:1400:9 el exponente de cambio -335544310 es negativo CPU: 0 UID: 0 PID: 5822 Comm: syz-executor130 No contaminado 6.14.0-rc5-syzkaller #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:231 [inline] __ubsan_handle_shift_out_of_bounds+0x3c8/0x420 lib/ubsan.c:468 dbAllocAG+0x1087/0x10b0 fs/jfs/jfs_dmap.c:1400 dbDiscardAG+0x352/0xa20 fs/jfs/jfs_dmap.c:1613 jfs_ioc_trim+0x45a/0x6b0 fs/jfs/jfs_discard.c:105 jfs_ioctl+0x2cd/0x3e0 fs/jfs/ioctl.c:131 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38231.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38231.json
index cc5721ec62f..97361d6fdc6 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38231.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38231.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38231",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.683",
- "lastModified": "2025-07-04T14:15:32.683",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Initialize ssc before laundromat_work to prevent NULL dereference\n\nIn nfs4_state_start_net(), laundromat_work may access nfsd_ssc through\nnfs4_laundromat -> nfsd4_ssc_expire_umount. If nfsd_ssc isn't initialized,\nthis can cause NULL pointer dereference.\n\nNormally the delayed start of laundromat_work allows sufficient time for\nnfsd_ssc initialization to complete. However, when the kernel waits too\nlong for userspace responses (e.g. in nfs4_state_start_net ->\nnfsd4_end_grace -> nfsd4_record_grace_done -> nfsd4_cld_grace_done ->\ncld_pipe_upcall -> __cld_pipe_upcall -> wait_for_completion path), the\ndelayed work may start before nfsd_ssc initialization finishes.\n\nFix this by moving nfsd_ssc initialization before starting laundromat_work."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: Inicializar ssc antes de laundromat_work para evitar la desreferencia de punteros NULL. En nfs4_state_start_net(), laundromat_work puede acceder a nfsd_ssc a trav\u00e9s de nfs4_laundromat -> nfsd4_ssc_expire_umount. Si nfsd_ssc no se inicializa, esto puede causar la desreferencia de punteros NULL. Normalmente, el inicio retrasado de laundromat_work permite que la inicializaci\u00f3n de nfsd_ssc se complete con tiempo suficiente. Sin embargo, cuando el n\u00facleo espera demasiado tiempo las respuestas del espacio de usuario (p. ej., en la ruta nfs4_state_start_net -> nfsd4_end_grace -> nfsd4_record_grace_done -> nfsd4_cld_grace_done -> cld_pipe_upcall -> __cld_pipe_upcall -> wait_for_completion), el trabajo retrasado puede comenzar antes de que finalice la inicializaci\u00f3n de nfsd_ssc. Para solucionar esto, mueva la inicializaci\u00f3n de nfsd_ssc antes de iniciar laundromat_work."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38232.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38232.json
index ac6e34742d1..1afb8560de7 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38232.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38232.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38232",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.810",
- "lastModified": "2025-07-04T14:15:32.810",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: fix race between nfsd registration and exports_proc\n\nAs of now nfsd calls create_proc_exports_entry() at start of init_nfsd\nand cleanup by remove_proc_entry() at last of exit_nfsd.\n\nWhich causes kernel OOPs if there is race between below 2 operations:\n(i) exportfs -r\n(ii) mount -t nfsd none /proc/fs/nfsd\n\nfor 5.4 kernel ARM64:\n\nCPU 1:\nel1_irq+0xbc/0x180\narch_counter_get_cntvct+0x14/0x18\nrunning_clock+0xc/0x18\npreempt_count_add+0x88/0x110\nprep_new_page+0xb0/0x220\nget_page_from_freelist+0x2d8/0x1778\n__alloc_pages_nodemask+0x15c/0xef0\n__vmalloc_node_range+0x28c/0x478\n__vmalloc_node_flags_caller+0x8c/0xb0\nkvmalloc_node+0x88/0xe0\nnfsd_init_net+0x6c/0x108 [nfsd]\nops_init+0x44/0x170\nregister_pernet_operations+0x114/0x270\nregister_pernet_subsys+0x34/0x50\ninit_nfsd+0xa8/0x718 [nfsd]\ndo_one_initcall+0x54/0x2e0\n\nCPU 2 :\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n\nPC is at : exports_net_open+0x50/0x68 [nfsd]\n\nCall trace:\nexports_net_open+0x50/0x68 [nfsd]\nexports_proc_open+0x2c/0x38 [nfsd]\nproc_reg_open+0xb8/0x198\ndo_dentry_open+0x1c4/0x418\nvfs_open+0x38/0x48\npath_openat+0x28c/0xf18\ndo_filp_open+0x70/0xe8\ndo_sys_open+0x154/0x248\n\nSometimes it crashes at exports_net_open() and sometimes cache_seq_next_rcu().\n\nand same is happening on latest 6.14 kernel as well:\n\n[ 0.000000] Linux version 6.14.0-rc5-next-20250304-dirty\n...\n[ 285.455918] Unable to handle kernel paging request at virtual address 00001f4800001f48\n...\n[ 285.464902] pc : cache_seq_next_rcu+0x78/0xa4\n...\n[ 285.469695] Call trace:\n[ 285.470083] cache_seq_next_rcu+0x78/0xa4 (P)\n[ 285.470488] seq_read+0xe0/0x11c\n[ 285.470675] proc_reg_read+0x9c/0xf0\n[ 285.470874] vfs_read+0xc4/0x2fc\n[ 285.471057] ksys_read+0x6c/0xf4\n[ 285.471231] __arm64_sys_read+0x1c/0x28\n[ 285.471428] invoke_syscall+0x44/0x100\n[ 285.471633] el0_svc_common.constprop.0+0x40/0xe0\n[ 285.471870] do_el0_svc_compat+0x1c/0x34\n[ 285.472073] el0_svc_compat+0x2c/0x80\n[ 285.472265] el0t_32_sync_handler+0x90/0x140\n[ 285.472473] el0t_32_sync+0x19c/0x1a0\n[ 285.472887] Code: f9400885 93407c23 937d7c27 11000421 (f86378a3)\n[ 285.473422] ---[ end trace 0000000000000000 ]---\n\nIt reproduced simply with below script:\nwhile [ 1 ]\ndo\n/exportfs -r\ndone &\n\nwhile [ 1 ]\ndo\ninsmod /nfsd.ko\nmount -t nfsd none /proc/fs/nfsd\numount /proc/fs/nfsd\nrmmod nfsd\ndone &\n\nSo exporting interfaces to user space shall be done at last and\ncleanup at first place.\n\nWith change there is no Kernel OOPs."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSD: se corrige la ejecuci\u00f3n entre el registro de nfsd y exports_proc A partir de ahora, nfsd llama a create_proc_exports_entry() al inicio de init_nfsd y realiza una limpieza mediante remove_proc_entry() al final de exit_nfsd. Lo que provoca errores OOP del kernel si hay una ejecuci\u00f3n entre las siguientes 2 operaciones: (i) exportfs -r (ii) mount -t nfsd none /proc/fs/nfsd for 5.4 kernel ARM64: CPU 1: el1_irq+0xbc/0x180 arch_counter_get_cntvct+0x14/0x18 running_clock+0xc/0x18 preempt_count_add+0x88/0x110 prep_new_page+0xb0/0x220 get_page_from_freelist+0x2d8/0x1778 __alloc_pages_nodemask+0x15c/0xef0 __vmalloc_node_range+0x28c/0x478 __vmalloc_node_flags_caller+0x8c/0xb0 kvmalloc_node+0x88/0xe0 nfsd_init_net+0x6c/0x108 [nfsd] ops_init+0x44/0x170 register_pernet_operations+0x114/0x270 register_pernet_subsys+0x34/0x50 init_nfsd+0xa8/0x718 [nfsd] do_one_initcall+0x54/0x2e0 CPU 2 : Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010 PC is at : exports_net_open+0x50/0x68 [nfsd] Call trace: exports_net_open+0x50/0x68 [nfsd] exports_proc_open+0x2c/0x38 [nfsd] proc_reg_open+0xb8/0x198 do_dentry_open+0x1c4/0x418 vfs_open+0x38/0x48 path_openat+0x28c/0xf18 do_filp_open+0x70/0xe8 do_sys_open+0x154/0x248 Sometimes it crashes at exports_net_open() and sometimes cache_seq_next_rcu(). and same is happening on latest 6.14 kernel as well: [ 0.000000] Linux version 6.14.0-rc5-next-20250304-dirty ... [ 285.455918] Unable to handle kernel paging request at virtual address 00001f4800001f48 ... [ 285.464902] pc : cache_seq_next_rcu+0x78/0xa4 ... [ 285.469695] Call trace: [ 285.470083] cache_seq_next_rcu+0x78/0xa4 (P) [ 285.470488] seq_read+0xe0/0x11c [ 285.470675] proc_reg_read+0x9c/0xf0 [ 285.470874] vfs_read+0xc4/0x2fc [ 285.471057] ksys_read+0x6c/0xf4 [ 285.471231] __arm64_sys_read+0x1c/0x28 [ 285.471428] invoke_syscall+0x44/0x100 [ 285.471633] el0_svc_common.constprop.0+0x40/0xe0 [ 285.471870] do_el0_svc_compat+0x1c/0x34 [ 285.472073] el0_svc_compat+0x2c/0x80 [ 285.472265] el0t_32_sync_handler+0x90/0x140 [ 285.472473] el0t_32_sync+0x19c/0x1a0 [ 285.472887] Code: f9400885 93407c23 937d7c27 11000421 (f86378a3) [ 285.473422] ---[ fin del seguimiento 0000000000000000 ]--- Se reprodujo simplemente con el siguiente script: mientras [ 1 ] do /exportfs -r done & mientras [ 1 ] do insmod /nfsd.ko mount -t nfsd none /proc/fs/nfsd umount /proc/fs/nfsd rmmod nfsd done & Por lo tanto, la exportaci\u00f3n de interfaces al espacio de usuario se realizar\u00e1 Por fin, listo y con limpieza desde el principio. Con el cambio, no hay problemas de POO del kernel."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38233.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38233.json
index c5f4610e270..8e24c887a39 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38233.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38233.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38233",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.953",
- "lastModified": "2025-07-04T14:15:32.953",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc64/ftrace: fix clobbered r15 during livepatching\n\nWhile r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is\nnot restored in livepatch sequence leading to not so obvious fails\nlike below:\n\n BUG: Unable to handle kernel data access on write at 0xc0000000000f9078\n Faulting instruction address: 0xc0000000018ff958\n Oops: Kernel access of bad area, sig: 11 [#1]\n ...\n NIP: c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790\n REGS: c00000005f2e7790 TRAP: 0300 Tainted: G K (6.14.0+)\n MSR: 8000000000009033 CR: 2822880b XER: 20040000\n CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1\n GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488\n GPR04: 0000000000000008 0000000000000000 c0000000018f24fc 000000000000000d\n GPR08: fffffffffffe0000 000000000000000d 0000000000000000 0000000000008000\n GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c0000000000f9070\n GPR16: c00000005f2e7c90 0000000000000000 0000000000000000 0000000000000000\n GPR20: 0000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88\n GPR24: c00000005f2e7c60 0000000000000001 c0000000000f9078 0000000000000000\n GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078\n ...\n Call Trace:\n check_heap_object+0x34/0x390 (unreliable)\n __mutex_unlock_slowpath.isra.0+0xe4/0x230\n seq_read_iter+0x430/0xa90\n proc_reg_read_iter+0xa4/0x200\n vfs_read+0x41c/0x510\n ksys_read+0xa4/0x190\n system_call_exception+0x1d0/0x440\n system_call_vectored_common+0x15c/0x2ec\n\nFix it by restoring r15 always."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc64/ftrace: arregla el r15 da\u00f1ado durante el parche en vivo Si bien r15 siempre se da\u00f1a con PPC_FTRACE_OUT_OF_LINE, no se restaura en la secuencia de parche en vivo, lo que lleva a fallas no tan obvias como las siguientes: ERROR: No se puede manejar el acceso a los datos del kernel en escritura en 0xc0000000000f9078 Direcci\u00f3n de instrucci\u00f3n err\u00f3nea: 0xc0000000018ff958 Oops: Acceso al kernel de \u00e1rea defectuosa, sig: 11 [#1] ... NIP: c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790 REGS: c00000005f2e7790 TRAP: 0300 Tainted: GK (6.14.0+) MSR: 8000000000009033 CR: 2822880b XER: 20040000 CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1 GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488 GPR04: 00000000000000008 00000000000000000 c0000000018f24fc 000000000000000d GPR08: fffffffffffe0000 000000000000000d 0000000000000000 00000000000008000 GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c000000000f9070 GPR16: c00000005f2e7c90 000000000000000 000000000000000 000000000000000 GPR20: 000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88 GPR24: c00000005f2e7c60 0000000000000001 c00000000000f9078 0000000000000000 GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078 ... Rastreo de llamadas: check_heap_object+0x34/0x390 (no confiable) __mutex_unlock_slowpath.isra.0+0xe4/0x230 seq_read_iter+0x430/0xa90 proc_reg_read_iter+0xa4/0x200 vfs_read+0x41c/0x510 ksys_read+0xa4/0x190 system_call_exception+0x1d0/0x440 system_call_vectored_common+0x15c/0x2ec Arr\u00e9glelo restaurando r15 siempre."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38234.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38234.json
index d81fa0fe54b..01554610052 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38234.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38234.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38234",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:33.087",
- "lastModified": "2025-07-04T14:15:33.087",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/rt: Fix race in push_rt_task\n\nOverview\n========\nWhen a CPU chooses to call push_rt_task and picks a task to push to\nanother CPU's runqueue then it will call find_lock_lowest_rq method\nwhich would take a double lock on both CPUs' runqueues. If one of the\nlocks aren't readily available, it may lead to dropping the current\nrunqueue lock and reacquiring both the locks at once. During this window\nit is possible that the task is already migrated and is running on some\nother CPU. These cases are already handled. However, if the task is\nmigrated and has already been executed and another CPU is now trying to\nwake it up (ttwu) such that it is queued again on the runqeue\n(on_rq is 1) and also if the task was run by the same CPU, then the\ncurrent checks will pass even though the task was migrated out and is no\nlonger in the pushable tasks list.\n\nCrashes\n=======\nThis bug resulted in quite a few flavors of crashes triggering kernel\npanics with various crash signatures such as assert failures, page\nfaults, null pointer dereferences, and queue corruption errors all\ncoming from scheduler itself.\n\nSome of the crashes:\n-> kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx >= MAX_RT_PRIO)\n Call Trace:\n ? __die_body+0x1a/0x60\n ? die+0x2a/0x50\n ? do_trap+0x85/0x100\n ? pick_next_task_rt+0x6e/0x1d0\n ? do_error_trap+0x64/0xa0\n ? pick_next_task_rt+0x6e/0x1d0\n ? exc_invalid_op+0x4c/0x60\n ? pick_next_task_rt+0x6e/0x1d0\n ? asm_exc_invalid_op+0x12/0x20\n ? pick_next_task_rt+0x6e/0x1d0\n __schedule+0x5cb/0x790\n ? update_ts_time_stats+0x55/0x70\n schedule_idle+0x1e/0x40\n do_idle+0x15e/0x200\n cpu_startup_entry+0x19/0x20\n start_secondary+0x117/0x160\n secondary_startup_64_no_verify+0xb0/0xbb\n\n-> BUG: kernel NULL pointer dereference, address: 00000000000000c0\n Call Trace:\n ? __die_body+0x1a/0x60\n ? no_context+0x183/0x350\n ? __warn+0x8a/0xe0\n ? exc_page_fault+0x3d6/0x520\n ? asm_exc_page_fault+0x1e/0x30\n ? pick_next_task_rt+0xb5/0x1d0\n ? pick_next_task_rt+0x8c/0x1d0\n __schedule+0x583/0x7e0\n ? update_ts_time_stats+0x55/0x70\n schedule_idle+0x1e/0x40\n do_idle+0x15e/0x200\n cpu_startup_entry+0x19/0x20\n start_secondary+0x117/0x160\n secondary_startup_64_no_verify+0xb0/0xbb\n\n-> BUG: unable to handle page fault for address: ffff9464daea5900\n kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq->cpu != task_cpu(p))\n\n-> kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq->nr_running)\n Call Trace:\n ? __die_body+0x1a/0x60\n ? die+0x2a/0x50\n ? do_trap+0x85/0x100\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? do_error_trap+0x64/0xa0\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? exc_invalid_op+0x4c/0x60\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? asm_exc_invalid_op+0x12/0x20\n ? dequeue_top_rt_rq+0xa2/0xb0\n dequeue_rt_entity+0x1f/0x70\n dequeue_task_rt+0x2d/0x70\n __schedule+0x1a8/0x7e0\n ? blk_finish_plug+0x25/0x40\n schedule+0x3c/0xb0\n futex_wait_queue_me+0xb6/0x120\n futex_wait+0xd9/0x240\n do_futex+0x344/0xa90\n ? get_mm_exe_file+0x30/0x60\n ? audit_exe_compare+0x58/0x70\n ? audit_filter_rules.constprop.26+0x65e/0x1220\n __x64_sys_futex+0x148/0x1f0\n do_syscall_64+0x30/0x80\n entry_SYSCALL_64_after_hwframe+0x62/0xc7\n\n-> BUG: unable to handle page fault for address: ffff8cf3608bc2c0\n Call Trace:\n ? __die_body+0x1a/0x60\n ? no_context+0x183/0x350\n ? spurious_kernel_fault+0x171/0x1c0\n ? exc_page_fault+0x3b6/0x520\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? asm_exc_page_fault+0x1e/0x30\n ? _cond_resched+0x15/0x30\n ? futex_wait_queue_me+0xc8/0x120\n ? futex_wait+0xd9/0x240\n ? try_to_wake_up+0x1b8/0x490\n ? futex_wake+0x78/0x160\n ? do_futex+0xcd/0xa90\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? plist_del+0x6a/0xd0\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? dequeue_pushable_task+0x20/0x70\n ? __schedule+0x382/0x7e0\n ? asm_sysvec_reschedule_i\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched/rt: Correcci\u00f3n de la ejecuci\u00f3n en push_rt_task. Descripci\u00f3n general ======== Cuando una CPU elige llamar a push_rt_task y selecciona una tarea para enviarla a la cola de ejecuci\u00f3n de otra CPU, llamar\u00e1 al m\u00e9todo find_lock_lowest_rq, que generar\u00eda un doble bloqueo en las colas de ejecuci\u00f3n de ambas CPU. Si uno de los bloqueos no est\u00e1 disponible, puede provocar que se elimine el bloqueo actual de la cola de ejecuci\u00f3n y se vuelvan a adquirir ambos bloqueos a la vez. Durante este periodo, es posible que la tarea ya se haya migrado y se est\u00e9 ejecutando en otra CPU. Estos casos ya se han gestionado. Sin embargo, si la tarea se migra y ya se ha ejecutado, y otra CPU est\u00e1 intentando despertarla (ttwu), de modo que se vuelve a poner en cola en la cola de ejecuci\u00f3n (on_rq es 1), y adem\u00e1s, si la tarea la ejecut\u00f3 la misma CPU, las comprobaciones actuales pasar\u00e1n aunque la tarea se haya migrado y ya no est\u00e9 en la lista de tareas que se pueden enviar. Fallos ======= Este error provoc\u00f3 bastantes tipos de fallos que desencadenaron p\u00e1nicos del kernel con varias firmas de fallo, como fallos de aserci\u00f3n, fallos de p\u00e1gina, desreferencias de puntero nulo y errores de corrupci\u00f3n de cola, todos procedentes del propio programador. Algunos de los fallos: -> kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx >= MAX_RT_PRIO) Call Trace: ? __die_body+0x1a/0x60 ? die+0x2a/0x50 ? do_trap+0x85/0x100 ? pick_next_task_rt+0x6e/0x1d0 ? do_error_trap+0x64/0xa0 ? pick_next_task_rt+0x6e/0x1d0 ? exc_invalid_op+0x4c/0x60 ? pick_next_task_rt+0x6e/0x1d0 ? asm_exc_invalid_op+0x12/0x20 ? pick_next_task_rt+0x6e/0x1d0 __schedule+0x5cb/0x790 ? update_ts_time_stats+0x55/0x70 schedule_idle+0x1e/0x40 do_idle+0x15e/0x200 cpu_startup_entry+0x19/0x20 start_secondary+0x117/0x160 secondary_startup_64_no_verify+0xb0/0xbb -> BUG: kernel NULL pointer dereference, address: 00000000000000c0 Call Trace: ? __die_body+0x1a/0x60 ? no_context+0x183/0x350 ? __warn+0x8a/0xe0 ? exc_page_fault+0x3d6/0x520 ? asm_exc_page_fault+0x1e/0x30 ? pick_next_task_rt+0xb5/0x1d0 ? pick_next_task_rt+0x8c/0x1d0 __schedule+0x583/0x7e0 ? update_ts_time_stats+0x55/0x70 schedule_idle+0x1e/0x40 do_idle+0x15e/0x200 cpu_startup_entry+0x19/0x20 start_secondary+0x117/0x160 secondary_startup_64_no_verify+0xb0/0xbb -> BUG: unable to handle page fault for address: ffff9464daea5900 kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq->cpu != task_cpu(p)) -> kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq->nr_running) Call Trace: ? __die_body+0x1a/0x60 ? die+0x2a/0x50 ? do_trap+0x85/0x100 ? dequeue_top_rt_rq+0xa2/0xb0 ? do_error_trap+0x64/0xa0 ? dequeue_top_rt_rq+0xa2/0xb0 ? exc_invalid_op+0x4c/0x60 ? dequeue_top_rt_rq+0xa2/0xb0 ? asm_exc_invalid_op+0x12/0x20 ? dequeue_top_rt_rq+0xa2/0xb0 dequeue_rt_entity+0x1f/0x70 dequeue_task_rt+0x2d/0x70 __schedule+0x1a8/0x7e0 ? blk_finish_plug+0x25/0x40 schedule+0x3c/0xb0 futex_wait_queue_me+0xb6/0x120 futex_wait+0xd9/0x240 do_futex+0x344/0xa90 ? get_mm_exe_file+0x30/0x60 ? audit_exe_compare+0x58/0x70 ? audit_filter_rules.constprop.26+0x65e/0x1220 __x64_sys_futex+0x148/0x1f0 do_syscall_64+0x30/0x80 entry_SYSCALL_64_after_hwframe+0x62/0xc7 -> BUG: unable to handle page fault for address: ffff8cf3608bc2c0 Call Trace: ? __die_body+0x1a/0x60 ? no_context+0x183/0x350 ? spurious_kernel_fault+0x171/0x1c0 ? exc_page_fault+0x3b6/0x520 ? plist_check_list+0x15/0x40 ? plist_check_list+0x2e/0x40 ? asm_exc_page_fault+0x1e/0x30 ? _cond_resched+0x15/0x30 ? futex_wait_queue_me+0xc8/0x120 ? futex_wait+0xd9/0x240 ? try_to_wake_up+0x1b8/0x490 ? futex_wake+0x78/0x160 ? do_futex+0xcd/0xa90 ? plist_check_list+0x15/0x40 ? plist_check_list+0x2e/0x40 ? plist_del+0x6a/0xd0 ? plist_check_list+0x15/0x40 ? plist_check_list+0x2e/0x40 ? dequeue_pushable_task+0x20/0x70 ? __schedule+0x382/0x7e0 ? asm_sysvec_reschedule_i ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38235.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38235.json
index a9c6c7e1f22..476a9897d37 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38235.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38235.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38235",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-06T10:15:24.223",
- "lastModified": "2025-07-06T10:15:24.223",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: appletb-kbd: fix \"appletb_backlight\" backlight device reference counting\n\nDuring appletb_kbd_probe, probe attempts to get the backlight device\nby name. When this happens backlight_device_get_by_name looks for a\ndevice in the backlight class which has name \"appletb_backlight\" and\nupon finding a match it increments the reference count for the device\nand returns it to the caller. However this reference is never released\nleading to a reference leak.\n\nFix this by decrementing the backlight device reference count on removal\nvia put_device and on probe failure."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: appletb-kbd: correcci\u00f3n del conteo de referencias del dispositivo de retroiluminaci\u00f3n \"appletb_backlight\". Durante appletb_kbd_probe, la sonda intenta obtener el dispositivo de retroiluminaci\u00f3n por nombre. Cuando esto ocurre, backlight_device_get_by_name busca un dispositivo en la clase de retroiluminaci\u00f3n con el nombre \"appletb_backlight\" y, al encontrar una coincidencia, incrementa el conteo de referencias del dispositivo y lo devuelve al invocador. Sin embargo, esta referencia nunca se libera, lo que provoca una fuga de referencias. Para solucionar esto, disminuya el conteo de referencias del dispositivo de retroiluminaci\u00f3n al eliminarlo mediante put_device y si la sonda falla."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38236.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38236.json
index 83b821e7460..8bba186b67e 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38236.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38236.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38236",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-08T08:15:20.960",
- "lastModified": "2025-07-08T08:15:20.960",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Don't leave consecutive consumed OOB skbs.\n\nJann Horn reported a use-after-free in unix_stream_read_generic().\n\nThe following sequences reproduce the issue:\n\n $ python3\n from socket import *\n s1, s2 = socketpair(AF_UNIX, SOCK_STREAM)\n s1.send(b'x', MSG_OOB)\n s2.recv(1, MSG_OOB) # leave a consumed OOB skb\n s1.send(b'y', MSG_OOB)\n s2.recv(1, MSG_OOB) # leave a consumed OOB skb\n s1.send(b'z', MSG_OOB)\n s2.recv(1) # recv 'z' illegally\n s2.recv(1, MSG_OOB) # access 'z' skb (use-after-free)\n\nEven though a user reads OOB data, the skb holding the data stays on\nthe recv queue to mark the OOB boundary and break the next recv().\n\nAfter the last send() in the scenario above, the sk2's recv queue has\n2 leading consumed OOB skbs and 1 real OOB skb.\n\nThen, the following happens during the next recv() without MSG_OOB\n\n 1. unix_stream_read_generic() peeks the first consumed OOB skb\n 2. manage_oob() returns the next consumed OOB skb\n 3. unix_stream_read_generic() fetches the next not-yet-consumed OOB skb\n 4. unix_stream_read_generic() reads and frees the OOB skb\n\n, and the last recv(MSG_OOB) triggers KASAN splat.\n\nThe 3. above occurs because of the SO_PEEK_OFF code, which does not\nexpect unix_skb_len(skb) to be 0, but this is true for such consumed\nOOB skbs.\n\n while (skip >= unix_skb_len(skb)) {\n skip -= unix_skb_len(skb);\n skb = skb_peek_next(skb, &sk->sk_receive_queue);\n ...\n }\n\nIn addition to this use-after-free, there is another issue that\nioctl(SIOCATMARK) does not function properly with consecutive consumed\nOOB skbs.\n\nSo, nothing good comes out of such a situation.\n\nInstead of complicating manage_oob(), ioctl() handling, and the next\nECONNRESET fix by introducing a loop for consecutive consumed OOB skbs,\nlet's not leave such consecutive OOB unnecessarily.\n\nNow, while receiving an OOB skb in unix_stream_recv_urg(), if its\nprevious skb is a consumed OOB skb, it is freed.\n\n[0]:\nBUG: KASAN: slab-use-after-free in unix_stream_read_actor (net/unix/af_unix.c:3027)\nRead of size 4 at addr ffff888106ef2904 by task python3/315\n\nCPU: 2 UID: 0 PID: 315 Comm: python3 Not tainted 6.16.0-rc1-00407-gec315832f6f9 #8 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.fc42 04/01/2014\nCall Trace:\n \n dump_stack_lvl (lib/dump_stack.c:122)\n print_report (mm/kasan/report.c:409 mm/kasan/report.c:521)\n kasan_report (mm/kasan/report.c:636)\n unix_stream_read_actor (net/unix/af_unix.c:3027)\n unix_stream_read_generic (net/unix/af_unix.c:2708 net/unix/af_unix.c:2847)\n unix_stream_recvmsg (net/unix/af_unix.c:3048)\n sock_recvmsg (net/socket.c:1063 (discriminator 20) net/socket.c:1085 (discriminator 20))\n __sys_recvfrom (net/socket.c:2278)\n __x64_sys_recvfrom (net/socket.c:2291 (discriminator 1) net/socket.c:2287 (discriminator 1) net/socket.c:2287 (discriminator 1))\n do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1))\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\nRIP: 0033:0x7f8911fcea06\nCode: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08\nRSP: 002b:00007fffdb0dccb0 EFLAGS: 00000202 ORIG_RAX: 000000000000002d\nRAX: ffffffffffffffda RBX: 00007fffdb0dcdc8 RCX: 00007f8911fcea06\nRDX: 0000000000000001 RSI: 00007f8911a5e060 RDI: 0000000000000006\nRBP: 00007fffdb0dccd0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000202 R12: 00007f89119a7d20\nR13: ffffffffc4653600 R14: 0000000000000000 R15: 0000000000000000\n \n\nAllocated by task 315:\n kasan_save_stack (mm/kasan/common.c:48)\n kasan_save_track (mm/kasan/common.c:60 (discriminator 1) mm/kasan/common.c:69 (discriminator 1))\n __kasan_slab_alloc (mm/kasan/common.c:348)\n kmem_cache_alloc_\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: af_unix: No se dejan skbs OOB consumidos consecutivos. Jann Horn report\u00f3 un error de use-after-free en unix_stream_read_generic(). Las siguientes secuencias reproducen el problema: $ python3 from socket import * s1, s2 = socketpair(AF_UNIX, SOCK_STREAM) s1.send(b'x', MSG_OOB) s2.recv(1, MSG_OOB) # dejar un skb OOB consumido s1.send(b'y', MSG_OOB) s2.recv(1, MSG_OOB) # dejar un skb OOB consumido s1.send(b'z', MSG_OOB) s2.recv(1) # recibir 'z' ilegalmente s2.recv(1, MSG_OOB) # acceder a 'z' skb (use-after-free) Aunque un usuario lea datos OOB, el skb que contiene los datos permanece en la cola de recepci\u00f3n para marcar el l\u00edmite OOB y romper la siguiente recepci\u00f3n(). Tras el \u00faltimo env\u00edo () en el escenario anterior, la cola de recepci\u00f3n de sk2 tiene 2 skbs OOB consumidos principales y 1 skb OOB real. Entonces, ocurre lo siguiente durante la siguiente recepci\u00f3n () sin MSG_OOB: 1. unix_stream_read_generic() inspecciona el primer skb OOB consumido. 2. manage_oob() devuelve el siguiente skb OOB consumido. 3. unix_stream_read_generic() recupera el siguiente skb OOB a\u00fan no consumido. 4. unix_stream_read_generic() lee y libera el skb OOB, y la \u00faltima recepci\u00f3n (MSG_OOB) activa KASAN splat. El punto 3 anterior ocurre debido al c\u00f3digo SO_PEEK_OFF, que no espera que unix_skb_len(skb) sea 0, pero esto es cierto para dichos skbs OOB consumidos. while (skip >= unix_skb_len(skb)) { skip -= unix_skb_len(skb); skb = skb_peek_next(skb, &sk->sk_receive_queue); ... } Adem\u00e1s de este use-after-free, existe otro problema: ioctl(SIOCATMARK) no funciona correctamente con skb OOB consumidos consecutivos. Por lo tanto, no se obtiene nada bueno de tal situaci\u00f3n. En lugar de complicar la gesti\u00f3n de manage_oob(), ioctl() y la siguiente correcci\u00f3n de ECONNRESET mediante la introducci\u00f3n de un bucle para skb OOB consumidos consecutivos, no dejemos que dichos OOB consecutivos se agoten innecesariamente. Ahora, al recibir un skb OOB en unix_stream_recv_urg(), si su skb anterior es un skb OOB consumido, se libera. [0]: ERROR: KASAN: slab-use-after-free en unix_stream_read_actor (net/unix/af_unix.c:3027) Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff888106ef2904 por la tarea python3/315 CPU: 2 UID: 0 PID: 315 Comm: python3 No contaminado 6.16.0-rc1-00407-gec315832f6f9 #8 PREEMPT(voluntario) Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.fc42 01/04/2014 Rastreo de llamadas: dump_stack_lvl (lib/dump_stack.c:122) print_report (mm/kasan/report.c:409 mm/kasan/report.c:521) kasan_report (mm/kasan/report.c:636) unix_stream_read_actor (net/unix/af_unix.c:3027) unix_stream_read_generic (net/unix/af_unix.c:2708 net/unix/af_unix.c:2847) unix_stream_recvmsg (net/unix/af_unix.c:3048) sock_recvmsg (net/socket.c:1063 (discriminator 20) net/socket.c:1085 (discriminator 20)) __sys_recvfrom (net/socket.c:2278) __x64_sys_recvfrom (net/socket.c:2291 (discriminator 1) net/socket.c:2287 (discriminator 1) net/socket.c:2287 (discriminator 1)) do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1)) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) RIP: 0033:0x7f8911fcea06 Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08 RSP: 002b:00007fffdb0dccb0 EFLAGS: 00000202 ORIG_RAX: 000000000000002d RAX: ffffffffffffffda RBX: 00007fffdb0dcdc8 RCX: 00007f8911fcea06 RDX: 0000000000000001 RSI: 00007f8911a5e060 RDI: 0000000000000006 RBP: 00007fffdb0dccd0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000202 R12: 00007f89119a7d20 R13: ffffffffc4653600 R14: 0000000000000000 R15: 0000000000000000 Asignado por la tarea 315: kasan_save_stack (mm/kasan/common.c:48) kasan_save_track (mm/kasan/common.c:60 (discriminador 1) mm/kasan/common.c:69 (discriminador 1)) __kasan_slab_alloc (mm/kasan/common.c:348) ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-382xx/CVE-2025-38237.json b/CVE-2025/CVE-2025-382xx/CVE-2025-38237.json
index fe090b0e800..698b77facc9 100644
--- a/CVE-2025/CVE-2025-382xx/CVE-2025-38237.json
+++ b/CVE-2025/CVE-2025-382xx/CVE-2025-38237.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-38237",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-08T08:15:21.870",
- "lastModified": "2025-07-08T08:15:21.870",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode()\n\nIn fimc_is_hw_change_mode(), the function changes camera modes without\nwaiting for hardware completion, risking corrupted data or system hangs\nif subsequent operations proceed before the hardware is ready.\n\nAdd fimc_is_hw_wait_intmsr0_intmsd0() after mode configuration, ensuring\nhardware state synchronization and stable interrupt handling."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: platform: exynos4-is: A\u00f1adir espera de sincronizaci\u00f3n de hardware a fimc_is_hw_change_mode(). En fimc_is_hw_change_mode(), la funci\u00f3n cambia los modos de la c\u00e1mara sin esperar a que el hardware est\u00e9 listo, lo que puede provocar da\u00f1os en los datos o bloqueos del sistema si las operaciones posteriores se realizan antes de que el hardware est\u00e9 listo. A\u00f1adir fimc_is_hw_wait_intmsr0_intmsd0() despu\u00e9s de la configuraci\u00f3n del modo, lo que garantiza la sincronizaci\u00f3n del estado del hardware y una gesti\u00f3n estable de las interrupciones."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-394xx/CVE-2025-39487.json b/CVE-2025/CVE-2025-394xx/CVE-2025-39487.json
index 8d63d5cc652..f16b976eded 100644
--- a/CVE-2025/CVE-2025-394xx/CVE-2025-39487.json
+++ b/CVE-2025/CVE-2025-394xx/CVE-2025-39487.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-39487",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:28.353",
- "lastModified": "2025-07-04T12:15:28.353",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ValvePress Rankie allows Reflected XSS. This issue affects Rankie: from n/a through 1.8.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ValvePress Rankie que permite XSS reflejado. Este problema afecta a Rankie desde n/d hasta la versi\u00f3n 1.8.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3920.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3920.json
index 8d912029b12..0fd05c1b0aa 100644
--- a/CVE-2025/CVE-2025-39xx/CVE-2025-3920.json
+++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3920.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-3920",
"sourceIdentifier": "cvd@cert.pl",
"published": "2025-07-07T09:15:26.587",
- "lastModified": "2025-07-07T09:15:26.587",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in SUR-FBD CMMS where hard-coded credentials were found within a compiled DLL file. These credentials correspond to a built-in administrative account of the software. An attacker with local access to the system or the application's installation directory could extract these credentials, potentially leading to a complete compromise of the application's administrative functions.\u00a0This issue was fixed in version 2025.03.27 of the SUR-FBD CMMS software."
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 una vulnerabilidad en SUR-FBD CMMS donde se encontraron credenciales codificadas dentro de un archivo DLL compilado. Estas credenciales corresponden a una cuenta administrativa integrada del software. Un atacante con acceso local al sistema o al directorio de instalaci\u00f3n de la aplicaci\u00f3n podr\u00eda extraer estas credenciales, lo que podr\u00eda comprometer completamente las funciones administrativas de la aplicaci\u00f3n. Este problema se solucion\u00f3 en la versi\u00f3n 2025.03.27 del software SUR-FBD CMMS."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-405xx/CVE-2025-40593.json b/CVE-2025/CVE-2025-405xx/CVE-2025-40593.json
index 616761f4f5b..44fdcfae282 100644
--- a/CVE-2025/CVE-2025-405xx/CVE-2025-40593.json
+++ b/CVE-2025/CVE-2025-405xx/CVE-2025-40593.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40593",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:29.473",
- "lastModified": "2025-07-08T11:15:29.473",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC CN 4100 (All versions < V4.0). The affected application allows to control the device by storing arbitrary files in the SFTP folder of the device. This could allow an attacker to cause a denial of service condition."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SIMATIC CN 4100 (todas las versiones anteriores a la V4.0). La aplicaci\u00f3n afectada permite controlar el dispositivo almacenando archivos arbitrarios en su carpeta SFTP. Esto podr\u00eda permitir a un atacante provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40711.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40711.json
index bd9c9e8bce4..240b7c2573b 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40711.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40711.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40711",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:21.347",
- "lastModified": "2025-07-08T12:15:21.347",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40712.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40712.json
index f2eeeb46295..0c167b4c5ab 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40712.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40712.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40712",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.080",
- "lastModified": "2025-07-08T12:15:22.080",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40713.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40713.json
index fc7010973c2..fd4096126e2 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40713.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40713.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40713",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.230",
- "lastModified": "2025-07-08T12:15:22.230",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40714.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40714.json
index 457f9d2da05..d9ae7046fd5 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40714.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40714.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40714",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.367",
- "lastModified": "2025-07-08T12:15:22.367",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40715.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40715.json
index a2112de4ce1..d8ff5fb3671 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40715.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40715.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40715",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.513",
- "lastModified": "2025-07-08T12:15:22.513",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40716.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40716.json
index 21632aa9d93..1a3c66ec5ca 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40716.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40716.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40716",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.660",
- "lastModified": "2025-07-08T12:15:22.660",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40717.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40717.json
index c8bc9b9b689..83cc8d1e757 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40717.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40717.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40717",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.803",
- "lastModified": "2025-07-08T12:15:22.803",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40718.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40718.json
index 7f43160f922..19c4e243584 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40718.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40718.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40718",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:22.947",
- "lastModified": "2025-07-08T12:15:22.947",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40719.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40719.json
index 9096d99b40d..a48904a4f2e 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40719.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40719.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40719",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:23.090",
- "lastModified": "2025-07-08T12:15:23.090",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40720.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40720.json
index 6c3215564a0..902f2103f68 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40720.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40720.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40720",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:23.243",
- "lastModified": "2025-07-08T12:15:23.243",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40721.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40721.json
index 4bb7997273a..ad445b0ee2e 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40721.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40721.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-40721",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-07-08T12:15:23.397",
- "lastModified": "2025-07-08T12:15:23.397",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40735.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40735.json
index ee827f5802e..83833544ee6 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40735.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40735.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40735",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:29.657",
- "lastModified": "2025-07-08T11:15:29.657",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected devices are vulnerable to SQL injection. This could allow an unauthenticated remote attacker to execute arbitrary SQL queries on the server database."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SINEC NMS (todas las versiones anteriores a la V4.0). Los dispositivos afectados son vulnerables a la inyecci\u00f3n SQL. Esto podr\u00eda permitir que un atacante remoto no autenticado ejecute consultas SQL arbitrarias en la base de datos del servidor."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40736.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40736.json
index d75c968ab77..9aee2c6e4a2 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40736.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40736.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40736",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:29.837",
- "lastModified": "2025-07-08T11:15:29.837",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application exposes an endpoint that allows an unauthorized modification of administrative credentials. This could allow an unauthenticated attacker to reset the superadmin password and gain full control of the application (ZDI-CAN-26569)."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SINEC NMS (todas las versiones anteriores a la V4.0). La aplicaci\u00f3n afectada expone un endpoint que permite la modificaci\u00f3n no autorizada de credenciales administrativas. Esto podr\u00eda permitir que un atacante no autenticado restablezca la contrase\u00f1a de superadministrador y obtenga el control total de la aplicaci\u00f3n (ZDI-CAN-26569)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40737.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40737.json
index 6f73ec49f36..897764842e2 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40737.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40737.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40737",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:30.007",
- "lastModified": "2025-07-08T11:15:30.007",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application does not properly validate file paths when extracting uploaded ZIP files. This could allow an attacker to write arbitrary files to restricted locations and potentially execute code with elevated privileges (ZDI-CAN-26571)."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SINEC NMS (todas las versiones anteriores a la V4.0). La aplicaci\u00f3n afectada no valida correctamente las rutas de los archivos al extraer los archivos ZIP subidos. Esto podr\u00eda permitir que un atacante escriba archivos arbitrarios en ubicaciones restringidas y, potencialmente, ejecute c\u00f3digo con privilegios elevados (ZDI-CAN-26571)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40738.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40738.json
index bca85b8d9a9..10e9b71b339 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40738.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40738.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40738",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:30.190",
- "lastModified": "2025-07-08T11:15:30.190",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application does not properly validate file paths when extracting uploaded ZIP files. This could allow an attacker to write arbitrary files to restricted locations and potentially execute code with elevated privileges (ZDI-CAN-26572)."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SINEC NMS (todas las versiones anteriores a la V4.0). La aplicaci\u00f3n afectada no valida correctamente las rutas de los archivos al extraer los archivos ZIP subidos. Esto podr\u00eda permitir que un atacante escriba archivos arbitrarios en ubicaciones restringidas y, potencialmente, ejecute c\u00f3digo con privilegios elevados (ZDI-CAN-26572)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40739.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40739.json
index a7a70ed38c2..1bd6a037035 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40739.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40739.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40739",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:30.380",
- "lastModified": "2025-07-08T11:15:30.380",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files.\r\nThis could allow an attacker to execute code in the context of the current process."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en Solid Edge SE2025 (todas las versiones anteriores a V225.0 Actualizaci\u00f3n 5). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites que excede el final de una estructura asignada al analizar archivos PAR especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40740.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40740.json
index ec48df730b1..b6e36d76fa1 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40740.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40740.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40740",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:30.560",
- "lastModified": "2025-07-08T11:15:30.560",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files.\r\nThis could allow an attacker to execute code in the context of the current process."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en Solid Edge SE2025 (todas las versiones anteriores a V225.0 Actualizaci\u00f3n 5). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites que excede el final de una estructura asignada al analizar archivos PAR especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40741.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40741.json
index 47cef012f4d..dd1a5e1b0ca 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40741.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40741.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40741",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:30.747",
- "lastModified": "2025-07-08T11:15:30.747",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted CFG files.\r\nThis could allow an attacker to execute code in the context of the current process."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en Solid Edge SE2025 (todas las versiones anteriores a V225.0 Update 5). Las aplicaciones afectadas presentan una vulnerabilidad de desbordamiento de pila al analizar archivos CFG especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-407xx/CVE-2025-40742.json b/CVE-2025/CVE-2025-407xx/CVE-2025-40742.json
index e5223477f48..c260cb6c0f9 100644
--- a/CVE-2025/CVE-2025-407xx/CVE-2025-40742.json
+++ b/CVE-2025/CVE-2025-407xx/CVE-2025-40742.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-40742",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:30.923",
- "lastModified": "2025-07-08T11:15:30.923",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions), SIPROTEC 5 6MD89 (CP300) (All versions), SIPROTEC 5 6MD89 (CP300) V9.6 (All versions), SIPROTEC 5 6MU85 (CP300) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions), SIPROTEC 5 7SX85 (CP300) (All versions), SIPROTEC 5 7SY82 (CP150) (All versions), SIPROTEC 5 7UM85 (CP300) (All versions), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions), SIPROTEC 5 7VE85 (CP300) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions), SIPROTEC 5 7VU85 (CP300) (All versions), SIPROTEC 5 Compact 7SX800 (CP050) (All versions). The affected devices include session identifiers in URL requests for certain functionalities. This could allow an attacker to retrieve sensitive session data from browser history, logs, or other storage mechanisms, potentially leading to unauthorized access."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD84 (CP300) (Todas las versiones), SIPROTEC 5 6MD85 (CP300) (Todas las versiones), SIPROTEC 5 6MD86 (CP300) (Todas las versiones), SIPROTEC 5 6MD89 (CP300) (Todas las versiones), SIPROTEC 5 6MD89 (CP300) V9.6 (Todas las versiones), SIPROTEC 5 6MU85 (CP300) (Todas las versiones), SIPROTEC 5 7KE85 (CP300) (Todas las versiones), SIPROTEC 5 7SA82 (CP100) (Todas las versiones), SIPROTEC 5 7SA82 (CP150) (Todas las versiones), SIPROTEC 5 7SA86 (CP300) (Todas las versiones), SIPROTEC 5 7SA87 (CP300) (Todas las versiones), SIPROTEC 5 7SD82 (CP100) (Todas las versiones), SIPROTEC 5 7SD82 (CP150) (Todas las versiones), SIPROTEC 5 7SD86 (CP300) (Todas las versiones), SIPROTEC 5 7SD87 (CP300) (Todas las versiones), SIPROTEC 5 7SJ81 (CP100) (Todas las versiones), SIPROTEC 5 7SJ81 (CP150) (Todas las versiones), SIPROTEC 5 7SJ82 (CP100) (Todas las versiones), SIPROTEC 5 7SJ82 (CP150) (Todas las versiones), SIPROTEC 5 7SJ85 (CP300) (Todas las versiones), SIPROTEC 5 7SJ86 (CP300) (Todas las versiones), SIPROTEC 5 7SK82 (CP100) (Todas las versiones), SIPROTEC 5 7SK82 (CP150) (Todas las versiones), SIPROTEC 5 7SK85 (CP300) (Todas las versiones), SIPROTEC 5 7SL82 (CP100) (Todas las versiones), SIPROTEC 5 7SL82 (CP150) (Todas las versiones), SIPROTEC 5 7SL86 (CP300) (Todas las versiones), SIPROTEC 5 7SL87 (CP300) (Todas las versiones), SIPROTEC 5 7SS85 (CP300) (Todas las versiones), SIPROTEC 5 7ST85 (CP300) (Todas las versiones), SIPROTEC 5 7ST86 (CP300) (Todas las versiones), SIPROTEC 5 7SX82 (CP150) (Todas las versiones), SIPROTEC 5 7SX85 (CP300) (Todas las versiones), SIPROTEC 5 7SY82 (CP150) (Todas las versiones), SIPROTEC 5 7UM85 (CP300) (Todas las versiones), SIPROTEC 5 7UT82 (CP100) (Todas las versiones), SIPROTEC 5 7UT82 (CP150) (Todas las versiones), SIPROTEC 5 7UT85 (CP300) (Todas las versiones), SIPROTEC 5 7UT86 (CP300) (Todas las versiones), SIPROTEC 5 7UT87 (CP300) (Todas las versiones), SIPROTEC 5 7VE85 (CP300) (Todas las versiones), SIPROTEC 5 7VK87 (CP300) (Todas las versiones), SIPROTEC 5 7VU85 (CP300) (Todas las versiones), SIPROTEC 5 Compact 7SX800 (CP050) (Todas las versiones). Los dispositivos afectados incluyen identificadores de sesi\u00f3n en las solicitudes URL para ciertas funcionalidades. Esto podr\u00eda permitir que un atacante extraiga datos confidenciales de la sesi\u00f3n del historial del navegador, registros u otros mecanismos de almacenamiento, lo que podr\u00eda provocar un acceso no autorizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-412xx/CVE-2025-41222.json b/CVE-2025/CVE-2025-412xx/CVE-2025-41222.json
index d01b09aa2d2..39240a31bdb 100644
--- a/CVE-2025/CVE-2025-412xx/CVE-2025-41222.json
+++ b/CVE-2025/CVE-2025-412xx/CVE-2025-41222.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41222",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:31.117",
- "lastModified": "2025-07-08T11:15:31.117",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). Affected devices do not properly handle malformed TLS handshake messages. This could allow an attacker with network access to the webserver to cause a denial of service resulting in the web server and the device to crash."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en RUGGEDCOM i800 (Todas las versiones), RUGGEDCOM i801 (Todas las versiones), RUGGEDCOM i802 (Todas las versiones), RUGGEDCOM i803 (Todas las versiones), RUGGEDCOM M2100 (Todas las versiones), RUGGEDCOM M2200 (Todas las versiones), RUGGEDCOM M969 (Todas las versiones), RUGGEDCOM RMC30 (Todas las versiones), RUGGEDCOM RMC8388 V4.X (Todas las versiones), RUGGEDCOM RMC8388 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RP110 (Todas las versiones), RUGGEDCOM RS1600 (Todas las versiones), RUGGEDCOM RS1600F (Todas las versiones), RUGGEDCOM RS1600T (Todas las versiones), RUGGEDCOM RS400 (Todas las versiones), RUGGEDCOM RS401 (Todas las versiones), RUGGEDCOM RS416 (Todas las versiones), RUGGEDCOM RS416P (Todas las versiones), RUGGEDCOM RS416Pv2 V4.X (Todas las versiones), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS416v2 V4.X (Todas las versiones), RUGGEDCOM RS416v2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS8000 (Todas las versiones), RUGGEDCOM RS8000A (Todas las versiones), RUGGEDCOM RS8000H (Todas las versiones), RUGGEDCOM RS8000T (Todas las versiones), RUGGEDCOM RS900 (Todas las versiones), RUGGEDCOM RS900 (32M) V4.X (Todas las versiones), RUGGEDCOM RS900 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900G (Todas las versiones), RUGGEDCOM RS900G (32M) V4.X (Todas las versiones), RUGGEDCOM RS900G (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900GP (Todas las versiones), RUGGEDCOM RS900L (Todas las versiones), RUGGEDCOM RS900M-GETS-C01 (Todas las versiones), RUGGEDCOM RS900M-GETS-XX (Todas las versiones), RUGGEDCOM RS900M-STND-C01 (Todas las versiones), RUGGEDCOM RS900M-STND-XX (Todas las versiones), RUGGEDCOM RS900W (Todas las versiones), RUGGEDCOM RS910 (Todas las versiones), RUGGEDCOM RS910L (Todas las versiones), RUGGEDCOM RS910W (Todas las versiones), RUGGEDCOM RS920L (Todas las versiones), RUGGEDCOM RS920W (Todas las versiones), RUGGEDCOM RS930L (Todas las versiones), RUGGEDCOM RS930W (Todas las versiones), RUGGEDCOM RS940G (Todas las versiones), RUGGEDCOM RS969 (Todas las versiones), RUGGEDCOM RSG2100 (Todas las versiones), RUGGEDCOM RSG2100 (32M) V4.X (Todas las versiones), RUGGEDCOM RSG2100 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2100P (Todas las versiones), RUGGEDCOM RSG2100P (32M) V4.X (Todas las versiones), RUGGEDCOM RSG2100P (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2200 (Todas las versiones), RUGGEDCOM RSG2288 V4.X (Todas las versiones versiones), RUGGEDCOM RSG2288 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300 V4.X (Todas las versiones), RUGGEDCOM RSG2300 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300P V4.X (Todas las versiones), RUGGEDCOM RSG2300P V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2488 V4.X (Todas las versiones), RUGGEDCOM RSG2488 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG907R (Todas las versiones < V5.10.0), RUGGEDCOM RSG908C (Todas las versiones < V5.10.0), RUGGEDCOM RSG909R (Todas las versiones < V5.10.0), RUGGEDCOM RSG910C (Todas las versiones < V5.10.0), RUGGEDCOM RSG920P V4.X (Todas las versiones), RUGGEDCOM RSG920P V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSL910 (Todas las versiones < V5.10.0), RUGGEDCOM RST2228 (Todas las versiones < V5.10.0), RUGGEDCOM RST2228P (Todas las versiones < V5.10.0), RUGGEDCOM RST916C (Todas las versiones < V5.10.0), RUGGEDCOM RST916P (Todas las versiones < V5.10.0). Los dispositivos afectados no gestionan correctamente los mensajes de protocolo de enlace TLS mal formados. Esto podr\u00eda permitir que un atacante con acceso de red al servidor web provoque una denegaci\u00f3n de servicio que provoque el bloqueo del servidor web y del dispositivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-412xx/CVE-2025-41223.json b/CVE-2025/CVE-2025-412xx/CVE-2025-41223.json
index c1e26f04538..29d0df6999f 100644
--- a/CVE-2025/CVE-2025-412xx/CVE-2025-41223.json
+++ b/CVE-2025/CVE-2025-412xx/CVE-2025-41223.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41223",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:31.327",
- "lastModified": "2025-07-08T11:15:31.327",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected devices support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which uses CBC (Cipher Block Chaining) mode that is known to be vulnerable to timing attacks. This could allow an attacker to compromise the integrity and confidentiality of encrypted communications."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en RUGGEDCOM i800 (Todas las versiones), RUGGEDCOM i801 (Todas las versiones), RUGGEDCOM i802 (Todas las versiones), RUGGEDCOM i803 (Todas las versiones), RUGGEDCOM M2100 (Todas las versiones), RUGGEDCOM M2200 (Todas las versiones), RUGGEDCOM M969 (Todas las versiones), RUGGEDCOM RMC30 (Todas las versiones), RUGGEDCOM RMC8388 V4.X (Todas las versiones), RUGGEDCOM RMC8388 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RP110 (Todas las versiones), RUGGEDCOM RS1600 (Todas las versiones), RUGGEDCOM RS1600F (Todas las versiones), RUGGEDCOM RS1600T (Todas las versiones), RUGGEDCOM RS400 (Todas las versiones), RUGGEDCOM RS401 (Todas las versiones), RUGGEDCOM RS416 (Todas las versiones), RUGGEDCOM RS416P (Todas las versiones), RUGGEDCOM RS416Pv2 V4.X (Todas las versiones), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS416v2 V4.X (Todas las versiones), RUGGEDCOM RS416v2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS8000 (Todas las versiones), RUGGEDCOM RS8000A (Todas las versiones), RUGGEDCOM RS8000H (Todas las versiones), RUGGEDCOM RS8000T (Todas las versiones), RUGGEDCOM RS900 (Todas las versiones), RUGGEDCOM RS900 (32M) V4.X (Todas las versiones), RUGGEDCOM RS900 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900G (Todas las versiones), RUGGEDCOM RS900G (32M) V4.X (Todas las versiones), RUGGEDCOM RS900G (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900GP (Todas las versiones), RUGGEDCOM RS900L (Todas las versiones), RUGGEDCOM RS900M-GETS-C01 (Todas las versiones), RUGGEDCOM RS900M-GETS-XX (Todas las versiones), RUGGEDCOM RS900M-STND-C01 (Todas las versiones), RUGGEDCOM RS900M-STND-XX (Todas las versiones), RUGGEDCOM RS900W (Todas las versiones), RUGGEDCOM RS910 (Todas las versiones), RUGGEDCOM RS910L (Todas las versiones), RUGGEDCOM RS910W (Todas las versiones), RUGGEDCOM RS920L (Todas las versiones), RUGGEDCOM RS920W (Todas las versiones), RUGGEDCOM RS930L (Todas las versiones), RUGGEDCOM RS930W (Todas las versiones), RUGGEDCOM RS940G (Todas las versiones), RUGGEDCOM RS969 (Todas las versiones), RUGGEDCOM RSG2100 (Todas las versiones), RUGGEDCOM RSG2100 (32M) V4.X (Todas las versiones), RUGGEDCOM RSG2100 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2100P (Todas las versiones), RUGGEDCOM RSG2100P (32M) V4.X (Todas las versiones), RUGGEDCOM RSG2100P (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2200 (Todas las versiones), RUGGEDCOM RSG2288 V4.X (Todas las versiones versiones), RUGGEDCOM RSG2288 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300 V4.X (Todas las versiones), RUGGEDCOM RSG2300 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300P V4.X (Todas las versiones), RUGGEDCOM RSG2300P V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2488 V4.X (Todas las versiones), RUGGEDCOM RSG2488 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG907R (Todas las versiones < V5.10.0), RUGGEDCOM RSG908C (Todas las versiones < V5.10.0), RUGGEDCOM RSG909R (Todas las versiones < V5.10.0), RUGGEDCOM RSG910C (todas las versiones < V5.10.0), RUGGEDCOM RSG920P V4.X (todas las versiones), RUGGEDCOM RSG920P V5.X (todas las versiones < V5.10.0), RUGGEDCOM RSL910 (todas las versiones < V5.10.0), RUGGEDCOM RST2228 (todas las versiones < V5.10.0), RUGGEDCOM RST2228P (todas las versiones < V5.10.0), RUGGEDCOM RST916C (todas las versiones < V5.10.0), RUGGEDCOM RST916P (todas las versiones < V5.10.0). Los dispositivos afectados son compatibles con el conjunto de cifrado TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, que utiliza el modo CBC (Cipher Block Chaining), vulnerable a ataques de sincronizaci\u00f3n. Esto podr\u00eda permitir a un atacante comprometer la integridad y confidencialidad de las comunicaciones cifradas."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-412xx/CVE-2025-41224.json b/CVE-2025/CVE-2025-412xx/CVE-2025-41224.json
index 9f20c14b4bf..043afe63269 100644
--- a/CVE-2025/CVE-2025-412xx/CVE-2025-41224.json
+++ b/CVE-2025/CVE-2025-412xx/CVE-2025-41224.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41224",
"sourceIdentifier": "productcert@siemens.com",
"published": "2025-07-08T11:15:31.527",
- "lastModified": "2025-07-08T11:15:31.527",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RSL910NC (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una vulnerabilidad en RUGGEDCOM RMC8388 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RMC8388NC V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS416NCv2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS416v2 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900G (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2288 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2288NC V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300NC V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300P V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2300PNC V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2488 V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG2488NC V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG907R (Todas las versiones < V5.10.0), RUGGEDCOM RSG908C (Todas las versiones < V5.10.0), RUGGEDCOM RSG909R (Todas las versiones < V5.10.0), RUGGEDCOM RSG910C (Todas las versiones < V5.10.0), RUGGEDCOM RSG920P V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSG920PNC V5.X (Todas las versiones < V5.10.0), RUGGEDCOM RSL910 (Todas las versiones < V5.10.0), RUGGEDCOM RSL910NC (Todas las versiones < V5.10.0), RUGGEDCOM RST2228 (Todas las versiones < V5.10.0), RUGGEDCOM RST2228P (Todas las versiones < V5.10.0), RUGGEDCOM RST916C (Todas las versiones < V5.10.0), RUGGEDCOM RST916P (Todas las versiones < V5.10.0). Los productos afectados no aplican correctamente las restricciones de acceso a la interfaz al cambiar de una configuraci\u00f3n de interfaz de administraci\u00f3n a una de no administraci\u00f3n hasta que se reinicia el sistema, a pesar de que la configuraci\u00f3n se haya guardado. Esto podr\u00eda permitir que un atacante con acceso a la red y credenciales acceda al dispositivo a trav\u00e9s de una configuraci\u00f3n de no administraci\u00f3n y mantenga el acceso SSH hasta el reinicio."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41665.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41665.json
index eca9b773334..43e0d103323 100644
--- a/CVE-2025/CVE-2025-416xx/CVE-2025-41665.json
+++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41665.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41665",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:25.457",
- "lastModified": "2025-07-08T07:15:25.457",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto con pocos privilegios puede obligar al sistema de vigilancia de los dispositivos afectados a reiniciar el PLC debido a permisos predeterminados incorrectos de un archivo de configuraci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41666.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41666.json
index 7c7195f28e7..5a216d2ec87 100644
--- a/CVE-2025/CVE-2025-416xx/CVE-2025-41666.json
+++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41666.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41666",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:25.630",
- "lastModified": "2025-07-08T07:15:25.630",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto con pocos privilegios y acceso a archivos puede reemplazar un archivo cr\u00edtico utilizado por el organismo de control para obtener acceso de lectura, escritura y ejecuci\u00f3n a cualquier archivo en el dispositivo despu\u00e9s de que se haya inicializado el organismo de control."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41667.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41667.json
index e2c89ec5e11..7a37ddba5ee 100644
--- a/CVE-2025/CVE-2025-416xx/CVE-2025-41667.json
+++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41667.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41667",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:25.813",
- "lastModified": "2025-07-08T07:15:25.813",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A low privileged remote attacker with file access can replace a critical file used by the arp-preinit script to get read, write and execute access to any file on the device."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto con pocos privilegios y acceso a archivos puede reemplazar un archivo cr\u00edtico utilizado por el script arp-preinit para obtener acceso de lectura, escritura y ejecuci\u00f3n a cualquier archivo en el dispositivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41668.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41668.json
index c779564bb43..ddbeb1a2e28 100644
--- a/CVE-2025/CVE-2025-416xx/CVE-2025-41668.json
+++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41668.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41668",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-08T07:15:25.987",
- "lastModified": "2025-07-08T07:15:25.987",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A low privileged remote attacker with file access can replace a critical file or folder used by the service security-profile to get read, write and execute access to any file on the device."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto con pocos privilegios y acceso a archivos puede reemplazar un archivo o carpeta cr\u00edtico utilizado por el perfil de seguridad del servicio para obtener acceso de lectura, escritura y ejecuci\u00f3n a cualquier archivo en el dispositivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-416xx/CVE-2025-41672.json b/CVE-2025/CVE-2025-416xx/CVE-2025-41672.json
index 36cb86bbbb6..687ad5bd50e 100644
--- a/CVE-2025/CVE-2025-416xx/CVE-2025-41672.json
+++ b/CVE-2025/CVE-2025-416xx/CVE-2025-41672.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-41672",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-07-07T07:15:23.973",
- "lastModified": "2025-07-07T07:15:23.973",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante remoto no autenticado puede usar certificados predeterminados para generar tokens JWT y obtener acceso completo a la herramienta y a todos los dispositivos conectados."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42952.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42952.json
index 986ff950621..2bd8699de13 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42952.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42952.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42952",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:22.000",
- "lastModified": "2025-07-08T01:15:22.000",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Business Warehouse and SAP Plug-In Basis allows an authenticated attacker to add fields to arbitrary SAP database tables and/or structures, potentially rendering the system unusable. On successful exploitation, an attacker can render the system unusable by triggering short dumps on login. This could cause a high impact on availability. Data confidentiality and integrity are not affected. No data can be read, changed or deleted."
+ },
+ {
+ "lang": "es",
+ "value": "SAP Business Warehouse y SAP Plug-In Basis permiten a un atacante autenticado a\u00f1adir campos a tablas o estructuras arbitrarias de bases de datos SAP, lo que podr\u00eda inutilizar el sistema. Si se explota con \u00e9xito, un atacante puede inutilizar el sistema activando breves volcados de datos al iniciar sesi\u00f3n. Esto podr\u00eda afectar gravemente la disponibilidad. La confidencialidad e integridad de los datos no se ven afectadas. No se pueden leer, modificar ni eliminar datos."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42953.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42953.json
index cb988187da3..9f4c6927e48 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42953.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42953.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42953",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:22.163",
- "lastModified": "2025-07-08T01:15:22.163",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system."
+ },
+ {
+ "lang": "es",
+ "value": "SAP Netweaver System Configuration no realiza las comprobaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Esto podr\u00eda comprometer completamente la integridad y la disponibilidad, sin afectar la confidencialidad del sistema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42954.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42954.json
index 1915c37f65c..6a1248d478a 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42954.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42954.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42954",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:22.317",
- "lastModified": "2025-07-08T01:15:22.317",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Business Warehouse CCAW application allows a privileged attacker to cause a high CPU load by executing a RFC enabled function modules without any input parameters, which results in reduced performance or interrupted operation of the affected resource. This leads to low impact on availability of the application, there is no impact on confidentiality and integrity."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n SAP NetWeaver Business Warehouse CCAW permite a un atacante con privilegios sobrecargar la CPU al ejecutar m\u00f3dulos de funci\u00f3n habilitados por RFC sin par\u00e1metros de entrada, lo que reduce el rendimiento o interrumpe el funcionamiento del recurso afectado. Esto reduce la disponibilidad de la aplicaci\u00f3n y no afecta la confidencialidad ni la integridad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42956.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42956.json
index 853134a36d5..1165cce6300 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42956.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42956.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42956",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T07:15:26.167",
- "lastModified": "2025-07-08T07:15:26.167",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform allows an unauthenticated attacker to create a malicious link which they can make publicly available. When an authenticated victim clicks on this malicious link, injected input data will be used by the web site page generation to create content which when executed in the victim's browser leading to low impact on Confidentiality and Integrity with no effect on Availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "SAP NetWeaver Application Server ABAP y ABAP Platform permiten a un atacante no autenticado crear un enlace malicioso que puede publicar. Cuando una v\u00edctima autenticada hace clic en este enlace malicioso, el sistema de generaci\u00f3n de p\u00e1ginas web utiliza los datos de entrada inyectados para crear contenido que, al ejecutarse en el navegador de la v\u00edctima, tiene un impacto m\u00ednimo en la confidencialidad e integridad, sin afectar la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42959.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42959.json
index 201bbd29013..a748ea61f93 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42959.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42959.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42959",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:22.477",
- "lastModified": "2025-07-08T01:15:22.477",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability."
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante no autenticado podr\u00eda explotar una situaci\u00f3n en la que una credencial de C\u00f3digo de Autenticaci\u00f3n de Mensajes Hash (HMAC), extra\u00edda de un sistema sin parches de seguridad espec\u00edficos, se reutiliza en un ataque de repetici\u00f3n contra otro sistema. Incluso si el sistema objetivo cuenta con todos los parches instalados, una explotaci\u00f3n exitosa podr\u00eda comprometer completamente el sistema, afectando la confidencialidad, la integridad y la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42960.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42960.json
index e056a2b77b7..0a1471f5ae0 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42960.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42960.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42960",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:22.633",
- "lastModified": "2025-07-08T01:15:22.633",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Business Warehouse and SAP BW/4HANA BEx Tools allow an authenticated attacker to gain higher access levels than intended by exploiting improper authorization checks. This could potentially impact data integrity by allowing deletion of user table entries.\ufffdIt has no impact on the confidentiality and availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "SAP Business Warehouse y SAP BW/4HANA BEx Tools permiten a un atacante autenticado obtener niveles de acceso superiores a los previstos al explotar comprobaciones de autorizaci\u00f3n incorrectas. Esto podr\u00eda afectar la integridad de los datos al permitir la eliminaci\u00f3n de entradas de la tabla de usuarios. No afecta la confidencialidad ni la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42961.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42961.json
index d26e251671f..b995aa6a472 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42961.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42961.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42961",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:22.783",
- "lastModified": "2025-07-08T01:15:22.783",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to a missing authorization check in SAP NetWeaver Application server for ABAP, an authenticated user with high privileges could exploit the insufficient validation of user permissions to access sensitive database tables. By leveraging overly permissive access configurations, unauthorized reading of critical data is possible, resulting in a significant impact on the confidentiality of the information stored. However, the integrity and availability of the system remain unaffected."
+ },
+ {
+ "lang": "es",
+ "value": "Debido a la falta de una comprobaci\u00f3n de autorizaci\u00f3n en SAP NetWeaver Application server for ABAP, un usuario autenticado con privilegios elevados podr\u00eda aprovechar la validaci\u00f3n insuficiente de los permisos de usuario para acceder a tablas sensibles de la base de datos. Al utilizar configuraciones de acceso excesivamente permisivas, es posible la lectura no autorizada de datos cr\u00edticos, lo que afecta significativamente la confidencialidad de la informaci\u00f3n almacenada. Sin embargo, la integridad y la disponibilidad del sistema no se ven afectadas."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42962.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42962.json
index 605c27ceec8..357844c06a4 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42962.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42962.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42962",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:22.937",
- "lastModified": "2025-07-08T01:15:22.937",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Business Warehouse (Business Explorer Web) allows an attacker to create a malicious link. If an authenticated user clicks on this link, the injected script gets executed within the scope of victim\ufffds browser. This potentially leads to an impact on confidentiality and integrity. Availability is not impacted."
+ },
+ {
+ "lang": "es",
+ "value": "SAP Business Warehouse (Business Explorer Web) permite a un atacante crear un enlace malicioso. Si un usuario autenticado hace clic en este enlace, el script inyectado se ejecuta en el navegador de la v\u00edctima. Esto podr\u00eda afectar la confidencialidad y la integridad. La disponibilidad no se ve afectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42963.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42963.json
index 8f9d8f12436..554781d82e8 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42963.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42963.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42963",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:23.093",
- "lastModified": "2025-07-08T01:15:23.093",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad cr\u00edtica en SAP NetWeaver Application server for Java Log Viewer permite a los usuarios administradores autenticados explotar la deserializaci\u00f3n insegura de objetos Java. Una explotaci\u00f3n exitosa puede comprometer completamente el sistema operativo, otorgando a los atacantes control total sobre el sistema afectado. Esto afecta gravemente la confidencialidad, la integridad y la disponibilidad de la aplicaci\u00f3n y el entorno del host."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42964.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42964.json
index 9541ed88990..9d2eacfa640 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42964.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42964.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42964",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:23.240",
- "lastModified": "2025-07-08T01:15:23.240",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system."
+ },
+ {
+ "lang": "es",
+ "value": "SAP NetWeaver Enterprise Portal Administration es vulnerable cuando un usuario privilegiado puede cargar contenido malicioso o no confiable que, al deserializarse, podr\u00eda potencialmente comprometer la confidencialidad, integridad y disponibilidad del sistema host."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42965.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42965.json
index 902bffb3e86..0ac229567e0 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42965.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42965.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42965",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:23.440",
- "lastModified": "2025-07-08T01:15:23.440",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP CMC Promotion Management allows an authenticated attacker to enumerate internal network systems by submitting crafted requests during job source configuration. By analysing response times for various IP addresses and ports, the attacker can infer valid network endpoints. Successful exploitation may lead to information disclosure. This vulnerability does not impact the integrity or availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "SAP CMC Promotion Management permite a un atacante autenticado enumerar sistemas de red internos mediante el env\u00edo de solicitudes manipuladas durante la configuraci\u00f3n del origen del trabajo. Al analizar los tiempos de respuesta de diversas direcciones IP y puertos, el atacante puede inferir endpoints de red v\u00e1lidos. Una explotaci\u00f3n exitosa puede conllevar la divulgaci\u00f3n de informaci\u00f3n. Esta vulnerabilidad no afecta la integridad ni la disponibilidad de la aplicaci\u00f3n. "
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42966.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42966.json
index e5690bf5623..d53517e47eb 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42966.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42966.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42966",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:23.630",
- "lastModified": "2025-07-08T01:15:23.630",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "SAP NetWeaver XML Data Archiving Service permite a un atacante autenticado con privilegios administrativos explotar una vulnerabilidad de deserializaci\u00f3n de Java insegura mediante el env\u00edo de un objeto Java serializado especialmente manipulado. Esto podr\u00eda afectar gravemente la confidencialidad, la integridad y la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42967.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42967.json
index 91263728c7b..25320fa9a52 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42967.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42967.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-42967",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:23.787",
- "lastModified": "2025-07-08T10:15:22.040",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42968.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42968.json
index 4922f026046..8d690ddc9d8 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42968.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42968.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42968",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:23.950",
- "lastModified": "2025-07-08T01:15:23.950",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver allows an authenticated non-administrative user to call the remote-enabled function module which could grants access to non-sensitive information about the SAP system and OS without requiring any specific knowledge or controlled conditions. This leads to a low impact on confidentiality with no effect on integrity or availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "SAP NetWeaver permite que un usuario no administrativo autenticado acceda al m\u00f3dulo de funci\u00f3n remota, lo que le otorga acceso a informaci\u00f3n no confidencial sobre el sistema SAP y el sistema operativo sin necesidad de conocimientos espec\u00edficos ni condiciones controladas. Esto reduce el impacto en la confidencialidad y no afecta la integridad ni la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42969.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42969.json
index 8622a8d81a9..1ced39dcc8a 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42969.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42969.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42969",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:24.120",
- "lastModified": "2025-07-08T01:15:24.120",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform allows an unauthenticated attacker to inject a malicious script into a dynamically crafted URL. The victim, when tricked into clicking on this crafted URL unknowingly executes the malicious payload in their browser. On successful exploitation, the attacker can access or modify sensitive information within the scope of victim's web browser, with no impact on availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "SAP NetWeaver Application Server ABAP y ABAP Platform permiten a un atacante no autenticado inyectar un script malicioso en una URL manipulada din\u00e1micamente. La v\u00edctima, al ser enga\u00f1ada para que haga clic en esta URL, ejecuta sin saberlo el payload malicioso en su navegador. Si la explotaci\u00f3n tiene \u00e9xito, el atacante puede acceder o modificar informaci\u00f3n confidencial dentro del alcance del navegador web de la v\u00edctima, sin afectar la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42970.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42970.json
index dfbeb52a517..7b390701870 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42970.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42970.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42970",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:24.290",
- "lastModified": "2025-07-08T01:15:24.290",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAPCAR improperly sanitizes the file paths while extracting SAPCAR archives. Due to this, an attacker could craft a malicious SAPCAR archive containing directory traversal sequences. When a high privileged victim extracts this malicious archive, it is then processed by SAPCAR on their system, causing files to be extracted outside the intended directory and overwriting files in arbitrary locations. This vulnerability has a high impact on the integrity and availability of the application with no impact on confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "SAPCAR depura incorrectamente las rutas de archivo al extraer archivos SAPCAR. Debido a esto, un atacante podr\u00eda manipular un archivo SAPCAR malicioso que contenga secuencias de Directory Traversal. Cuando una v\u00edctima con privilegios elevados extrae este archivo malicioso, SAPCAR lo procesa en su sistema, lo que provoca la extracci\u00f3n de archivos fuera del directorio previsto y la sobrescritura de archivos en ubicaciones arbitrarias. Esta vulnerabilidad tiene un alto impacto en la integridad y disponibilidad de la aplicaci\u00f3n, sin afectar la confidencialidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42971.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42971.json
index 222c37187e6..99a30277ae4 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42971.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42971.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42971",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:24.463",
- "lastModified": "2025-07-08T01:15:24.463",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory corruption vulnerability exists in SAPCAR allowing an attacker to craft malicious SAPCAR archives. When a high privileged victim extracts this malicious archive, it gets processed by SAPCAR on their system, resulting in out-of-bounds memory read and write. This could lead to file extraction and file overwrite outside the intended directories. This vulnerability has low impact on the confidentiality, integrity and availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de corrupci\u00f3n de memoria en SAPCAR que permite a un atacante manipular archivos maliciosos. Cuando una v\u00edctima con privilegios elevados extrae este archivo malicioso, SAPCAR lo procesa en su sistema, lo que provoca lecturas y escrituras de memoria fuera de los l\u00edmites permitidos. Esto podr\u00eda provocar la extracci\u00f3n y sobrescritura de archivos fuera de los directorios previstos. Esta vulnerabilidad tiene un impacto bajo en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42973.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42973.json
index 07780f28b4f..57a08d7efe2 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42973.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42973.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42973",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:24.623",
- "lastModified": "2025-07-08T01:15:24.623",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to a Cross-Site Scripting vulnerability in SAP Data Services Management Console, an authenticated attacker could exploit the search functionality associated with DQ job status reports. By intercepting requests, malicious script can be injected and subsequently executed when a user loads the affected page. This results in a limited impact on the confidentiality and integrity of user session information, while availability remains unaffected."
+ },
+ {
+ "lang": "es",
+ "value": "Debido a una vulnerabilidad de Cross-Site Scripting en SAP Data Services Management Console, un atacante autenticado podr\u00eda explotar la funcionalidad de b\u00fasqueda asociada a los informes de estado de los trabajos de DQ. Al interceptar las solicitudes, se puede inyectar un script malicioso y ejecutarlo cuando un usuario carga la p\u00e1gina afectada. Esto tiene un impacto limitado en la confidencialidad e integridad de la informaci\u00f3n de la sesi\u00f3n del usuario, sin afectar la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42974.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42974.json
index 45fbec38ba3..0334545e3fb 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42974.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42974.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42974",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:24.773",
- "lastModified": "2025-07-08T01:15:24.773",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to missing authorization check, an attacker authenticated as a non-administrative user could call a remote-enabled function module. This could enable access to information normally restricted, resulting in low impact on confidentiality. There is no impact on integrity or availability."
+ },
+ {
+ "lang": "es",
+ "value": "Debido a la falta de verificaci\u00f3n de autorizaci\u00f3n, un atacante autenticado como usuario no administrativo podr\u00eda invocar un m\u00f3dulo de funci\u00f3n habilitado remotamente. Esto podr\u00eda permitir el acceso a informaci\u00f3n normalmente restringida, con un impacto m\u00ednimo en la confidencialidad. No hay impacto en la integridad ni la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42978.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42978.json
index c75a2363737..df4801f8ecb 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42978.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42978.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42978",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:24.930",
- "lastModified": "2025-07-08T01:15:24.930",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The widely used component that establishes outbound TLS connections in SAP NetWeaver Application Server Java does not reliably match the hostname that is used for the connection against the wildcard hostname defined in the received certificate of remote TLS server. This might lead to the outbound connection being established to a possibly malicious remote TLS server and hence disclose information. Integrity and Availability are not impacted."
+ },
+ {
+ "lang": "es",
+ "value": "El componente ampliamente utilizado que establece conexiones TLS salientes en SAP NetWeaver Application Server Java no coincide de forma fiable el nombre de host utilizado para la conexi\u00f3n con el nombre de host comod\u00edn definido en el certificado recibido del servidor TLS remoto. Esto podr\u00eda provocar que la conexi\u00f3n saliente se establezca con un servidor TLS remoto posiblemente malicioso y, por lo tanto, la divulgaci\u00f3n de informaci\u00f3n. La integridad y la disponibilidad no se ven afectadas."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42979.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42979.json
index 26d95c4c3ba..ae21076e872 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42979.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42979.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42979",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:25.107",
- "lastModified": "2025-07-08T01:15:25.107",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GuiXT application, which is integrated with SAP GUI for Windows, uses obfuscation algorithms instead of secure symmetric ciphers for storing the credentials of an RFC user on the client PC. This leads to a high impact on confidentiality because any attacker who gains access to the user hive of this user\ufffds windows registry could recreate the original password. There is no impact on integrity or availability of the application"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n GuiXT, integrada con SAP GUI para Windows, utiliza algoritmos de ofuscaci\u00f3n en lugar de cifrados sim\u00e9tricos seguros para almacenar las credenciales de un usuario RFC en el equipo cliente. Esto afecta gravemente la confidencialidad, ya que cualquier atacante que acceda al sub\u00e1rbol del registro de Windows de este usuario podr\u00eda recrear la contrase\u00f1a original. No se ve afectada la integridad ni la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42980.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42980.json
index 37319d526e7..fc7cadd9a9d 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42980.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42980.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42980",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:25.270",
- "lastModified": "2025-07-08T01:15:25.270",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system."
+ },
+ {
+ "lang": "es",
+ "value": "SAP NetWeaver Enterprise Portal Federated Portal Network es vulnerable cuando un usuario privilegiado puede cargar contenido malicioso o no confiable que, al deserializarse, podr\u00eda potencialmente comprometer la confidencialidad, integridad y disponibilidad del sistema host."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42981.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42981.json
index 49e850a0ca8..6f17a526545 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42981.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42981.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42981",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:25.427",
- "lastModified": "2025-07-08T01:15:25.427",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to an open redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated attacker could craft a URL link embedding a malicious script at a location not properly sanitized. When a victim clicks on this link, the script executes within the victim's browser, redirecting them to a site controlled by the attacker. This allows the attacker to access and/or modify restricted information related to the web client. While the vulnerability poses no impact on data availability, it presents a considerable risk to confidentiality and integrity."
+ },
+ {
+ "lang": "es",
+ "value": "Debido a una vulnerabilidad de redirecci\u00f3n abierta en SAP NetWeaver Application Server ABAP, un atacante no autenticado podr\u00eda manipular un enlace URL que incruste un script malicioso en una ubicaci\u00f3n no depura correctamente. Cuando una v\u00edctima hace clic en este enlace, el script se ejecuta en su navegador, redirigi\u00e9ndola a un sitio web controlado por el atacante. Esto le permite acceder o modificar informaci\u00f3n restringida del cliente web. Si bien la vulnerabilidad no afecta la disponibilidad de los datos, s\u00ed representa un riesgo considerable para la confidencialidad e integridad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42985.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42985.json
index 23073028b11..09d6ac6b6d9 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42985.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42985.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42985",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:25.577",
- "lastModified": "2025-07-08T01:15:25.577",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to insufficient sanitization in the SAP BusinessObjects Content Administrator Workbench, attackers could craft malicious URLs and execute scripts in a victim\ufffds browser. This could potentially lead to the exposure or modification of web client data, resulting in low impact on confidentiality and integrity, with no impact on application availability."
+ },
+ {
+ "lang": "es",
+ "value": "Debido a la desinfecci\u00f3n insuficiente de SAP BusinessObjects Content Administrator Workbench, los atacantes podr\u00edan manipular URL maliciosas y ejecutar scripts en el navegador de la v\u00edctima. Esto podr\u00eda provocar la exposici\u00f3n o modificaci\u00f3n de los datos del cliente web, con un impacto m\u00ednimo en la confidencialidad e integridad, sin afectar la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42986.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42986.json
index 31fa582e53a..55ffd6ae185 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42986.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42986.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42986",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:25.730",
- "lastModified": "2025-07-08T01:15:25.730",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to a missing authorization check in an obsolete RFC enabled function module in SAP BASIS, an authenticated low-privileged attacker could call a Remote Function Call (RFC), potentially accessing restricted system information. This results in low impact on confidentiality, with no impact on integrity or availability of the application."
+ },
+ {
+ "lang": "es",
+ "value": "Debido a la falta de una verificaci\u00f3n de autorizaci\u00f3n en un m\u00f3dulo de funci\u00f3n obsoleto habilitado para RFC en SAP BASIS, un atacante autenticado con pocos privilegios podr\u00eda ejecutar una Llamada a Funci\u00f3n Remota (RFC), lo que podr\u00eda permitir el acceso a informaci\u00f3n restringida del sistema. Esto genera un impacto m\u00ednimo en la confidencialidad, sin afectar la integridad ni la disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42992.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42992.json
index cd58b3dc3e1..8f00e09111a 100644
--- a/CVE-2025/CVE-2025-429xx/CVE-2025-42992.json
+++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42992.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-42992",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:25.887",
- "lastModified": "2025-07-08T01:15:25.887",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system."
+ },
+ {
+ "lang": "es",
+ "value": "SAPCAR permite a un atacante con acceso a SAPCAR con privilegios elevados crear un archivo SAR malicioso. Esto podr\u00eda permitirle explotar archivos cr\u00edticos y permisos de directorio sin violar la validaci\u00f3n de firmas, lo que podr\u00eda resultar en una escalada de privilegios. Esto tiene un alto impacto en la integridad, pero un bajo impacto en la confidencialidad y la disponibilidad del sistema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43001.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43001.json
index e1253e81540..0ea34c76eb1 100644
--- a/CVE-2025/CVE-2025-430xx/CVE-2025-43001.json
+++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43001.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-43001",
"sourceIdentifier": "cna@sap.com",
"published": "2025-07-08T01:15:26.047",
- "lastModified": "2025-07-08T01:15:26.047",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system."
+ },
+ {
+ "lang": "es",
+ "value": "SAPCAR permite a un atacante con privilegios elevados anular los permisos de los directorios actual y principal del usuario o proceso que extrae el archivo, lo que provoca una escalada de privilegios. Si se explota con \u00e9xito, un atacante podr\u00eda modificar los archivos cr\u00edticos manipulando los archivos firmados sin romper la firma, pero con un impacto m\u00ednimo en la confidencialidad y la disponibilidad del sistema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43019.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43019.json
new file mode 100644
index 00000000000..8a6c1667b48
--- /dev/null
+++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43019.json
@@ -0,0 +1,78 @@
+{
+ "id": "CVE-2025-43019",
+ "sourceIdentifier": "hp-security-alert@hp.com",
+ "published": "2025-07-08T16:15:57.763",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A potential security vulnerability has been identified in the HP Support Assistant, which allows a local attacker to escalate privileges via an arbitrary file deletion."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "hp-security-alert@hp.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 5.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "attackRequirements": "PRESENT",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "LOW",
+ "vulnIntegrityImpact": "LOW",
+ "vulnAvailabilityImpact": "HIGH",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "NOT_DEFINED",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "hp-security-alert@hp.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.hp.com/us-en/document/ish_12715930-12715980-16/hpsbgn04031",
+ "source": "hp-security-alert@hp.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43580.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43580.json
new file mode 100644
index 00000000000..cb7102744c9
--- /dev/null
+++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43580.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-43580",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:35.940",
+ "lastModified": "2025-07-08T17:15:35.940",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Audition versions 25.2, 24.6.3 and earlier are affected by an Access of Memory Location After End of Buffer vulnerability that could result in application denial-of-service. An attacker could leverage this vulnerability to crash the application or disrupt its functionality. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-788"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/audition/apsb25-56.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43587.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43587.json
new file mode 100644
index 00000000000..37ba4880d79
--- /dev/null
+++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43587.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-43587",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:36.137",
+ "lastModified": "2025-07-08T17:15:36.137",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "After Effects versions 25.2, 24.6.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-49.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-437xx/CVE-2025-43711.json b/CVE-2025/CVE-2025-437xx/CVE-2025-43711.json
index adc3ff80095..0d33c85aa71 100644
--- a/CVE-2025/CVE-2025-437xx/CVE-2025-43711.json
+++ b/CVE-2025/CVE-2025-437xx/CVE-2025-43711.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-43711",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T00:15:23.733",
- "lastModified": "2025-07-05T00:15:23.733",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tunnelblick 3.5beta06 before 7.0, when incompletely uninstalled, allows attackers to execute arbitrary code as root (upon the next boot) by dragging a crafted Tunnelblick.app file into /Applications."
+ },
+ {
+ "lang": "es",
+ "value": "Tunnelblick 3.5beta06 anterior a 7.0, cuando se desinstala de forma incompleta, permite a los atacantes ejecutar c\u00f3digo arbitrario como root (en el pr\u00f3ximo arranque) arrastrando un archivo Tunnelblick.app manipulada a /Aplicaciones."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43930.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43930.json
index b92349a3463..eaf59e4428a 100644
--- a/CVE-2025/CVE-2025-439xx/CVE-2025-43930.json
+++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43930.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-43930",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T15:15:26.733",
- "lastModified": "2025-07-07T15:15:26.733",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hashview 0.8.1 allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header."
+ },
+ {
+ "lang": "es",
+ "value": "Hashview 0.8.1 permite la toma de control de cuentas a trav\u00e9s de la funci\u00f3n de restablecimiento de contrase\u00f1a porque SERVER_NAME no est\u00e1 configurado y, por lo tanto, un restablecimiento depende del encabezado HTTP del Host."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43931.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43931.json
index b6e500a9c1d..ae7a45d6fdc 100644
--- a/CVE-2025/CVE-2025-439xx/CVE-2025-43931.json
+++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43931.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-43931",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:23.250",
- "lastModified": "2025-07-07T16:15:23.250",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "flask-boilerplate through a170e7c allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header."
+ },
+ {
+ "lang": "es",
+ "value": "flask-boilerplate a trav\u00e9s de a170e7c permite la toma de control de la cuenta a trav\u00e9s de la funci\u00f3n de restablecimiento de contrase\u00f1a porque SERVER_NAME no est\u00e1 configurado y, por lo tanto, un restablecimiento depende del encabezado HTTP del Host."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43932.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43932.json
index 3b6fe557a8d..7f4d7649033 100644
--- a/CVE-2025/CVE-2025-439xx/CVE-2025-43932.json
+++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43932.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-43932",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:23.380",
- "lastModified": "2025-07-07T16:15:23.380",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JobCenter through 7e7b0b2 allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header."
+ },
+ {
+ "lang": "es",
+ "value": "JobCenter a trav\u00e9s de 7e7b0b2 permite la toma de control de cuenta a trav\u00e9s de la funci\u00f3n de restablecimiento de contrase\u00f1a porque SERVER_NAME no est\u00e1 configurado y, por lo tanto, un restablecimiento depende del encabezado HTTP del Host."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43933.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43933.json
index c2a2c609780..949fd977ae8 100644
--- a/CVE-2025/CVE-2025-439xx/CVE-2025-43933.json
+++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43933.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-43933",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:23.513",
- "lastModified": "2025-07-07T16:15:23.513",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "fblog through 983bede allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header."
+ },
+ {
+ "lang": "es",
+ "value": "fblog a trav\u00e9s de 983bede permite la toma de control de la cuenta a trav\u00e9s de la funci\u00f3n de restablecimiento de contrase\u00f1a porque SERVER_NAME no est\u00e1 configurado y, por lo tanto, un restablecimiento depende del encabezado HTTP del Host."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-44xx/CVE-2025-4414.json b/CVE-2025/CVE-2025-44xx/CVE-2025-4414.json
index 11869cc92a0..532d9d1576d 100644
--- a/CVE-2025/CVE-2025-44xx/CVE-2025-4414.json
+++ b/CVE-2025/CVE-2025-44xx/CVE-2025-4414.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-4414",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:32.617",
- "lastModified": "2025-07-04T12:15:32.617",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in cmsmasters CMSMasters Content Composer allows PHP Local File Inclusion. This issue affects CMSMasters Content Composer: from n/a through n/a."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de control incorrecto del nombre de archivo para la instrucci\u00f3n Include/Require en programas PHP ('Inclusi\u00f3n remota de archivos en PHP') en cmsmasters CMSMasters Content Composer permite la inclusi\u00f3n local de archivos en PHP. Este problema afecta a CMSMasters Content Composer: de n/d a n/d."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45065.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45065.json
index f81275e1969..bfa75667d6f 100644
--- a/CVE-2025/CVE-2025-450xx/CVE-2025-45065.json
+++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45065.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-45065",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:23.650",
- "lastModified": "2025-07-07T16:15:23.650",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "employee record management system in php and mysql v1 was discovered to contain a SQL injection vulnerability via the loginerms.php endpoint."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que el sistema de gesti\u00f3n de registros de empleados en PHP y MySQL v1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del endpoint loginerms.php."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-454xx/CVE-2025-45479.json b/CVE-2025/CVE-2025-454xx/CVE-2025-45479.json
index 01fa2f12620..990623a334e 100644
--- a/CVE-2025/CVE-2025-454xx/CVE-2025-45479.json
+++ b/CVE-2025/CVE-2025-454xx/CVE-2025-45479.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-45479",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:23.780",
- "lastModified": "2025-07-07T16:15:23.780",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient security mechanisms for created containers in educoder challenges v1.0 allow attackers to execute arbitrary code via injecting crafted content into a container."
+ },
+ {
+ "lang": "es",
+ "value": "Los mecanismos de seguridad insuficientes para los contenedores creados en educoder challenges v1.0 y permiten a los atacantes ejecutar c\u00f3digo arbitrario mediante la inyecci\u00f3n de contenido manipulado en un contenedor."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45809.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45809.json
index 647f588854a..4c85295f1cf 100644
--- a/CVE-2025/CVE-2025-458xx/CVE-2025-45809.json
+++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45809.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-45809",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-03T19:15:24.027",
- "lastModified": "2025-07-03T19:15:24.027",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-459xx/CVE-2025-45938.json b/CVE-2025/CVE-2025-459xx/CVE-2025-45938.json
index b03194819b7..f1e9a17c5d5 100644
--- a/CVE-2025/CVE-2025-459xx/CVE-2025-45938.json
+++ b/CVE-2025/CVE-2025-459xx/CVE-2025-45938.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-45938",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-03T15:15:22.937",
- "lastModified": "2025-07-03T15:15:22.937",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4514.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4514.json
index c51a6d10b31..8c9fe43cc33 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4514.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4514.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4514",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-10T20:15:20.540",
- "lastModified": "2025-05-12T17:32:32.760",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:46:21.943",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -122,28 +142,74 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mayicms:mayicms:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "5.8e",
+ "matchCriteriaId": "D078A417-F301-4B3F-8B05-D7D20F6D03C2"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/Axianke/cve/issues/1",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.308234",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308234",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.564243",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/Axianke/cve/issues/1",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4515.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4515.json
index fbbc990e56c..25122f6ae1d 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4515.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4515.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4515",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-10T21:15:52.010",
- "lastModified": "2025-05-12T17:32:32.760",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:47:04.503",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
}
],
"cvssMetricV2": [
@@ -122,28 +142,80 @@
"value": "CWE-942"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-697"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pribai:privategpt:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "0.6.2",
+ "matchCriteriaId": "C7CE5FFB-FCCC-4FE0-8155-9673297E8C94"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://gist.github.com/superboy-zjc/2a727cb0c1d468f21a91e0416d006ffe",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.308235",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308235",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.564451",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://gist.github.com/superboy-zjc/2a727cb0c1d468f21a91e0416d006ffe",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4535.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4535.json
index 97e5ccfa56e..a5a5aabc857 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4535.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4535.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4535",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-11T08:15:20.510",
- "lastModified": "2025-05-12T17:32:32.760",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:57:59.043",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -124,26 +124,63 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gosuncntech:group_audio-visual_integrated_management:4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6AAE650-6992-4B1F-A578-A5385A84C8C1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://vuldb.com/?ctiid.308280",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308280",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.566424",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://wiki.shikangsi.com/post/share/d9f6cb0a-a673-472c-812c-7ba9545bfba8",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://wiki.shikangsi.com/post/share/d9f6cb0a-a673-472c-812c-7ba9545bfba8",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4536.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4536.json
index 2c996781c5f..1ccda6fa3cb 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4536.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4536.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4536",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-11T09:15:17.287",
- "lastModified": "2025-05-12T17:32:32.760",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:59:31.103",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -124,30 +124,71 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gosuncntech:group_audio-visual_integrated_management:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7EB46528-69BE-46D7-A1D9-42260F01A71A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://vuldb.com/?ctiid.308281",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308281",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.566425",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://wiki.shikangsi.com/post/share/ab0b0245-dc38-4b27-80e8-bc61de83692c",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?submit.566425",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://wiki.shikangsi.com/post/share/ab0b0245-dc38-4b27-80e8-bc61de83692c",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4537.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4537.json
index eca6d6c2c37..3ab0d94df02 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4537.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4537.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4537",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-11T10:15:16.207",
- "lastModified": "2025-05-12T17:32:32.760",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:01:24.163",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -122,28 +122,74 @@
"value": "CWE-315"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-312"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ruoyi:ruoyi-vue:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.8.9",
+ "matchCriteriaId": "660B752A-22E3-4B0C-A978-75A541A908EB"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://magnificent-dill-351.notion.site/Password-Disclosure-in-RuoYi-Vue-3-8-9-1e3c693918ed80ee9799f270c8346cd4",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.308282",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308282",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.566469",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://magnificent-dill-351.notion.site/Password-Disclosure-in-RuoYi-Vue-3-8-9-1e3c693918ed80ee9799f270c8346cd4",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4539.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4539.json
index ee663cd4fe4..ea5ad3e65b1 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4539.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4539.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4539",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-11T11:15:51.273",
- "lastModified": "2025-05-12T17:32:32.760",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:02:56.373",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -122,28 +122,73 @@
"value": "CWE-427"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-427"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:todesk:todesk:4.7.6.3:*:*:*:-:*:*:*",
+ "matchCriteriaId": "F617E54E-CF36-489D-8A35-8511D4F2D20F"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.308284",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308284",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.566698",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://www.yuque.com/ba1ma0-an29k/nnxoap/dgxzuhd90e19grpg?singleDoc",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required"
+ ]
},
{
"url": "https://www.yuque.com/ba1ma0-an29k/nnxoap/dgxzuhd90e19grpg?singleDoc#%20%E3%80%8Atodesk%20program%20has%20a%20privilege%20escalation%20vulnerability%E3%80%8B",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Permissions Required"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4540.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4540.json
index 7369f5dc866..72f4e673f06 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4540.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4540.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4540",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-11T16:15:50.147",
- "lastModified": "2025-05-23T18:15:36.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:04:11.077",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -122,28 +122,87 @@
"value": "CWE-428"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-428"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lodop:c-lodop:6.6.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3766BF4-98CA-48DD-B059-CBD3180E1002"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://0nightsedge0.github.io/2025/05/14/CVE-2025-4540-C-Lodop/",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.308285",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308285",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.566789",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.566789",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4542.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4542.json
index 18b8abf1a76..bb08ab170da 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4542.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4542.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4542",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-11T18:15:31.327",
- "lastModified": "2025-05-12T17:32:32.760",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:07:04.910",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
+ "baseScore": 4.2,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 2.5
}
],
"cvssMetricV2": [
@@ -122,28 +142,76 @@
"value": "CWE-942"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:freeebird:hotel:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.2",
+ "matchCriteriaId": "C8E0C2BE-455B-4BA1-BC2E-8079FE606397"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250429-01.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.308288",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308288",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.567214",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250429-01.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4546.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4546.json
index 1ac6a92e143..7ed4689ac98 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4546.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4546.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4546",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-11T20:15:18.107",
- "lastModified": "2025-05-12T19:15:52.150",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T17:08:09.853",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -122,28 +142,83 @@
"value": "CWE-1236"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1236"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:maxkb:maxkb:*:*:*:*:-:*:*:*",
+ "versionEndIncluding": "1.9.1",
+ "matchCriteriaId": "617C992A-C04D-407B-BE62-C94A1BD45109"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:maxkb:maxkb:*:*:*:*:lts:*:*:*",
+ "versionStartIncluding": "1.10.0",
+ "versionEndIncluding": "1.10.7",
+ "matchCriteriaId": "1DA1BBED-613E-44AF-906E-843E0A4C0A65"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/MaxKB/MaxKB-poc1.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.308293",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.308293",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.566517",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/yaowenxiao721/Poc/blob/main/MaxKB/MaxKB-poc1.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4573.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4573.json
index 21999aa432e..6b84160c18f 100644
--- a/CVE-2025/CVE-2025-45xx/CVE-2025-4573.json
+++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4573.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4573",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2025-06-11T11:15:23.313",
- "lastModified": "2025-06-12T16:06:20.180",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:59:16.597",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.11.0",
+ "versionEndExcluding": "9.11.14",
+ "matchCriteriaId": "65E6CEFD-19CA-46F8-9EEA-5C6E02518ADA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.5.0",
+ "versionEndExcluding": "10.5.5",
+ "matchCriteriaId": "F10C4C79-AB51-4C99-8301-7C2ACE5D89F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.6.0",
+ "versionEndExcluding": "10.6.4",
+ "matchCriteriaId": "388A12CB-1278-4628-B850-FB891C07937C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.7.0",
+ "versionEndExcluding": "10.7.2",
+ "matchCriteriaId": "98383D39-589D-4B23-9395-2E0BF0EFF911"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://mattermost.com/security-updates",
- "source": "responsibledisclosure@mattermost.com"
+ "source": "responsibledisclosure@mattermost.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json
index 42465a58d22..792e0be7678 100644
--- a/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json
+++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46733.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-46733",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-04T14:15:33.217",
- "lastModified": "2025-07-07T17:15:28.197",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47109.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47109.json
new file mode 100644
index 00000000000..1469727149b
--- /dev/null
+++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47109.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47109",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2025-07-08T17:15:36.510",
+ "lastModified": "2025-07-08T17:15:36.510",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "After Effects versions 25.2, 24.6.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-49.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47159.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47159.json
new file mode 100644
index 00000000000..fda755a4ebd
--- /dev/null
+++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47159.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47159",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:36.730",
+ "lastModified": "2025-07-08T17:15:36.730",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Protection mechanism failure in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-693"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47159",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47161.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47161.json
index 97edec956f8..90d66e96adc 100644
--- a/CVE-2025/CVE-2025-471xx/CVE-2025-47161.json
+++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47161.json
@@ -2,13 +2,13 @@
"id": "CVE-2025-47161",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-05-15T20:16:08.590",
- "lastModified": "2025-06-04T20:03:05.893",
- "vulnStatus": "Analyzed",
+ "lastModified": "2025-07-08T16:15:57.937",
+ "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
- "value": "Microsoft Defender for Endpoint Elevation of Privilege Vulnerability"
+ "value": "Improper access control in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally."
},
{
"lang": "es",
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47178.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47178.json
new file mode 100644
index 00000000000..ac462cb9ca4
--- /dev/null
+++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47178.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47178",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:36.937",
+ "lastModified": "2025-07-08T17:15:36.937",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47178",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47181.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47181.json
index 3c65722f280..567861f52bd 100644
--- a/CVE-2025/CVE-2025-471xx/CVE-2025-47181.json
+++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47181.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-47181",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-05-22T22:15:30.773",
- "lastModified": "2025-05-23T15:54:42.643",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:18:17.580",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge_update:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.3.195.61",
+ "matchCriteriaId": "CC9AD7D1-35BE-41ED-8D3D-E26954EAB876"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47181",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47202.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47202.json
index dc587e4aa8f..1f36e5cc598 100644
--- a/CVE-2025/CVE-2025-472xx/CVE-2025-47202.json
+++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47202.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-47202",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:23.943",
- "lastModified": "2025-07-07T16:15:23.943",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In RRC in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400, the lack of a length check leads to out-of-bounds writes."
+ },
+ {
+ "lang": "es",
+ "value": "En RRC en Samsung Mobile Processor, Wearable Processor, y Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 9110, W920, W930, W1000, m\u00f3dem 5123, m\u00f3dem 5300 y m\u00f3dem 5400, la falta de una verificaci\u00f3n de longitud conduce a escrituras fuera de los l\u00edmites."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47227.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47227.json
index 082ae3779e5..564ab4c846e 100644
--- a/CVE-2025/CVE-2025-472xx/CVE-2025-47227.json
+++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47227.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-47227",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T03:15:30.470",
- "lastModified": "2025-07-07T19:15:22.940",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47228.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47228.json
index 0d535c1d52c..0e444667116 100644
--- a/CVE-2025/CVE-2025-472xx/CVE-2025-47228.json
+++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47228.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-47228",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T03:15:30.637",
- "lastModified": "2025-07-07T19:15:23.100",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json
index 34392f61e01..c258a00a201 100644
--- a/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json
+++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-47289",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-02T11:15:22.710",
- "lastModified": "2025-06-02T17:32:17.397",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:09:14.273",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
}
]
},
@@ -49,20 +69,57 @@
"value": "CWE-1004"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phoenixcart:ce_phoenix_cart:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.1.0.3",
+ "matchCriteriaId": "58330C68-3E71-42D8-A874-D334C21FD532"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1uQAEjewSL9jWWu1UHe47tAnM7U4_x39g/view?usp=drive_link",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Permissions Required"
+ ]
},
{
"url": "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-474xx/CVE-2025-47422.json b/CVE-2025/CVE-2025-474xx/CVE-2025-47422.json
index e15f7c9f240..f6c5e7635a4 100644
--- a/CVE-2025/CVE-2025-474xx/CVE-2025-47422.json
+++ b/CVE-2025/CVE-2025-474xx/CVE-2025-47422.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-47422",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-08T14:15:27.997",
- "lastModified": "2025-07-08T14:15:27.997",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-474xx/CVE-2025-47479.json b/CVE-2025/CVE-2025-474xx/CVE-2025-47479.json
index 32b7b5b1c68..63ab5692af9 100644
--- a/CVE-2025/CVE-2025-474xx/CVE-2025-47479.json
+++ b/CVE-2025/CVE-2025-474xx/CVE-2025-47479.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-47479",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:28.530",
- "lastModified": "2025-07-04T12:15:28.530",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Weak Authentication vulnerability in AresIT WP Compress allows Authentication Abuse. This issue affects WP Compress: from n/a through 6.30.30."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de autenticaci\u00f3n d\u00e9bil en AresIT WP Compress permite el abuso de autenticaci\u00f3n. Este problema afecta a WP Compress desde n/d hasta la versi\u00f3n 6.30.30."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-475xx/CVE-2025-47565.json b/CVE-2025/CVE-2025-475xx/CVE-2025-47565.json
index 290bc59249f..044a7e6e389 100644
--- a/CVE-2025/CVE-2025-475xx/CVE-2025-47565.json
+++ b/CVE-2025/CVE-2025-475xx/CVE-2025-47565.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-47565",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:28.720",
- "lastModified": "2025-07-04T12:15:28.720",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ashanjay EventON allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects EventON: from n/a through 4.9.9."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en ashanjay EventON permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a EventON desde la versi\u00f3n n/d hasta la 4.9.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-476xx/CVE-2025-47627.json b/CVE-2025/CVE-2025-476xx/CVE-2025-47627.json
index 657b84d544a..2406f7785e4 100644
--- a/CVE-2025/CVE-2025-476xx/CVE-2025-47627.json
+++ b/CVE-2025/CVE-2025-476xx/CVE-2025-47627.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-47627",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:28.917",
- "lastModified": "2025-07-04T12:15:28.917",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LCweb PrivateContent - Mail Actions allows PHP Local File Inclusion. This issue affects PrivateContent - Mail Actions: from n/a through 2.3.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n remota de archivos PHP') en LCweb PrivateContent - Mail Actions permite la inclusi\u00f3n local de archivos en PHP. Este problema afecta a PrivateContent - Mail Actions desde n/d hasta la versi\u00f3n 2.3.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-476xx/CVE-2025-47634.json b/CVE-2025/CVE-2025-476xx/CVE-2025-47634.json
index 413bf8a5580..dc852fba7f4 100644
--- a/CVE-2025/CVE-2025-476xx/CVE-2025-47634.json
+++ b/CVE-2025/CVE-2025-476xx/CVE-2025-47634.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-47634",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:29.090",
- "lastModified": "2025-07-04T12:15:29.090",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Keylor Mendoza WC Pickup Store allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WC Pickup Store: from n/a through 1.8.9."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Keylor Mendoza WC Pickup Store permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la tienda WC Pickup desde la versi\u00f3n n/d hasta la 1.8.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47966.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47966.json
index 9dccf70d8a6..e877d48f9d9 100644
--- a/CVE-2025/CVE-2025-479xx/CVE-2025-47966.json
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47966.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-47966",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-05T21:15:22.127",
- "lastModified": "2025-06-06T14:07:28.330",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:26:34.813",
+ "vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
@@ -58,10 +58,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C1B231AB-37F6-4226-A774-952FCE9AB2AE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47971.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47971.json
new file mode 100644
index 00000000000..d9110cff7be
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47971.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47971",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:37.133",
+ "lastModified": "2025-07-08T17:15:37.133",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-126"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47971",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47972.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47972.json
new file mode 100644
index 00000000000..c5fb44e53f8
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47972.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47972",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:37.350",
+ "lastModified": "2025-07-08T17:15:37.350",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47972",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47973.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47973.json
new file mode 100644
index 00000000000..9ebda0e8eaf
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47973.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47973",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:37.560",
+ "lastModified": "2025-07-08T17:15:37.560",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-126"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47973",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47975.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47975.json
new file mode 100644
index 00000000000..fa507e47e86
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47975.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47975",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:37.780",
+ "lastModified": "2025-07-08T17:15:37.780",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Double free in Windows SSDP Service allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47975",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47976.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47976.json
new file mode 100644
index 00000000000..1b12e28aa53
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47976.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47976",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:37.993",
+ "lastModified": "2025-07-08T17:15:37.993",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47976",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47978.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47978.json
new file mode 100644
index 00000000000..900362928ff
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47978.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47978",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:38.217",
+ "lastModified": "2025-07-08T17:15:38.217",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds read in Windows Kerberos allows an authorized attacker to deny service over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47978",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47980.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47980.json
new file mode 100644
index 00000000000..61c1b6e7daa
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47980.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47980",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:38.417",
+ "lastModified": "2025-07-08T17:15:38.417",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 6.2,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47980",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47981.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47981.json
new file mode 100644
index 00000000000..d4e708ea793
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47981.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47981",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:38.633",
+ "lastModified": "2025-07-08T17:15:38.633",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47981",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47982.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47982.json
new file mode 100644
index 00000000000..e6a94f62192
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47982.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-47982",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:39.287",
+ "lastModified": "2025-07-08T17:15:39.287",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper input validation in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-822"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47982",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47984.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47984.json
new file mode 100644
index 00000000000..814c140a7c5
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47984.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47984",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:39.503",
+ "lastModified": "2025-07-08T17:15:39.503",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-693"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47984",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47985.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47985.json
new file mode 100644
index 00000000000..46c77cd54b2
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47985.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47985",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:39.723",
+ "lastModified": "2025-07-08T17:15:39.723",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-822"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47985",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47986.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47986.json
new file mode 100644
index 00000000000..6f3e70edfb1
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47986.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47986",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:39.950",
+ "lastModified": "2025-07-08T17:15:39.950",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47986",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47987.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47987.json
new file mode 100644
index 00000000000..111b6c00619
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47987.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-47987",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:40.177",
+ "lastModified": "2025-07-08T17:15:40.177",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47987",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47988.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47988.json
new file mode 100644
index 00000000000..42a316910c4
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47988.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47988",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:40.387",
+ "lastModified": "2025-07-08T17:15:40.387",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47988",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47991.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47991.json
new file mode 100644
index 00000000000..4532da9d5e3
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47991.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47991",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:40.590",
+ "lastModified": "2025-07-08T17:15:40.590",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.1,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47991",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47993.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47993.json
new file mode 100644
index 00000000000..f89f290a0d7
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47993.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47993",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:40.800",
+ "lastModified": "2025-07-08T17:15:40.800",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper access control in Microsoft PC Manager allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47993",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47994.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47994.json
new file mode 100644
index 00000000000..9fa975c3dd6
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47994.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47994",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:41.020",
+ "lastModified": "2025-07-08T17:15:41.020",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47994",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47996.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47996.json
new file mode 100644
index 00000000000..b832f5dfebe
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47996.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-47996",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:41.223",
+ "lastModified": "2025-07-08T17:15:41.223",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-191"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47996",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47998.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47998.json
new file mode 100644
index 00000000000..c06286eb53e
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47998.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-47998",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:41.447",
+ "lastModified": "2025-07-08T17:15:41.447",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47998",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-479xx/CVE-2025-47999.json b/CVE-2025/CVE-2025-479xx/CVE-2025-47999.json
new file mode 100644
index 00000000000..80f12d9e7bd
--- /dev/null
+++ b/CVE-2025/CVE-2025-479xx/CVE-2025-47999.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-47999",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:41.657",
+ "lastModified": "2025-07-08T17:15:41.657",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-820"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47999",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4779.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4779.json
index 93e26590f2b..fc0ee5ab30a 100644
--- a/CVE-2025/CVE-2025-47xx/CVE-2025-4779.json
+++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4779.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-4779",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:28.717",
- "lastModified": "2025-07-07T10:15:28.717",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de lunary-ai/lunary anteriores a la 1.9.24 son vulnerables a cross site scripting (XSS) almacenado. Un atacante no autenticado puede inyectar JavaScript malicioso en el endpoint `v1/runs/ingest` a\u00f1adiendo un campo `citations` vac\u00edo, lo que activa una ruta de c\u00f3digo donde se usa `dangerouslySetInnerHTML` para renderizar texto controlado por el atacante. Esta vulnerabilidad permite la ejecuci\u00f3n de JavaScript arbitrario en el contexto del navegador del usuario, lo que podr\u00eda provocar secuestro de sesi\u00f3n, robo de datos u otras acciones maliciosas."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48000.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48000.json
new file mode 100644
index 00000000000..cc7e424afd6
--- /dev/null
+++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48000.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-48000",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:41.870",
+ "lastModified": "2025-07-08T17:15:41.870",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48000",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48001.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48001.json
new file mode 100644
index 00000000000..277ba48b64d
--- /dev/null
+++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48001.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48001",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:42.100",
+ "lastModified": "2025-07-08T17:15:42.100",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48001",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48002.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48002.json
new file mode 100644
index 00000000000..2cf7fcb4369
--- /dev/null
+++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48002.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-48002",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:42.307",
+ "lastModified": "2025-07-08T17:15:42.307",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to disclose information over an adjacent network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48002",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48003.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48003.json
new file mode 100644
index 00000000000..cfe39e1c592
--- /dev/null
+++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48003.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48003",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:42.503",
+ "lastModified": "2025-07-08T17:15:42.503",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-693"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48003",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-481xx/CVE-2025-48172.json b/CVE-2025/CVE-2025-481xx/CVE-2025-48172.json
index 6ff8a22b7bb..6b0ced8f6cf 100644
--- a/CVE-2025/CVE-2025-481xx/CVE-2025-48172.json
+++ b/CVE-2025/CVE-2025-481xx/CVE-2025-48172.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-48172",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T13:15:25.453",
- "lastModified": "2025-07-08T15:15:28.330",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-482xx/CVE-2025-48231.json b/CVE-2025/CVE-2025-482xx/CVE-2025-48231.json
index 54368aa86fa..7c49f84c24d 100644
--- a/CVE-2025/CVE-2025-482xx/CVE-2025-48231.json
+++ b/CVE-2025/CVE-2025-482xx/CVE-2025-48231.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-48231",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:29.280",
- "lastModified": "2025-07-04T12:15:29.280",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in codepeople Booking Calendar Contact Form allows Stored XSS. This issue affects Booking Calendar Contact Form: from n/a through 1.2.58."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en codepeople Booking Calendar Contact Form permite XSS almacenado. Este problema afecta al formulario de contacto del calendario de reservas desde n/d hasta la versi\u00f3n 1.2.58."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-483xx/CVE-2025-48367.json b/CVE-2025/CVE-2025-483xx/CVE-2025-48367.json
index f842ee26e07..2a70ac010fb 100644
--- a/CVE-2025/CVE-2025-483xx/CVE-2025-48367.json
+++ b/CVE-2025/CVE-2025-483xx/CVE-2025-48367.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-48367",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T16:15:24.063",
- "lastModified": "2025-07-07T16:15:24.063",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19."
+ },
+ {
+ "lang": "es",
+ "value": "Redis es una base de datos en memoria de c\u00f3digo abierto que persiste en el disco. Una conexi\u00f3n no autenticada puede causar errores repetidos del protocolo IP, lo que provoca la inactividad del cliente y, en \u00faltima instancia, una denegaci\u00f3n de servicio. Esta vulnerabilidad est\u00e1 corregida en las versiones 8.0.3, 7.4.5, 7.2.10 y 6.2.19."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-485xx/CVE-2025-48501.json b/CVE-2025/CVE-2025-485xx/CVE-2025-48501.json
index 4d2f2ab5b19..35aaf9a453b 100644
--- a/CVE-2025/CVE-2025-485xx/CVE-2025-48501.json
+++ b/CVE-2025/CVE-2025-485xx/CVE-2025-48501.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-48501",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-07-07T05:15:41.913",
- "lastModified": "2025-07-07T05:15:41.913",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "vultures@jpcert.or.jp",
@@ -16,6 +16,10 @@
{
"lang": "en",
"value": "An OS command injection issue exists in Nimesa Backup and Recovery v2.3 and v2.4. If this vulnerability is exploited, an arbitrary OS commands may be executed on the server where the product is running."
+ },
+ {
+ "lang": "es",
+ "value": "Existe un problema de inyecci\u00f3n de comandos del sistema operativo en Nimesa Backup and Recovery v2.3 y v2.4. Si se explota esta vulnerabilidad, se podr\u00edan ejecutar comandos arbitrarios del sistema operativo en el servidor donde se ejecuta el producto."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48799.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48799.json
new file mode 100644
index 00000000000..3cd66094bcc
--- /dev/null
+++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48799.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48799",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:42.720",
+ "lastModified": "2025-07-08T17:15:42.720",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48799",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48800.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48800.json
new file mode 100644
index 00000000000..9f5617060f0
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48800.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48800",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:42.920",
+ "lastModified": "2025-07-08T17:15:42.920",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-693"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48800",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48802.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48802.json
new file mode 100644
index 00000000000..6e309b0be2e
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48802.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48802",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:43.130",
+ "lastModified": "2025-07-08T17:15:43.130",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper certificate validation in Windows SMB allows an authorized attacker to perform spoofing over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48802",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48803.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48803.json
new file mode 100644
index 00000000000..d337b90e2f9
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48803.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48803",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:43.330",
+ "lastModified": "2025-07-08T17:15:43.330",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-353"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48803",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48804.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48804.json
new file mode 100644
index 00000000000..1ce4cb1bdc1
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48804.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48804",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:43.543",
+ "lastModified": "2025-07-08T17:15:43.543",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-349"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48804",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48805.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48805.json
new file mode 100644
index 00000000000..132f84242c0
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48805.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48805",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:43.760",
+ "lastModified": "2025-07-08T17:15:43.760",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48805",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48806.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48806.json
new file mode 100644
index 00000000000..844e540ec27
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48806.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48806",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:43.973",
+ "lastModified": "2025-07-08T17:15:43.973",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48806",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48808.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48808.json
new file mode 100644
index 00000000000..37b40f38b5a
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48808.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48808",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:44.197",
+ "lastModified": "2025-07-08T17:15:44.197",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48808",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48809.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48809.json
new file mode 100644
index 00000000000..b0b93eee478
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48809.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48809",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:44.410",
+ "lastModified": "2025-07-08T17:15:44.410",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Processor optimization removal or modification of security-critical code in Windows Kernel allows an authorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1037"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48809",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48810.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48810.json
new file mode 100644
index 00000000000..5bd4715de37
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48810.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48810",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:44.607",
+ "lastModified": "2025-07-08T17:15:44.607",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Processor optimization removal or modification of security-critical code in Windows Secure Kernel Mode allows an authorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1037"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48810",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48811.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48811.json
new file mode 100644
index 00000000000..ecf57b52e07
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48811.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48811",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:44.800",
+ "lastModified": "2025-07-08T17:15:44.800",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-353"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48811",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48812.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48812.json
new file mode 100644
index 00000000000..e902f7ca65c
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48812.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48812",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:45.023",
+ "lastModified": "2025-07-08T17:15:45.023",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48812",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48814.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48814.json
new file mode 100644
index 00000000000..07878085ea1
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48814.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48814",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:45.220",
+ "lastModified": "2025-07-08T17:15:45.220",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an unauthorized attacker to bypass a security feature over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48814",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48815.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48815.json
new file mode 100644
index 00000000000..db1f74ece3a
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48815.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48815",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:45.433",
+ "lastModified": "2025-07-08T17:15:45.433",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Access of resource using incompatible type ('type confusion') in Windows SSDP Service allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-843"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48815",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48816.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48816.json
new file mode 100644
index 00000000000..98a4983c953
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48816.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-48816",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:45.650",
+ "lastModified": "2025-07-08T17:15:45.650",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Integer overflow or wraparound in HID class driver allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48816",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48817.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48817.json
new file mode 100644
index 00000000000..242c2b8a102
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48817.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-48817",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:45.867",
+ "lastModified": "2025-07-08T17:15:45.867",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-23"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48817",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48818.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48818.json
new file mode 100644
index 00000000000..5e5db616e7b
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48818.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48818",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:46.120",
+ "lastModified": "2025-07-08T17:15:46.120",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48818",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48819.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48819.json
new file mode 100644
index 00000000000..937bd6bfdb5
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48819.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48819",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:46.420",
+ "lastModified": "2025-07-08T17:15:46.420",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-591"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48819",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48820.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48820.json
new file mode 100644
index 00000000000..8f12edde32f
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48820.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48820",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:46.933",
+ "lastModified": "2025-07-08T17:15:46.933",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper link resolution before file access ('link following') in Windows AppX Deployment Service allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48820",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48821.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48821.json
new file mode 100644
index 00000000000..1886339b6d4
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48821.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48821",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:47.143",
+ "lastModified": "2025-07-08T17:15:47.143",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48821",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48822.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48822.json
new file mode 100644
index 00000000000..fec1980c500
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48822.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48822",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:47.363",
+ "lastModified": "2025-07-08T17:15:47.363",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds read in Windows Hyper-V allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48822",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48823.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48823.json
new file mode 100644
index 00000000000..8100443bee7
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48823.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2025-48823",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:47.580",
+ "lastModified": "2025-07-08T17:15:47.580",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cryptographic issues in Windows Cryptographic Services allows an unauthorized attacker to disclose information over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48823",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48824.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48824.json
new file mode 100644
index 00000000000..9bf768976dc
--- /dev/null
+++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48824.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-48824",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:47.777",
+ "lastModified": "2025-07-08T17:15:47.777",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48824",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48939.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48939.json
index 2fd6e865c4e..2b19667646a 100644
--- a/CVE-2025/CVE-2025-489xx/CVE-2025-48939.json
+++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48939.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-48939",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T17:15:39.300",
- "lastModified": "2025-07-03T17:15:39.300",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48952.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48952.json
index 58ec40f504c..0800622d446 100644
--- a/CVE-2025/CVE-2025-489xx/CVE-2025-48952.json
+++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48952.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-48952",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-04T23:15:21.760",
- "lastModified": "2025-07-08T14:15:28.227",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49005.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49005.json
index 6f079b23107..f78a1e3b65d 100644
--- a/CVE-2025/CVE-2025-490xx/CVE-2025-49005.json
+++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49005.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-49005",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T21:15:26.787",
- "lastModified": "2025-07-08T15:15:28.543",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49070.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49070.json
index 32d81681895..b1393bb439d 100644
--- a/CVE-2025/CVE-2025-490xx/CVE-2025-49070.json
+++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49070.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49070",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:29.460",
- "lastModified": "2025-07-04T12:15:29.460",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NasaTheme Elessi allows PHP Local File Inclusion. This issue affects Elessi: from n/a through n/a."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n remota de archivos PHP') en NasaTheme Elessi permite la inclusi\u00f3n local de archivos PHP. Este problema afecta a Elessi: desde n/d hasta n/d."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49245.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49245.json
index 34792277f60..d4c081d84ed 100644
--- a/CVE-2025/CVE-2025-492xx/CVE-2025-49245.json
+++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49245.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49245",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:29.677",
- "lastModified": "2025-07-04T12:15:29.677",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cmoreira Testimonials Showcase allows Reflected XSS. This issue affects Testimonials Showcase: from n/a through 1.9.16."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en cmoreira Testimonials Showcase permite XSS reflejado. Este problema afecta a Testimonials Showcase desde n/d hasta la versi\u00f3n 1.9.16."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49247.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49247.json
index aab8e5cd262..4b6c6b7501e 100644
--- a/CVE-2025/CVE-2025-492xx/CVE-2025-49247.json
+++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49247.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49247",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:29.970",
- "lastModified": "2025-07-04T12:15:29.970",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cmoreira Team Showcase allows DOM-Based XSS. This issue affects Team Showcase: from n/a through n/a."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en cmoreira Team Showcase permite XSS basado en DOM. Este problema afecta a Team Showcase: de n/d a n/d."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-492xx/CVE-2025-49274.json b/CVE-2025/CVE-2025-492xx/CVE-2025-49274.json
index b0517ae16fb..0a57427d32a 100644
--- a/CVE-2025/CVE-2025-492xx/CVE-2025-49274.json
+++ b/CVE-2025/CVE-2025-492xx/CVE-2025-49274.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49274",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:30.150",
- "lastModified": "2025-07-04T12:15:30.150",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in awplife Neom Blog allows Reflected XSS. This issue affects Neom Blog: from n/a through 0.0.9."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en awplife Neom Blog permite XSS reflejado. Este problema afecta al blog de Neom desde n/d hasta la versi\u00f3n 0.0.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-493xx/CVE-2025-49302.json b/CVE-2025/CVE-2025-493xx/CVE-2025-49302.json
index f962e758f4c..83c8dc691bc 100644
--- a/CVE-2025/CVE-2025-493xx/CVE-2025-49302.json
+++ b/CVE-2025/CVE-2025-493xx/CVE-2025-49302.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49302",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:30.387",
- "lastModified": "2025-07-04T12:15:30.387",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Scott Paterson Easy Stripe allows Remote Code Inclusion. This issue affects Easy Stripe: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de control inadecuado de la generaci\u00f3n de c\u00f3digo ('Inyecci\u00f3n de c\u00f3digo') en Scott Paterson Easy Stripe permite la inclusi\u00f3n remota de c\u00f3digo. Este problema afecta a Easy Stripe desde n/d hasta la versi\u00f3n 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-493xx/CVE-2025-49303.json b/CVE-2025/CVE-2025-493xx/CVE-2025-49303.json
index 961c6ab02bd..cd23470e244 100644
--- a/CVE-2025/CVE-2025-493xx/CVE-2025-49303.json
+++ b/CVE-2025/CVE-2025-493xx/CVE-2025-49303.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49303",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:30.623",
- "lastModified": "2025-07-04T12:15:30.623",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Shabti Kaplan Frontend Admin by DynamiApps allows Path Traversal. This issue affects Frontend Admin by DynamiApps: from n/a through 3.28.7."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en SShabti Kaplan Frontend Admin by DynamiApps permite el Path Traversal. Este problema afecta a Frontend Admin de DynamiApps desde la versi\u00f3n n/d hasta la 3.28.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49414.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49414.json
index 2ed5fcbd7f8..3763526f703 100644
--- a/CVE-2025/CVE-2025-494xx/CVE-2025-49414.json
+++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49414.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49414",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:30.817",
- "lastModified": "2025-07-04T12:15:30.817",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Fastw3b LLC FW Gallery allows Using Malicious Files. This issue affects FW Gallery: from n/a through 8.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Fastw3b LLC FW Gallery permite el uso de archivos maliciosos. Este problema afecta a FW Gallery desde la versi\u00f3n n/d hasta la 8.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49417.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49417.json
index ee69c0c0dd4..5dc7f1947ec 100644
--- a/CVE-2025/CVE-2025-494xx/CVE-2025-49417.json
+++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49417.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49417",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:31.003",
- "lastModified": "2025-07-04T12:15:31.003",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in BestWpDeveloper WooCommerce Product Multi-Action allows Object Injection. This issue affects WooCommerce Product Multi-Action: from n/a through 1.3."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en BestWpDeveloper WooCommerce Product Multi-Action permite la inyecci\u00f3n de objetos. Este problema afecta a la Multiacci\u00f3n de Producto WooCommerce desde n/d hasta la versi\u00f3n 1.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49418.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49418.json
index 3f620f1bd1f..8e8bcae7291 100644
--- a/CVE-2025/CVE-2025-494xx/CVE-2025-49418.json
+++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49418.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49418",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:31.247",
- "lastModified": "2025-07-04T12:15:31.247",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in TeconceTheme Allmart allows Server Side Request Forgery. This issue affects Allmart: from n/a through 1.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de Server Side Request Forgery (SSRF) en TeconceTheme Allmart permite Server Side Request Forgery. Este problema afecta a Allmart desde la versi\u00f3n n/d hasta la 1.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-494xx/CVE-2025-49431.json b/CVE-2025/CVE-2025-494xx/CVE-2025-49431.json
index 24ac51d84a4..c0f86d838d6 100644
--- a/CVE-2025/CVE-2025-494xx/CVE-2025-49431.json
+++ b/CVE-2025/CVE-2025-494xx/CVE-2025-49431.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49431",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:31.537",
- "lastModified": "2025-07-04T12:15:31.537",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Gnuget MF Plus WPML allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MF Plus WPML: from n/a through 1.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Gnuget MF Plus WPML permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a MF Plus WPML desde n/d hasta la versi\u00f3n 1.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49600.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49600.json
index 5a61525abde..8cae65d2123 100644
--- a/CVE-2025/CVE-2025-496xx/CVE-2025-49600.json
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49600.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49600",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.277",
- "lastModified": "2025-07-04T15:15:22.277",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS signature verification by reusing stale stack data, resulting in acceptance of an invalid signature. In mbedtls_lms_verify, the return values of the internal Merkle tree functions create_merkle_leaf_value and create_merkle_internal_value are not checked. These functions return an integer that indicates whether the call succeeded or not. If a failure occurs, the output buffer (Tc_candidate_root_node) may remain uninitialized, and the result of the signature verification is unpredictable. When the software implementation of SHA-256 is used, these functions will not fail. However, with hardware-accelerated hashing, an attacker could use fault injection against the accelerator to bypass verification."
+ },
+ {
+ "lang": "es",
+ "value": "En MbedTLS 3.3.0 anterior a 3.6.4, mbedtls_lms_verify pod\u00eda aceptar firmas no v\u00e1lidas si el c\u00e1lculo del hash fallaba y los errores internos no se verificaban, lo que permit\u00eda la falsificaci\u00f3n de la firma LMS (Leighton-Micali Signature) en un escenario de fallo. Espec\u00edficamente, los valores de retorno no verificados en mbedtls_lms_verify permiten a un atacante (que puede inducir un fallo en el acelerador de hash de hardware) omitir la verificaci\u00f3n de la firma LMS reutilizando datos obsoletos de la pila, lo que resulta en la aceptaci\u00f3n de una firma no v\u00e1lida. En mbedtls_lms_verify, los valores de retorno de las funciones internas del \u00e1rbol de Merkle create_merkle_leaf_value y create_merkle_internal_value no se verifican. Estas funciones devuelven un entero que indica si la llamada se realiz\u00f3 correctamente. Si se produce un fallo, el b\u00fafer de salida (Tc_candidate_root_node) puede permanecer sin inicializar, y el resultado de la verificaci\u00f3n de la firma es impredecible. Al implementar SHA-256 en software, estas funciones no fallan. Sin embargo, con el hashing acelerado por hardware, un atacante podr\u00eda usar la inyecci\u00f3n de fallos contra el acelerador para eludir la verificaci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49601.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49601.json
index ce211f3503d..7fdb8c95a86 100644
--- a/CVE-2025/CVE-2025-496xx/CVE-2025-49601.json
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49601.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49601",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.467",
- "lastModified": "2025-07-04T15:15:22.467",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input."
+ },
+ {
+ "lang": "es",
+ "value": "En MbedTLS 3.3.0 anterior a la 3.6.4, mbedtls_lms_import_public_key no comprueba que el b\u00fafer de entrada tenga al menos 4 bytes antes de leer un campo de 32 bits, lo que permite una posible lectura fuera de los l\u00edmites en una entrada truncada. Espec\u00edficamente, una lectura fuera de los l\u00edmites en mbedtls_lms_import_public_key permite a atacantes dependientes del contexto provocar un fallo o una divulgaci\u00f3n limitada de memoria adyacente al proporcionar un b\u00fafer de clave p\u00fablica LMS (Leighton-Micali Signature) truncado de menos de cuatro bytes. Una clave p\u00fablica LMS comienza con un indicador de tipo de 4 bytes. La funci\u00f3n mbedtls_lms_import_public_key lee este indicador de tipo antes de validar el tama\u00f1o de su entrada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49657.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49657.json
new file mode 100644
index 00000000000..4f76745e1f0
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49657.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49657",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:47.980",
+ "lastModified": "2025-07-08T17:15:47.980",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49657",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49658.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49658.json
new file mode 100644
index 00000000000..9f774a81db4
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49658.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49658",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:48.200",
+ "lastModified": "2025-07-08T17:15:48.200",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds read in Windows TDX.sys allows an authorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49658",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49659.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49659.json
new file mode 100644
index 00000000000..81135c4d09b
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49659.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49659",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:48.433",
+ "lastModified": "2025-07-08T17:15:48.433",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-126"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49659",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49660.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49660.json
new file mode 100644
index 00000000000..c47063573a6
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49660.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49660",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:48.677",
+ "lastModified": "2025-07-08T17:15:48.677",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Event Tracing allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49660",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49661.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49661.json
new file mode 100644
index 00000000000..6997d19b116
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49661.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49661",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:48.913",
+ "lastModified": "2025-07-08T17:15:48.913",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-822"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49661",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49663.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49663.json
new file mode 100644
index 00000000000..19d42e9fbb1
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49663.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49663",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:49.143",
+ "lastModified": "2025-07-08T17:15:49.143",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49663",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49664.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49664.json
new file mode 100644
index 00000000000..227a67bf0e2
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49664.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49664",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:49.367",
+ "lastModified": "2025-07-08T17:15:49.367",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Exposure of sensitive information to an unauthorized actor in Windows User-Mode Driver Framework Host allows an authorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49664",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49665.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49665.json
new file mode 100644
index 00000000000..8a557f728c6
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49665.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49665",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:49.583",
+ "lastModified": "2025-07-08T17:15:49.583",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Workspace Broker allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49665",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49666.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49666.json
new file mode 100644
index 00000000000..cb23f1f9dc9
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49666.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49666",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:49.830",
+ "lastModified": "2025-07-08T17:15:49.830",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Kernel allows an authorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49666",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49667.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49667.json
new file mode 100644
index 00000000000..d8562ec300e
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49667.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49667",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:50.043",
+ "lastModified": "2025-07-08T17:15:50.043",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49667",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49668.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49668.json
new file mode 100644
index 00000000000..d0590c7042b
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49668.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49668",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:50.253",
+ "lastModified": "2025-07-08T17:15:50.253",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49668",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49669.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49669.json
new file mode 100644
index 00000000000..ad83dc44e1b
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49669.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49669",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:50.470",
+ "lastModified": "2025-07-08T17:15:50.470",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49669",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49670.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49670.json
new file mode 100644
index 00000000000..b50841b94b1
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49670.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49670",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:50.690",
+ "lastModified": "2025-07-08T17:15:50.690",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49670",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49671.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49671.json
new file mode 100644
index 00000000000..695fb86f8ae
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49671.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49671",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:50.933",
+ "lastModified": "2025-07-08T17:15:50.933",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49671",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49672.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49672.json
new file mode 100644
index 00000000000..3e113791c46
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49672.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49672",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:51.227",
+ "lastModified": "2025-07-08T17:15:51.227",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49672",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49673.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49673.json
new file mode 100644
index 00000000000..b1ad35aca3a
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49673.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49673",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:51.423",
+ "lastModified": "2025-07-08T17:15:51.423",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49673",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49674.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49674.json
new file mode 100644
index 00000000000..7b4d1cf7cd6
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49674.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49674",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:51.630",
+ "lastModified": "2025-07-08T17:15:51.630",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49674",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49675.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49675.json
new file mode 100644
index 00000000000..13b8f5bddaf
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49675.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49675",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:51.837",
+ "lastModified": "2025-07-08T17:15:51.837",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49675",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49676.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49676.json
new file mode 100644
index 00000000000..d9ecd8472f1
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49676.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49676",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:52.060",
+ "lastModified": "2025-07-08T17:15:52.060",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49676",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49677.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49677.json
new file mode 100644
index 00000000000..a15a28834bf
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49677.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49677",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:52.257",
+ "lastModified": "2025-07-08T17:15:52.257",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49677",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49678.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49678.json
new file mode 100644
index 00000000000..8b0a924f264
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49678.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49678",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:52.450",
+ "lastModified": "2025-07-08T17:15:52.450",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Null pointer dereference in Windows NTFS allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49678",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49679.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49679.json
new file mode 100644
index 00000000000..9b9f5f875e4
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49679.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49679",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:52.663",
+ "lastModified": "2025-07-08T17:15:52.663",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Numeric truncation error in Windows Shell allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-197"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49679",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49680.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49680.json
new file mode 100644
index 00000000000..bbceb8f1f8c
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49680.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49680",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:52.867",
+ "lastModified": "2025-07-08T17:15:52.867",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper link resolution before file access ('link following') in Windows Performance Recorder allows an authorized attacker to deny service locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49680",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49681.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49681.json
new file mode 100644
index 00000000000..dbc0d37a8d3
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49681.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49681",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:53.070",
+ "lastModified": "2025-07-08T17:15:53.070",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49681",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49682.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49682.json
new file mode 100644
index 00000000000..80de0c8dcdf
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49682.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49682",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:53.260",
+ "lastModified": "2025-07-08T17:15:53.260",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Media allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49682",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49683.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49683.json
new file mode 100644
index 00000000000..359ba24cfb7
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49683.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49683",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:53.457",
+ "lastModified": "2025-07-08T17:15:53.457",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49683",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49684.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49684.json
new file mode 100644
index 00000000000..b21865066f6
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49684.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49684",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:53.667",
+ "lastModified": "2025-07-08T17:15:53.667",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Buffer over-read in Storage Port Driver allows an authorized attacker to disclose information locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-126"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49684",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49685.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49685.json
new file mode 100644
index 00000000000..7140b68a31c
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49685.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49685",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:53.860",
+ "lastModified": "2025-07-08T17:15:53.860",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Windows Search Component allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49685",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49686.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49686.json
new file mode 100644
index 00000000000..08fd2d7d7bc
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49686.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49686",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:54.057",
+ "lastModified": "2025-07-08T17:15:54.057",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Null pointer dereference in Windows TCP/IP allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49686",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49687.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49687.json
new file mode 100644
index 00000000000..1fba9dc44c8
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49687.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49687",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:54.257",
+ "lastModified": "2025-07-08T17:15:54.257",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds read in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49687",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49688.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49688.json
new file mode 100644
index 00000000000..4b9ab6d74af
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49688.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49688",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:54.470",
+ "lastModified": "2025-07-08T17:15:54.470",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Double free in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49688",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49689.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49689.json
new file mode 100644
index 00000000000..d10909411f6
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49689.json
@@ -0,0 +1,64 @@
+{
+ "id": "CVE-2025-49689",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:54.680",
+ "lastModified": "2025-07-08T17:15:54.680",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-822"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49689",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49690.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49690.json
new file mode 100644
index 00000000000..25f5b224ec5
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49690.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49690",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:54.890",
+ "lastModified": "2025-07-08T17:15:54.890",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an unauthorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49690",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49691.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49691.json
new file mode 100644
index 00000000000..8f50512ec39
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49691.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49691",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:55.103",
+ "lastModified": "2025-07-08T17:15:55.103",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49691",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49693.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49693.json
new file mode 100644
index 00000000000..3d1217b5003
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49693.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49693",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:55.320",
+ "lastModified": "2025-07-08T17:15:55.320",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Double free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49693",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49694.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49694.json
new file mode 100644
index 00000000000..3f2c3d3d805
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49694.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49694",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:55.503",
+ "lastModified": "2025-07-08T17:15:55.503",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Null pointer dereference in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49694",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49695.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49695.json
new file mode 100644
index 00000000000..25f4632df62
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49695.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49695",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:55.697",
+ "lastModified": "2025-07-08T17:15:55.697",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49695",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49696.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49696.json
new file mode 100644
index 00000000000..3432a2eee65
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49696.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49696",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:55.917",
+ "lastModified": "2025-07-08T17:15:55.917",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49696",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49697.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49697.json
new file mode 100644
index 00000000000..9c6c543c93b
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49697.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49697",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:56.147",
+ "lastModified": "2025-07-08T17:15:56.147",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49697",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49698.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49698.json
new file mode 100644
index 00000000000..fb617b60d5b
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49698.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49698",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:56.377",
+ "lastModified": "2025-07-08T17:15:56.377",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49698",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-496xx/CVE-2025-49699.json b/CVE-2025/CVE-2025-496xx/CVE-2025-49699.json
new file mode 100644
index 00000000000..e11236ed6dc
--- /dev/null
+++ b/CVE-2025/CVE-2025-496xx/CVE-2025-49699.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49699",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:56.590",
+ "lastModified": "2025-07-08T17:15:56.590",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49699",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49700.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49700.json
new file mode 100644
index 00000000000..070ea8a4e45
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49700.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49700",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:56.793",
+ "lastModified": "2025-07-08T17:15:56.793",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49700",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49701.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49701.json
new file mode 100644
index 00000000000..7dc3c0752ae
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49701.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49701",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:57.190",
+ "lastModified": "2025-07-08T17:15:57.190",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-285"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49701",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49702.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49702.json
new file mode 100644
index 00000000000..da05c1d1049
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49702.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49702",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:57.380",
+ "lastModified": "2025-07-08T17:15:57.380",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-843"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49702",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49703.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49703.json
new file mode 100644
index 00000000000..71a4a007e77
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49703.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49703",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:57.577",
+ "lastModified": "2025-07-08T17:15:57.577",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49703",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49704.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49704.json
new file mode 100644
index 00000000000..841d42c698e
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49704.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49704",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:57.867",
+ "lastModified": "2025-07-08T17:15:57.867",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49705.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49705.json
new file mode 100644
index 00000000000..f6bc50793b8
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49705.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49705",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:58.050",
+ "lastModified": "2025-07-08T17:15:58.050",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49705",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49706.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49706.json
new file mode 100644
index 00000000000..45c0d6ffaed
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49706.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49706",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:58.250",
+ "lastModified": "2025-07-08T17:15:58.250",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper authentication in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49711.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49711.json
new file mode 100644
index 00000000000..bff7c623eec
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49711.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49711",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:58.437",
+ "lastModified": "2025-07-08T17:15:58.437",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49711",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49713.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49713.json
index 470f9138938..e559307c771 100644
--- a/CVE-2025/CVE-2025-497xx/CVE-2025-49713.json
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49713.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-49713",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-07-02T18:15:24.303",
- "lastModified": "2025-07-03T15:13:53.147",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-07-08T16:25:08.817",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "138.0.3351.65",
+ "matchCriteriaId": "9E25B1A7-54ED-439A-88BE-645F37BE61DF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49713",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49714.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49714.json
new file mode 100644
index 00000000000..522a781df40
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49714.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49714",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:58.687",
+ "lastModified": "2025-07-08T17:15:58.687",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Trust boundary violation in Visual Studio Code - Python extension allows an unauthorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-501"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49714",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49716.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49716.json
new file mode 100644
index 00000000000..ddd9ac44b65
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49716.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49716",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:58.873",
+ "lastModified": "2025-07-08T17:15:58.873",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Uncontrolled resource consumption in Windows Netlogon allows an unauthorized attacker to deny service over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49716",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49717.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49717.json
new file mode 100644
index 00000000000..4434c86e21b
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49717.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49717",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:59.070",
+ "lastModified": "2025-07-08T17:15:59.070",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in SQL Server allows an authorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49717",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49718.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49718.json
new file mode 100644
index 00000000000..66adcf2db94
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49718.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49718",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:59.267",
+ "lastModified": "2025-07-08T17:15:59.267",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use of uninitialized resource in SQL Server allows an unauthorized attacker to disclose information over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-908"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49718",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49719.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49719.json
new file mode 100644
index 00000000000..bdb00da36f1
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49719.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49719",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:59.450",
+ "lastModified": "2025-07-08T17:15:59.450",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper input validation in SQL Server allows an unauthorized attacker to disclose information over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49721.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49721.json
new file mode 100644
index 00000000000..06071f8e5e1
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49721.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49721",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:59.657",
+ "lastModified": "2025-07-08T17:15:59.657",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Fast FAT Driver allows an unauthorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49721",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49722.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49722.json
new file mode 100644
index 00000000000..9aee3831027
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49722.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49722",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:15:59.863",
+ "lastModified": "2025-07-08T17:15:59.863",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Uncontrolled resource consumption in Windows Print Spooler Components allows an authorized attacker to deny service over an adjacent network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "baseScore": 5.7,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49722",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49723.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49723.json
new file mode 100644
index 00000000000..2fa2e179e79
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49723.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49723",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:00.077",
+ "lastModified": "2025-07-08T17:16:00.077",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authorization in Windows StateRepository API allows an authorized attacker to perform tampering locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49723",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49724.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49724.json
new file mode 100644
index 00000000000..552346925f9
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49724.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49724",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:00.287",
+ "lastModified": "2025-07-08T17:16:00.287",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Connected Devices Platform Service allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49724",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49725.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49725.json
new file mode 100644
index 00000000000..426a6696f3c
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49725.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49725",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:00.490",
+ "lastModified": "2025-07-08T17:16:00.490",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Notification allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49725",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49726.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49726.json
new file mode 100644
index 00000000000..e8e390d324a
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49726.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49726",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:00.703",
+ "lastModified": "2025-07-08T17:16:00.703",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Notification allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49726",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49727.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49727.json
new file mode 100644
index 00000000000..217e2b2fcf6
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49727.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49727",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:00.930",
+ "lastModified": "2025-07-08T17:16:00.930",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49727",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49729.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49729.json
new file mode 100644
index 00000000000..54126cb23ac
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49729.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49729",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:01.190",
+ "lastModified": "2025-07-08T17:16:01.190",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49729",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49730.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49730.json
new file mode 100644
index 00000000000..7de99bb81de
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49730.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49730",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:01.423",
+ "lastModified": "2025-07-08T17:16:01.423",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Time-of-check time-of-use (toctou) race condition in Microsoft Windows QoS scheduler allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49730",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49731.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49731.json
new file mode 100644
index 00000000000..1933dde50d1
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49731.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49731",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:01.653",
+ "lastModified": "2025-07-08T17:16:01.653",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper handling of insufficient permissions or privileges in Microsoft Teams allows an authorized attacker to elevate privileges over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "baseScore": 3.1,
+ "baseSeverity": "LOW",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-280"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49731",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49732.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49732.json
new file mode 100644
index 00000000000..8acea9f3f14
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49732.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49732",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:01.857",
+ "lastModified": "2025-07-08T17:16:01.857",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49732",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49733.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49733.json
new file mode 100644
index 00000000000..87f17c1ad0d
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49733.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49733",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:02.077",
+ "lastModified": "2025-07-08T17:16:02.077",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49733",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49735.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49735.json
new file mode 100644
index 00000000000..3f8f54031ec
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49735.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49735",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:02.270",
+ "lastModified": "2025-07-08T17:16:02.270",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49735",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49737.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49737.json
new file mode 100644
index 00000000000..045c6314159
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49737.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49737",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:02.460",
+ "lastModified": "2025-07-08T17:16:02.460",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Teams allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49737",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49738.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49738.json
new file mode 100644
index 00000000000..c3cbdf61093
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49738.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49738",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:02.647",
+ "lastModified": "2025-07-08T17:16:02.647",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49738",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49739.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49739.json
new file mode 100644
index 00000000000..7ed080ce4ff
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49739.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49739",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:02.837",
+ "lastModified": "2025-07-08T17:16:02.837",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49739",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49740.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49740.json
new file mode 100644
index 00000000000..c7a58c681c6
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49740.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49740",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:03.023",
+ "lastModified": "2025-07-08T17:16:03.023",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-693"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49740",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49741.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49741.json
index a2927ab6f0d..ff2166721b4 100644
--- a/CVE-2025/CVE-2025-497xx/CVE-2025-49741.json
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49741.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-49741",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-07-01T23:15:30.587",
- "lastModified": "2025-07-08T14:40:57.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2025-07-08T17:16:03.223",
+ "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@@ -60,6 +60,16 @@
]
},
"weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-268"
+ }
+ ]
+ },
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49742.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49742.json
new file mode 100644
index 00000000000..253dab07ba1
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49742.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-49742",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:03.420",
+ "lastModified": "2025-07-08T17:16:03.420",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49742",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49744.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49744.json
new file mode 100644
index 00000000000..4d5bb04f7c5
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49744.json
@@ -0,0 +1,64 @@
+{
+ "id": "CVE-2025-49744",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:03.630",
+ "lastModified": "2025-07-08T17:16:03.630",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-191"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49744",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49753.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49753.json
new file mode 100644
index 00000000000..47e16ddcc6a
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49753.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49753",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:03.827",
+ "lastModified": "2025-07-08T17:16:03.827",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49753",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49756.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49756.json
new file mode 100644
index 00000000000..f6bf7e0cba1
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49756.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49756",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:04.020",
+ "lastModified": "2025-07-08T17:16:04.020",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Use of a broken or risky cryptographic algorithm in Office Developer Platform allows an authorized attacker to bypass a security feature locally."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
+ "baseScore": 3.3,
+ "baseSeverity": "LOW",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-327"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49756",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-497xx/CVE-2025-49760.json b/CVE-2025/CVE-2025-497xx/CVE-2025-49760.json
new file mode 100644
index 00000000000..beb396e6e9b
--- /dev/null
+++ b/CVE-2025/CVE-2025-497xx/CVE-2025-49760.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-49760",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2025-07-08T17:16:04.197",
+ "lastModified": "2025-07-08T17:16:04.197",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
+ "baseScore": 3.5,
+ "baseSeverity": "LOW",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-73"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49760",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49809.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49809.json
index b70c941b127..6a5121a8ef2 100644
--- a/CVE-2025/CVE-2025-498xx/CVE-2025-49809.json
+++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49809.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-49809",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T13:15:25.780",
- "lastModified": "2025-07-08T15:15:28.867",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49826.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49826.json
index e58de52cfbe..0ce1fa46975 100644
--- a/CVE-2025/CVE-2025-498xx/CVE-2025-49826.json
+++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49826.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-49826",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T21:15:27.287",
- "lastModified": "2025-07-03T22:15:21.010",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49846.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49846.json
index d772de9e86b..3f592c6be75 100644
--- a/CVE-2025/CVE-2025-498xx/CVE-2025-49846.json
+++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49846.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-49846",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T17:15:39.613",
- "lastModified": "2025-07-03T17:15:39.613",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49866.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49866.json
index 73839cf834e..6ffce7f1c5d 100644
--- a/CVE-2025/CVE-2025-498xx/CVE-2025-49866.json
+++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49866.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49866",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:31.837",
- "lastModified": "2025-07-04T12:15:31.837",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nikel Beautiful Cookie Consent Banner allows Reflected XSS. This issue affects Beautiful Cookie Consent Banner: from n/a through 4.6.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Nikel Beautiful Cookie Consent Banner permite XSS reflejado. Este problema afecta al banner de consentimiento de cookies de Beautiful desde n/d hasta la versi\u00f3n 4.6.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49867.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49867.json
index 5e371c7f323..c18953d7dae 100644
--- a/CVE-2025/CVE-2025-498xx/CVE-2025-49867.json
+++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49867.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49867",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:32.123",
- "lastModified": "2025-07-04T12:15:32.123",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes allows Privilege Escalation. This issue affects RealHomes: from n/a through 4.4.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en InspiryThemes RealHomes permite la escalada de privilegios. Este problema afecta a RealHomes desde la versi\u00f3n n/d hasta la 4.4.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49870.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49870.json
index 722e1a65f09..78756516840 100644
--- a/CVE-2025/CVE-2025-498xx/CVE-2025-49870.json
+++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49870.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-49870",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:32.383",
- "lastModified": "2025-07-04T12:15:32.383",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Paid Member Subscriptions allows SQL Injection. This issue affects Paid Member Subscriptions: from n/a through 2.15.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Cozmoslabs Paid Member Subscriptions permite la inyecci\u00f3n SQL. Este problema afecta a las suscripciones de pago desde n/d hasta la versi\u00f3n 2.15.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4981.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4981.json
index 438e02e5ec6..d6868d90e5b 100644
--- a/CVE-2025/CVE-2025-49xx/CVE-2025-4981.json
+++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4981.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-4981",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2025-06-20T11:15:20.993",
- "lastModified": "2025-06-23T20:16:40.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T17:59:42.473",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,73 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.11.0",
+ "versionEndExcluding": "9.11.16",
+ "matchCriteriaId": "9CEF0379-7E63-452C-8084-067092A25D92"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.5.0",
+ "versionEndExcluding": "10.5.6",
+ "matchCriteriaId": "77EE1558-3E63-4178-90EB-DBC8F99B75AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.6.0",
+ "versionEndExcluding": "10.6.6",
+ "matchCriteriaId": "5E1A952E-F96B-4D50-B8FD-7CAFFE73263F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.7.0",
+ "versionEndExcluding": "10.7.3",
+ "matchCriteriaId": "28D55588-A52A-4ADD-AC90-A46BED4555A1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "20DB174F-F76D-49F1-BB44-638A5FA71CDA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "51CA3B67-FE72-49C2-97EA-D7D86F3991EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc2:*:*:*:*:*:*",
+ "matchCriteriaId": "8C4DBC6F-061B-4844-9E80-596D4890DA2A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattermost:mattermost_server:10.8.0:rc3:*:*:*:*:*:*",
+ "matchCriteriaId": "AA2C469A-7A94-4C55-9738-21C16B8C0817"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://mattermost.com/security-updates",
- "source": "responsibledisclosure@mattermost.com"
+ "source": "responsibledisclosure@mattermost.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-500xx/CVE-2025-50032.json b/CVE-2025/CVE-2025-500xx/CVE-2025-50032.json
index d6148db4ca6..55042b02b62 100644
--- a/CVE-2025/CVE-2025-500xx/CVE-2025-50032.json
+++ b/CVE-2025/CVE-2025-500xx/CVE-2025-50032.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-50032",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:32.817",
- "lastModified": "2025-07-04T12:15:32.817",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Paytiko - Payment Orchestration Platform Paytiko for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Paytiko for WooCommerce: from n/a through 1.3.14."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Paytiko - Payment Orchestration Platform Paytiko for WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Paytiko para WooCommerce desde la versi\u00f3n n/d hasta la 1.3.14."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-500xx/CVE-2025-50039.json b/CVE-2025/CVE-2025-500xx/CVE-2025-50039.json
index 7b23f06fd68..1ae9969a573 100644
--- a/CVE-2025/CVE-2025-500xx/CVE-2025-50039.json
+++ b/CVE-2025/CVE-2025-500xx/CVE-2025-50039.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-50039",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:33.017",
- "lastModified": "2025-07-04T12:15:33.017",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in vgwort VG WORT METIS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects VG WORT METIS: from n/a through 2.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en vgwort VG WORT METIS permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a VG WORT METIS desde n/d hasta la versi\u00f3n 2.0.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-501xx/CVE-2025-50130.json b/CVE-2025/CVE-2025-501xx/CVE-2025-50130.json
index 3d59c9d184c..7f87e464c5b 100644
--- a/CVE-2025/CVE-2025-501xx/CVE-2025-50130.json
+++ b/CVE-2025/CVE-2025-501xx/CVE-2025-50130.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-50130",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-07-08T13:15:33.710",
- "lastModified": "2025-07-08T13:15:33.710",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-504xx/CVE-2025-50404.json b/CVE-2025/CVE-2025-504xx/CVE-2025-50404.json
index 0214577c66b..5cfeea6977f 100644
--- a/CVE-2025/CVE-2025-504xx/CVE-2025-50404.json
+++ b/CVE-2025/CVE-2025-504xx/CVE-2025-50404.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-50404",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-01T15:15:26.043",
- "lastModified": "2025-07-03T15:14:12.767",
+ "lastModified": "2025-07-08T16:15:58.260",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -15,7 +15,42 @@
"value": "Intelbras RX1500 Router v2.2.17 y versiones anteriores es vulnerable a desbordamiento de enteros. La funci\u00f3n websReadEvent utiliza incorrectamente el tipo int al procesar el campo \"command\" del encabezado http, lo que provoca que la matriz cruce el l\u00edmite y sobrescriba otros campos de la matriz."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/feiwuxingxie/cve/blob/main/Intelbras/vul01/01.md",
diff --git a/CVE-2025/CVE-2025-524xx/CVE-2025-52492.json b/CVE-2025/CVE-2025-524xx/CVE-2025-52492.json
index 4ed95d2a5eb..bc63fe1fa15 100644
--- a/CVE-2025/CVE-2025-524xx/CVE-2025-52492.json
+++ b/CVE-2025/CVE-2025-524xx/CVE-2025-52492.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52492",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-07T16:15:24.233",
- "lastModified": "2025-07-07T16:15:24.233",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha descubierto una vulnerabilidad en el firmware de Paxton Paxton10 anterior a la versi\u00f3n 4.6 SR6. El archivo de firmware, rootfs.tar.gz, contiene credenciales predefinidas para la API de Twilio. Un atacante remoto que obtenga una copia del firmware puede extraer estas credenciales. Esto podr\u00eda permitirle obtener acceso no autorizado a la cuenta de Twilio asociada, lo que podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n, la posible interrupci\u00f3n del servicio y el uso no autorizado de los servicios de Twilio."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-524xx/CVE-2025-52496.json b/CVE-2025/CVE-2025-524xx/CVE-2025-52496.json
index c11e4c840c3..a624a69b7d9 100644
--- a/CVE-2025/CVE-2025-524xx/CVE-2025-52496.json
+++ b/CVE-2025/CVE-2025-524xx/CVE-2025-52496.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-52496",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.633",
- "lastModified": "2025-07-08T15:15:29.130",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-524xx/CVE-2025-52497.json b/CVE-2025/CVE-2025-524xx/CVE-2025-52497.json
index d967117b947..b389ea6d0fb 100644
--- a/CVE-2025/CVE-2025-524xx/CVE-2025-52497.json
+++ b/CVE-2025/CVE-2025-524xx/CVE-2025-52497.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52497",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.787",
- "lastModified": "2025-07-04T15:15:22.787",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input."
+ },
+ {
+ "lang": "es",
+ "value": "Mbed TLS anterior a 3.6.4 tiene un desbordamiento de b\u00fafer basado en mont\u00f3n de un byte que analiza PEM, en mbedtls_pem_read_buffer y dos funciones mbedtls_pk_parse, a trav\u00e9s de una entrada PEM no confiable."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-525xx/CVE-2025-52554.json b/CVE-2025/CVE-2025-525xx/CVE-2025-52554.json
index ecd333ce4e3..5f23797fa44 100644
--- a/CVE-2025/CVE-2025-525xx/CVE-2025-52554.json
+++ b/CVE-2025/CVE-2025-525xx/CVE-2025-52554.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-52554",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.423",
- "lastModified": "2025-07-03T20:15:23.423",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-527xx/CVE-2025-52718.json b/CVE-2025/CVE-2025-527xx/CVE-2025-52718.json
index 3e8f04c0d2a..238f24675e9 100644
--- a/CVE-2025/CVE-2025-527xx/CVE-2025-52718.json
+++ b/CVE-2025/CVE-2025-527xx/CVE-2025-52718.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52718",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:33.197",
- "lastModified": "2025-07-04T12:15:33.197",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Bearsthemes Alone allows Remote Code Inclusion. This issue affects Alone: from n/a through 7.8.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de control inadecuado de la generaci\u00f3n de c\u00f3digo ('Inyecci\u00f3n de c\u00f3digo') en Bearsthemes Alone permite la inclusi\u00f3n remota de c\u00f3digo. Este problema afecta a Alone desde n/d hasta la versi\u00f3n 7.8.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-527xx/CVE-2025-52776.json b/CVE-2025/CVE-2025-527xx/CVE-2025-52776.json
index 6182386384f..3de9607aba3 100644
--- a/CVE-2025/CVE-2025-527xx/CVE-2025-52776.json
+++ b/CVE-2025/CVE-2025-527xx/CVE-2025-52776.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52776",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:33.370",
- "lastModified": "2025-07-04T12:15:33.370",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in thanhtungtnt Video List Manager allows Stored XSS. This issue affects Video List Manager: from n/a through 1.7."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en thanhtungtnt Video List Manager permite XSS almacenado. Este problema afecta a Video List Manager desde n/d hasta la versi\u00f3n 1.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-527xx/CVE-2025-52796.json b/CVE-2025/CVE-2025-527xx/CVE-2025-52796.json
index 8e6b3ba9570..6c51ca38af7 100644
--- a/CVE-2025/CVE-2025-527xx/CVE-2025-52796.json
+++ b/CVE-2025/CVE-2025-527xx/CVE-2025-52796.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52796",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:33.553",
- "lastModified": "2025-07-04T12:15:33.553",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tggfref WP-Recall allows Reflected XSS. This issue affects WP-Recall: from n/a through 16.26.14."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en tggfref WP-Recall permite XSS reflejado. Este problema afecta a WP-Recall desde n/d hasta la versi\u00f3n 16.26.14."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-527xx/CVE-2025-52798.json b/CVE-2025/CVE-2025-527xx/CVE-2025-52798.json
index 63620d8c62f..5d8a58d9ddb 100644
--- a/CVE-2025/CVE-2025-527xx/CVE-2025-52798.json
+++ b/CVE-2025/CVE-2025-527xx/CVE-2025-52798.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52798",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:33.737",
- "lastModified": "2025-07-04T12:15:33.737",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in eyecix JobSearch allows Reflected XSS. This issue affects JobSearch: from n/a through 2.9.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en eyecix JobSearch permite XSS reflejado. Este problema afecta a JobSearch desde n/d hasta la versi\u00f3n 2.9.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52805.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52805.json
index 8a9167a217f..4e4dbcfcfeb 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52805.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52805.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52805",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:33.927",
- "lastModified": "2025-07-04T12:15:33.927",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path Traversal vulnerability in VaultDweller Leyka allows PHP Local File Inclusion. This issue affects Leyka: from n/a through 3.31.9."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Path Traversal en VaultDweller Leyka permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Leyka desde n/d hasta la versi\u00f3n 3.31.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52807.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52807.json
index 95e56ffb105..31d50a9b895 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52807.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52807.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52807",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:34.107",
- "lastModified": "2025-07-04T12:15:34.107",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusWP Kossy - Minimalist eCommerce WordPress Theme allows PHP Local File Inclusion. This issue affects Kossy - Minimalist eCommerce WordPress Theme: from n/a through 1.45."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de control incorrecto del nombre de archivo para la instrucci\u00f3n Include/Require en programas PHP ('Inclusi\u00f3n remota de archivos PHP') en ApusWP Kossy - Minimalist eCommerce WordPress Theme, permite la inclusi\u00f3n local de archivos PHP. Este problema afecta a Kossy, el tema minimalista de comercio electr\u00f3nico para WordPress, desde n/d hasta la versi\u00f3n 1.45."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52813.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52813.json
index 0ee792b5b07..83bc0eeb4ec 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52813.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52813.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52813",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:34.273",
- "lastModified": "2025-07-04T12:15:34.273",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in pietro MobiLoud allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MobiLoud: from n/a through 4.6.5."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Pietro MobiLoud permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a MobiLoud desde la versi\u00f3n n/d hasta la 4.6.5."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52828.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52828.json
index bf5464e0f12..9c3c83ac599 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52828.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52828.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52828",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:34.453",
- "lastModified": "2025-07-04T12:15:34.453",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in designthemes Red Art allows Object Injection. This issue affects Red Art: from n/a through 3.7."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en designthemes Red Art permite la inyecci\u00f3n de objetos. Este problema afecta a Red Art desde n/d hasta la versi\u00f3n 3.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52830.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52830.json
index 7a9a4efb8db..999b59cff62 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52830.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52830.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52830",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:34.633",
- "lastModified": "2025-07-04T12:15:34.633",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bsecuretech bSecure – Your Universal Checkout allows Blind SQL Injection. This issue affects bSecure – Your Universal Checkout: from n/a through 1.7.9."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en bsecuretech bSecure \u2013 Your Universal Checkout permite la inyecci\u00f3n SQL ciega. Este problema afecta a bSecure - Your Universal Checkout: desde n/d hasta la versi\u00f3n 1.7.9."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52831.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52831.json
index 2e2d9dbd6e1..30d18bf8de1 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52831.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52831.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52831",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:34.820",
- "lastModified": "2025-07-04T12:15:34.820",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in thanhtungtnt Video List Manager allows SQL Injection. This issue affects Video List Manager: from n/a through 1.7."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en thanhtungtnt Video List Manager permite la inyecci\u00f3n SQL. Este problema afecta a Video List Manager desde n/d hasta la versi\u00f3n 1.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52832.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52832.json
index 8aa15fc412c..f9f420b2794 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52832.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52832.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52832",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:35.020",
- "lastModified": "2025-07-04T12:15:35.020",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpo-HR NGG Smart Image Search allows SQL Injection. This issue affects NGG Smart Image Search: from n/a through 3.4.1."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en wpo-HR NGG Smart Image Search permite la inyecci\u00f3n SQL. Este problema afecta a NGG Smart Image Search desde n/d hasta la versi\u00f3n 3.4.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52833.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52833.json
index b37960f71a2..f6753b6f9eb 100644
--- a/CVE-2025/CVE-2025-528xx/CVE-2025-52833.json
+++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52833.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-52833",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T12:15:35.217",
- "lastModified": "2025-07-04T12:15:35.217",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in designthemes LMS allows SQL Injection. This issue affects LMS: from n/a through 9.1."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en designthemes LMS permite la inyecci\u00f3n SQL. Este problema afecta a LMS desde n/d hasta la versi\u00f3n 9.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53167.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53167.json
index c85f631df98..e136aa2552f 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53167.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53167.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53167",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:27.433",
- "lastModified": "2025-07-07T03:15:27.433",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Authentication vulnerability in the distributed collaboration framework module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de autenticaci\u00f3n en el m\u00f3dulo del framework de colaboraci\u00f3n distribuida Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53168.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53168.json
index 9a66b952b35..294890153d0 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53168.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53168.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53168",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:27.577",
- "lastModified": "2025-07-07T03:15:27.577",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of bypassing the process to start SA and use related functions on distributed cameras\nImpact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de omisi\u00f3n del proceso para iniciar SA y usar funciones relacionadas en c\u00e1maras distribuidas Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir que el dispositivo par use la c\u00e1mara sin el conocimiento del usuario."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json
index bfb08f39e48..0dbea0a1297 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53169.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53169",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:27.720",
- "lastModified": "2025-07-07T16:15:24.467",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of bypassing the process to start SA and use related functions on distributed cameras\nImpact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de omisi\u00f3n del proceso para iniciar SA y usar funciones relacionadas en c\u00e1maras distribuidas Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir que el dispositivo par use la c\u00e1mara sin el conocimiento del usuario."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53170.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53170.json
index a88f1ff04ef..1112e255688 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53170.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53170.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53170",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:27.843",
- "lastModified": "2025-07-07T03:15:27.843",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Null pointer dereference vulnerability in the application exit cause module\nImpact: Successful exploitation of this vulnerability may affect function stability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desreferencia de puntero nulo en el m\u00f3dulo de causa de salida de la aplicaci\u00f3n Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53171.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53171.json
index c33222dc0b2..f1c897725f4 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53171.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53171.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53171",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:27.990",
- "lastModified": "2025-07-07T03:15:27.990",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow risk when vector images are parsed during file preview\nImpact: Successful exploitation of this vulnerability may affect the file preview function."
+ },
+ {
+ "lang": "es",
+ "value": "Riesgo de desbordamiento de pila cuando se analizan im\u00e1genes vectoriales durante la vista previa del archivo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de vista previa del archivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53172.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53172.json
index 49cf5c449db..8558a951eec 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53172.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53172.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53172",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:28.133",
- "lastModified": "2025-07-07T03:15:28.133",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow risk when vector images are parsed during file preview\nImpact: Successful exploitation of this vulnerability may affect the file preview function."
+ },
+ {
+ "lang": "es",
+ "value": "Riesgo de desbordamiento de pila cuando se analizan im\u00e1genes vectoriales durante la vista previa del archivo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de vista previa del archivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53173.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53173.json
index a3b790e73a9..08488bb2a8f 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53173.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53173.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53173",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:28.283",
- "lastModified": "2025-07-07T03:15:28.283",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow risk when vector images are parsed during file preview\nImpact: Successful exploitation of this vulnerability may affect the file preview function."
+ },
+ {
+ "lang": "es",
+ "value": "Riesgo de desbordamiento de pila cuando se analizan im\u00e1genes vectoriales durante la vista previa del archivo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de vista previa del archivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53174.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53174.json
index 9adefeafad6..196ee20e796 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53174.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53174.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53174",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:28.420",
- "lastModified": "2025-07-07T03:15:28.420",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow risk when vector images are parsed during file preview\nImpact: Successful exploitation of this vulnerability may affect the file preview function."
+ },
+ {
+ "lang": "es",
+ "value": "Riesgo de desbordamiento de pila cuando se analizan im\u00e1genes vectoriales durante la vista previa del archivo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de vista previa del archivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53175.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53175.json
index 552522e5851..bae140735e9 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53175.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53175.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53175",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:28.567",
- "lastModified": "2025-07-07T03:15:28.567",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow risk when vector images are parsed during file preview\nImpact: Successful exploitation of this vulnerability may affect the file preview function."
+ },
+ {
+ "lang": "es",
+ "value": "Riesgo de desbordamiento de pila cuando se analizan im\u00e1genes vectoriales durante la vista previa del archivo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de vista previa del archivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53176.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53176.json
index 0a1ed865077..87824e6efcd 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53176.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53176.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53176",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:28.707",
- "lastModified": "2025-07-07T03:15:28.707",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack overflow risk when vector images are parsed during file preview\nImpact: Successful exploitation of this vulnerability may affect the file preview function."
+ },
+ {
+ "lang": "es",
+ "value": "Riesgo de desbordamiento de pila cuando se analizan im\u00e1genes vectoriales durante la vista previa del archivo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de vista previa del archivo."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53177.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53177.json
index 30f00f94772..9c391640025 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53177.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53177.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53177",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:28.847",
- "lastModified": "2025-07-07T03:15:28.847",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Permission bypass vulnerability in the calendar storage module\nImpact: Successful exploitation of this vulnerability may affect the schedule syncing function of watches."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de omisi\u00f3n de permisos en el m\u00f3dulo de almacenamiento de calendario Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de sincronizaci\u00f3n de programaci\u00f3n de los relojes."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53178.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53178.json
index 31eabd0ecf4..5d99d06429a 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53178.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53178.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53178",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:29.000",
- "lastModified": "2025-07-07T03:15:29.000",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Permission bypass vulnerability in the calendar storage module\nImpact: Successful exploitation of this vulnerability may affect the schedule reminder function of head units."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de omisi\u00f3n de permisos en el m\u00f3dulo de almacenamiento de calendario Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funci\u00f3n de recordatorio de programaci\u00f3n de las unidades principales."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53179.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53179.json
index 1ebb3acd2eb..0b1053dcecc 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53179.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53179.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53179",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:29.140",
- "lastModified": "2025-07-07T03:15:29.140",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Null pointer dereference vulnerability in the PDF preview module\nImpact: Successful exploitation of this vulnerability may affect function stability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desreferencia de puntero nulo en el m\u00f3dulo de vista previa de PDF Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53180.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53180.json
index b9632be0daf..ba609fa15bc 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53180.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53180.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53180",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:29.313",
- "lastModified": "2025-07-07T03:15:29.313",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Null pointer dereference vulnerability in the PDF preview module\nImpact: Successful exploitation of this vulnerability may affect function stability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desreferencia de puntero nulo en el m\u00f3dulo de vista previa de PDF Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53181.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53181.json
index cd286192862..e7656a7c24c 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53181.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53181.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53181",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:29.480",
- "lastModified": "2025-07-07T03:15:29.480",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Null pointer dereference vulnerability in the PDF preview module\nImpact: Successful exploitation of this vulnerability may affect function stability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desreferencia de puntero nulo en el m\u00f3dulo de vista previa de PDF Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53182.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53182.json
index 7ea70a0c6df..0d7812ff386 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53182.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53182.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53182",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:29.623",
- "lastModified": "2025-07-07T03:15:29.623",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Null pointer dereference vulnerability in the PDF preview module\nImpact: Successful exploitation of this vulnerability may affect function stability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desreferencia de puntero nulo en el m\u00f3dulo de vista previa de PDF Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53183.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53183.json
index 544b9225699..3d658d02b55 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53183.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53183.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53183",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:29.770",
- "lastModified": "2025-07-07T03:15:29.770",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Null pointer dereference vulnerability in the PDF preview module\nImpact: Successful exploitation of this vulnerability may affect function stability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desreferencia de puntero nulo en el m\u00f3dulo de vista previa de PDF Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53184.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53184.json
index e3d0ca83b2b..99aedf43610 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53184.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53184.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53184",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:29.913",
- "lastModified": "2025-07-07T03:15:29.913",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Null pointer dereference vulnerability in the PDF preview module\nImpact: Successful exploitation of this vulnerability may affect function stability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desreferencia de puntero nulo en el m\u00f3dulo de vista previa de PDF Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53185.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53185.json
index 3e504303c53..81beec03cf4 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53185.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53185.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53185",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:30.063",
- "lastModified": "2025-07-07T03:15:30.063",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Virtual address reuse issue in the memory management module, which can be exploited by non-privileged users to access released memory\nImpact: Successful exploitation of this vulnerability may affect service integrity."
+ },
+ {
+ "lang": "es",
+ "value": "Problema de reutilizaci\u00f3n de direcciones virtuales en el m\u00f3dulo de administraci\u00f3n de memoria, que puede ser explotado por usuarios sin privilegios para acceder a la memoria liberada. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la integridad del servicio."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-531xx/CVE-2025-53186.json b/CVE-2025/CVE-2025-531xx/CVE-2025-53186.json
index ebb7371248b..49fe7ca4744 100644
--- a/CVE-2025/CVE-2025-531xx/CVE-2025-53186.json
+++ b/CVE-2025/CVE-2025-531xx/CVE-2025-53186.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53186",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-07-07T03:15:30.213",
- "lastModified": "2025-07-07T03:15:30.213",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability that allows third-party call apps to send broadcasts without verification in the audio framework module\nImpact: Successful exploitation of this vulnerability may affect availability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad que permite que aplicaciones de llamadas de terceros env\u00eden transmisiones sin verificaci\u00f3n en el m\u00f3dulo del marco de audio Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53365.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53365.json
index 731b8facd49..5367c0e2579 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53365.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53365.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53365",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-04T22:15:22.117",
- "lastModified": "2025-07-04T22:15:22.117",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.10.0, if a client deliberately triggers an exception after establishing a streamable HTTP session, this can lead to an uncaught ClosedResourceError on the server side, causing the server to crash and requiring a restart to restore service. Impact may vary depending on the deployment conditions, and presence of infrastructure-level resilience measures. Version 1.10.0 contains a patch for the issue."
+ },
+ {
+ "lang": "es",
+ "value": "MCP Python SDK, llamado \u00abmcp\u00bb en PyPI, es una implementaci\u00f3n en Python del Protocolo de Contexto de Modelo (MCP). Antes de la versi\u00f3n 1.10.0, si un cliente activaba deliberadamente una excepci\u00f3n tras establecer una sesi\u00f3n HTTP con transmisi\u00f3n, esto pod\u00eda generar un error ClosedResourceError no detectado en el servidor, lo que provocaba un fallo del servidor y requer\u00eda un reinicio para restablecer el servicio. El impacto puede variar seg\u00fan las condiciones de implementaci\u00f3n y la presencia de medidas de resiliencia a nivel de infraestructura. La versi\u00f3n 1.10.0 incluye un parche para este problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53366.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53366.json
index 7e1064a27f5..4a57dbe2d16 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53366.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53366.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53366",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-04T22:15:22.300",
- "lastModified": "2025-07-04T22:15:22.300",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.9.4, a validation error in the MCP SDK can cause an unhandled exception when processing malformed requests, resulting in service unavailability (500 errors) until manually restarted. Impact may vary depending on the deployment conditions, and presence of infrastructure-level resilience measures. Version 1.9.4 contains a patch for the issue."
+ },
+ {
+ "lang": "es",
+ "value": "MCP Python SDK, llamado \u00abmcp\u00bb en PyPI, es una implementaci\u00f3n en Python del Protocolo de Contexto de Modelo (MCP). Antes de la versi\u00f3n 1.9.4, un error de validaci\u00f3n en el SDK de MCP pod\u00eda provocar una excepci\u00f3n no controlada al procesar solicitudes malformadas, lo que provocaba la indisponibilidad del servicio (errores 500) hasta que se reiniciara manualmente. El impacto puede variar seg\u00fan las condiciones de implementaci\u00f3n y la presencia de medidas de resiliencia a nivel de infraestructura. La versi\u00f3n 1.9.4 incluye un parche para este problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53367.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53367.json
index a691cd6c1ca..a79f4069dc6 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53367.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53367.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53367",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T21:15:27.493",
- "lastModified": "2025-07-08T15:15:29.423",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53368.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53368.json
index 55855527734..ef26115139b 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53368.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53368.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53368",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.577",
- "lastModified": "2025-07-03T20:15:23.577",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53369.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53369.json
index c3e00f5e543..e1dee6a0d4e 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53369.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53369.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53369",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.737",
- "lastModified": "2025-07-03T20:15:23.737",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53370.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53370.json
index d33558be869..0c80e9964fe 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53370.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53370.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53370",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-03T20:15:23.893",
- "lastModified": "2025-07-03T20:15:23.893",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53372.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53372.json
index 8212bfd3fa0..3dee66478e9 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53372.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53372.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53372",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-08T15:15:29.560",
- "lastModified": "2025-07-08T15:15:29.560",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -55,6 +55,10 @@
{
"url": "https://github.com/alfonsograziano/node-code-sandbox-mcp/security/advisories/GHSA-5w57-2ccq-8w95",
"source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/alfonsograziano/node-code-sandbox-mcp/security/advisories/GHSA-5w57-2ccq-8w95",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53373.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53373.json
index d2135f7b37e..42bc6aa4631 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53373.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53373.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53373",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T16:15:24.950",
- "lastModified": "2025-07-07T16:15:24.950",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Natours is a Tour Booking API. The attacker can easily take over any victim account by injecting an attacker-controlled server domain in the Host header when requesting the /forgetpassword endpoint. This vulnerability is fixed with commit 7401793a8d9ed0f0c250c4e0ee2815d685d7a70b."
+ },
+ {
+ "lang": "es",
+ "value": "Natours es una API de reserva de tours. El atacante puede tomar el control f\u00e1cilmente de cualquier cuenta v\u00edctima inyectando un dominio de servidor controlado por el atacante en el encabezado del host al solicitar el endpoint /forgetpassword. Esta vulnerabilidad se corrige con el commit 7401793a8d9ed0f0c250c4e0ee2815d685d7a70b."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53374.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53374.json
index 9b99489a97f..dcf0dfe34e8 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53374.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53374.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53374",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T16:15:25.113",
- "lastModified": "2025-07-07T16:15:25.113",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated low-privileged account can retrieve detailed profile information about another users in the same organization by directly invoking user.one. The response discloses personally-identifiable information (PII) such as e-mail address, role, two-factor status, organization ID, and various account flags. The fix will be available in the v0.23.7."
+ },
+ {
+ "lang": "es",
+ "value": "Dokploy es una Plataforma como Servicio (PaaS) autoalojada que simplifica la implementaci\u00f3n y la gesti\u00f3n de aplicaciones y bases de datos. Una cuenta autenticada con pocos privilegios puede recuperar informaci\u00f3n detallada del perfil de otros usuarios de la misma organizaci\u00f3n invocando directamente user.one. La respuesta revela informaci\u00f3n de identificaci\u00f3n personal (PII), como la direcci\u00f3n de correo electr\u00f3nico, el rol, el estado de dos factores, el ID de la organizaci\u00f3n y diversas marcas de cuenta. La correcci\u00f3n estar\u00e1 disponible en la versi\u00f3n v0.23.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53375.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53375.json
index 2255fd7fa75..872e75d15cd 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53375.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53375.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53375",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T16:15:25.317",
- "lastModified": "2025-07-07T16:15:25.317",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53376.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53376.json
index 1bb2ea7e04b..e091474278a 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53376.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53376.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53376",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T16:15:25.467",
- "lastModified": "2025-07-07T16:15:25.467",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated, low-privileged user can run arbitrary OS commands on the Dokploy host. The tRPC procedure\ndocker.getContainersByAppNameMatch interpolates the attacker-supplied appName value into a Docker CLI call without sanitisation, enabling command injection under the Dokploy service account. This vulnerability is fixed in 0.23.7."
+ },
+ {
+ "lang": "es",
+ "value": "Dokploy es una Plataforma como Servicio (PaaS) autoalojada que simplifica la implementaci\u00f3n y la gesti\u00f3n de aplicaciones y bases de datos. Un usuario autenticado con pocos privilegios puede ejecutar comandos arbitrarios del sistema operativo en el host de Dokploy. El procedimiento tRPC docker.getContainersByAppNameMatch interpola el valor de appName proporcionado por el atacante en una llamada a la CLI de Docker sin depuraci\u00f3n, lo que permite la inyecci\u00f3n de comandos en la cuenta de servicio de Dokploy. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.23.7."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-533xx/CVE-2025-53377.json b/CVE-2025/CVE-2025-533xx/CVE-2025-53377.json
index c793335a741..51f981a7280 100644
--- a/CVE-2025/CVE-2025-533xx/CVE-2025-53377.json
+++ b/CVE-2025/CVE-2025-533xx/CVE-2025-53377.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53377",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:29.097",
- "lastModified": "2025-07-08T14:15:28.817",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53473.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53473.json
index c815fa86a81..f4d57dbd6e1 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53473.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53473.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53473",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-07-07T05:15:42.160",
- "lastModified": "2025-07-07T05:15:42.160",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "vultures@jpcert.or.jp",
@@ -16,6 +16,10 @@
{
"lang": "en",
"value": "Server-side request forgery (SSRF) vulnerability exists n multiple versions of Nimesa Backup and Recovery, If this vulnerability is exploited, unintended requests may be sent to internal servers."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de Server Side Request Forgery (SSRF) en varias versiones de Nimesa Backup and Recovery. Si se explota esta vulnerabilidad, se pueden enviar solicitudes no deseadas a servidores internos."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53478.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53478.json
index d255194ff12..02a69d5a1be 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53478.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53478.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53478",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T19:15:23.290",
- "lastModified": "2025-07-07T21:15:24.920",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CheckUser extension\u2019s Special:Investigate interface is vulnerable to reflected XSS due to improper escaping of certain internationalized system messages rendered on the \u201cIPs and User agents\u201d tab.\n\n\n\n\nThis issue affects Mediawiki - CheckUser extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "La interfaz Special:Investigate de la extensi\u00f3n CheckUser es vulnerable a XSS reflejado debido al escape incorrecto de ciertos mensajes del sistema internacionalizados que se muestran en la pesta\u00f1a \"IPs y agentes de usuario\". Este problema afecta a Mediawiki - extensi\u00f3n CheckUser: desde la versi\u00f3n 1.39.X hasta la 1.39.13, desde la versi\u00f3n 1.42.X hasta la 1.42.7, desde la versi\u00f3n 1.43.X hasta la 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53480.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53480.json
index 92a2cb634c3..f92f669247a 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53480.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53480.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53480",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-08T15:15:29.720",
- "lastModified": "2025-07-08T15:15:29.720",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53481.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53481.json
index 4caf77b8255..78343be8cfd 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53481.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53481.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53481",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-04T16:15:22.167",
- "lastModified": "2025-07-04T16:15:22.167",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled Resource Consumption vulnerability in Wikimedia Foundation Mediawiki - IPInfo Extension allows Excessive Allocation.This issue affects Mediawiki - IPInfo Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de consumo descontrolado de recursos en Wikimedia Foundation Mediawiki - IPInfo Extension permite una asignaci\u00f3n excesiva. Este problema afecta a Mediawiki - IPInfo Extension: desde 1.39.X hasta 1.39.13, desde 1.42.X hasta 1.42.7, desde 1.43.X hasta 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53482.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53482.json
index 6b2e5790186..5f9789af6fd 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53482.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53482.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53482",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-04T16:15:22.320",
- "lastModified": "2025-07-04T16:15:22.320",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - IPInfo Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - IPInfo Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - IPInfo Extension permite Cross-Site Scripting (XSS). Este problema afecta a Mediawiki - IPInfo Extension: desde 1.39.X hasta 1.39.13, desde 1.42.X hasta 1.42.7, desde 1.43.X hasta 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53483.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53483.json
index 6e6a71c876d..eaa4f021866 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53483.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53483.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53483",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-04T18:15:22.790",
- "lastModified": "2025-07-04T18:15:22.790",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ArchivePage.php, UnarchivePage.php, and VoterEligibilityPage#executeClear() do not validate request methods or CSRF tokens, allowing attackers to trigger sensitive actions if an admin visits a malicious site.\n\n\n\n\nThis issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "ArchivePage.php, UnarchivePage.php y VoterEligibilityPage#executeClear() no validan los m\u00e9todos de solicitud ni los tokens CSRF, lo que permite a los atacantes activar acciones sensibles si un administrador visita un sitio malicioso. Este problema afecta a la extensi\u00f3n Mediawiki - SecurePoll: de la versi\u00f3n 1.39.X a la 1.39.13, de la versi\u00f3n 1.42.X a la 1.42.7 y de la versi\u00f3n 1.43.X a la 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53484.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53484.json
index b5f7d803b48..58ea7b35478 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53484.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53484.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53484",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-04T18:15:23.380",
- "lastModified": "2025-07-04T18:15:23.380",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "User-controlled inputs are improperly escaped in:\n\n\n\n\n * \nVotePage.php (poll option input)\n\n\n\n * \nResultPage::getPagesTab() and getErrorsTab() (user-controllable page names)\n\n\n\n\n\n\n\n\n\n\n\n\nThis allows attackers to inject JavaScript and compromise user sessions under certain conditions.\n\n\n\n\nThis issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Las entradas controladas por el usuario se escapan incorrectamente en: * VotePage.php (opci\u00f3n de encuesta) * ResultPage::getPagesTab() y getErrorsTab() (nombres de p\u00e1gina controlables por el usuario). Esto permite a los atacantes inyectar JavaScript y comprometer las sesiones de usuario bajo ciertas condiciones. Este problema afecta a la extensi\u00f3n Mediawiki - SecurePoll: de la versi\u00f3n 1.39.X a la 1.39.13, de la versi\u00f3n 1.42.X a la 1.42.7 y de la versi\u00f3n 1.43.X a la 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53485.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53485.json
index f9c5e114cff..18d86dd2657 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53485.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53485.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53485",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-04T18:15:23.497",
- "lastModified": "2025-07-04T18:15:23.497",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SetTranslationHandler.php does not validate that the user is an election admin, allowing any (even unauthenticated) user to change election-related translation text. While partially broken in newer MediaWiki versions, the check is still missing.\n\n\n\n\nThis issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "SetTranslationHandler.php no valida que el usuario sea administrador electoral, lo que permite que cualquier usuario (incluso sin autenticar) modifique el texto de traducci\u00f3n relacionado con las elecciones. Aunque funciona parcialmente mal en las versiones m\u00e1s recientes de MediaWiki, la comprobaci\u00f3n sigue sin funcionar. Este problema afecta a Mediawiki - extensi\u00f3n SecurePoll: de la versi\u00f3n 1.39.X a la 1.39.13, de la versi\u00f3n 1.42.X a la 1.42.7 y de la versi\u00f3n 1.43.X a la 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53486.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53486.json
index f7168a81e6c..af82c558cc2 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53486.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53486.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53486",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T15:15:27.947",
- "lastModified": "2025-07-07T20:15:27.460",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WikiCategoryTagCloud extension is vulnerable to reflected XSS via the linkstyle attribute, which is improperly concatenated into inline HTML without escaping. An attacker can inject JavaScript event handlers such as onmouseenter using carefully crafted input via the {{#tag:tagcloud}} parser function, resulting in arbitrary JavaScript execution when a victim hovers over a link in the category cloud.\n\n\n\n\nThe vulnerability exists because the linkstyle parameter is only passed through Sanitizer::checkCss() (which does not escape HTML) and is then directly inserted into a style attribute using string concatenation instead of Html::element or Html::openElement.\n\n\n\n\nThis issue affects Mediawiki - WikiCategoryTagCloud extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "La extensi\u00f3n WikiCategoryTagCloud es vulnerable a XSS reflejado a trav\u00e9s del atributo linkstyle, que se concatena incorrectamente en HTML en l\u00ednea sin escape. Un atacante puede inyectar controladores de eventos JavaScript como \"onmouseenter\" utilizando una entrada cuidadosamente manipulada mediante la funci\u00f3n de an\u00e1lisis {{#tag:tagcloud}}, lo que provoca la ejecuci\u00f3n arbitraria de JavaScript al pasar el cursor sobre un enlace en la nube de categor\u00edas. La vulnerabilidad existe porque el par\u00e1metro linkstyle solo se pasa a trav\u00e9s de Sanitizer::checkCss() (que no escapa HTML) y luego se inserta directamente en un atributo style mediante concatenaci\u00f3n de cadenas en lugar de Html::element o Html::openElement. Este problema afecta a Mediawiki - extensi\u00f3n WikiCategoryTagCloud: de la versi\u00f3n 1.39.X a la 1.39.13, de la versi\u00f3n 1.42.X a la 1.42.7 y de la versi\u00f3n 1.43.X a la 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53487.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53487.json
index 1b96ab9c1a1..b4402416eac 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53487.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53487.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53487",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T16:15:25.623",
- "lastModified": "2025-07-07T20:15:27.617",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ApprovedRevs extension for MediaWiki is vulnerable to stored XSS in multiple locations where system messages are inserted into raw HTML without proper escaping. Attackers can exploit this by injecting JavaScript payloads via the uselang=x-xss language override, which causes crafted message keys to be rendered unescaped.\n\n\n\n\nThis issue affects Mediawiki - ApprovedRevs extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "La extensi\u00f3n ApprovedRevs para MediaWiki es vulnerable a XSS almacenado en varias ubicaciones donde los mensajes del sistema se insertan en HTML sin formato sin el escape adecuado. Los atacantes pueden explotar esto inyectando payloads de JavaScript mediante la sobreescritura de lenguaje uselang=x-xss, lo que provoca que las claves de mensaje creadas se representen sin escape. Este problema afecta a Mediawiki - extensi\u00f3n ApprovedRevs: de la versi\u00f3n 1.39.X a la 1.39.13, de la versi\u00f3n 1.42.X a la 1.42.7 y de la versi\u00f3n 1.43.X a la 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53488.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53488.json
index d31e90999fd..0d5c286a89d 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53488.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53488.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53488",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T19:15:23.413",
- "lastModified": "2025-07-07T19:15:23.413",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - WikiHiero Extension allows Stored XSS.This issue affects Mediawiki - WikiHiero Extension: from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - WikiHiero Extension permite XSS almacenado. Este problema afecta a Mediawiki - WikiHiero Extension: desde 1.43.X hasta 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53489.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53489.json
index 1cd1ca27ebd..365a6e3cbed 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53489.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53489.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53489",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-03T17:15:39.850",
- "lastModified": "2025-07-03T18:15:21.710",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53490.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53490.json
index 1ee9f99f748..91ed8ea4bb6 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53490.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53490.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53490",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-03T16:15:23.823",
- "lastModified": "2025-07-03T18:15:22.000",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53491.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53491.json
index 330a56e858a..e15fefafc9a 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53491.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53491.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53491",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T17:15:29.267",
- "lastModified": "2025-07-07T20:15:27.767",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - FlaggedRevs Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - FlaggedRevs Extension: from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - FlaggedRevs Extension permite Cross-Site Scripting (XSS). Este problema afecta a la extensi\u00f3n Mediawiki - FlaggedRevs: desde 1.43.X hasta 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53495.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53495.json
index 8d9c852359e..1b68fb4d9fc 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53495.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53495.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53495",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T19:15:23.540",
- "lastModified": "2025-07-07T19:15:23.540",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Wikimedia Foundation Mediawiki - AbuseFilter Extension que permite acceso no autorizado. Este problema afecta a la extensi\u00f3n Mediawiki - AbuseFilter: desde 1.39.X hasta 1.39.13, desde 1.42.X hasta 1.42.7, desde 1.43.X hasta 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53496.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53496.json
index 2107f5a3f67..7bf04ebab3b 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53496.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53496.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53496",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T20:15:27.910",
- "lastModified": "2025-07-07T21:15:25.130",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MediaSearch Extension allows Stored XSS.This issue affects Mediawiki - MediaSearch Extension: from 1.39.X before 1.39.13, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - MediaSearch Extension permite XSS almacenado. Este problema afecta a Mediawiki - MediaSearch Extension: desde 1.39.X hasta 1.39.13, desde 1.43.X hasta 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53497.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53497.json
index 57e8b327d76..d5afce1e3bd 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53497.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53497.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53497",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T17:15:29.400",
- "lastModified": "2025-07-07T21:15:25.290",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - RelatedArticles Extension allows Stored XSS.This issue affects Mediawiki - RelatedArticles Extension: from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - RelatedArticles Extension permite XSS almacenado. Este problema afecta a la extensi\u00f3n Mediawiki - RelatedArticles: desde 1.43.X hasta 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53498.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53498.json
index 730c5f2804e..93414bbeb09 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53498.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53498.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53498",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T19:15:23.667",
- "lastModified": "2025-07-07T19:15:23.667",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ": Insufficient Logging vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Data Leakage Attacks.This issue affects Mediawiki - AbuseFilter Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": ":La vulnerabilidad de registro insuficiente en Wikimedia Foundation Mediawiki - AbuseFilter Extension permite ataques de fuga de datos. Este problema afecta a la extensi\u00f3n Mediawiki - AbuseFilter: desde 1.39.X hasta 1.39.13, desde 1.42.X hasta 1.42.7, desde 1.43.X hasta 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53499.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53499.json
index b397ad7e7d9..9a76d5b1d74 100644
--- a/CVE-2025/CVE-2025-534xx/CVE-2025-53499.json
+++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53499.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53499",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T19:15:23.787",
- "lastModified": "2025-07-07T19:15:23.787",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ": Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": ":La vulnerabilidad de autorizaci\u00f3n faltante en Wikimedia Foundation Mediawiki - AbuseFilter Extension permite el acceso no autorizado. Este problema afecta a la extensi\u00f3n Mediawiki - AbuseFilter: desde 1.39.X hasta 1.39.13, desde 1.42.X hasta 1.42.7, desde 1.43.X hasta 1.43.2."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53500.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53500.json
index 3f32c77aa36..ff9c0167916 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53500.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53500.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53500",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-03T17:15:39.990",
- "lastModified": "2025-07-03T18:15:22.140",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53501.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53501.json
index abd35eec411..c7c6a1dc039 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53501.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53501.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53501",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-03T17:15:40.127",
- "lastModified": "2025-07-03T18:15:22.300",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53502.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53502.json
index 3df7468ca21..bb48768b197 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53502.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53502.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53502",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-03T17:15:40.250",
- "lastModified": "2025-07-03T18:15:22.530",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53512.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53512.json
new file mode 100644
index 00000000000..c1d7a897f04
--- /dev/null
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53512.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-53512",
+ "sourceIdentifier": "security@ubuntu.com",
+ "published": "2025-07-08T17:16:04.400",
+ "lastModified": "2025-07-08T17:16:04.400",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@ubuntu.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@ubuntu.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-285"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/juju/juju/security/advisories/GHSA-r64v-82fh-xc63",
+ "source": "security@ubuntu.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53513.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53513.json
new file mode 100644
index 00000000000..d7cc9ad888d
--- /dev/null
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53513.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-53513",
+ "sourceIdentifier": "security@ubuntu.com",
+ "published": "2025-07-08T17:16:04.593",
+ "lastModified": "2025-07-08T17:16:04.593",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@ubuntu.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@ubuntu.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-24"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8",
+ "source": "security@ubuntu.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53525.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53525.json
index 4f85bbeb9c2..d1936e3fd9e 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53525.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53525.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53525",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:29.530",
- "lastModified": "2025-07-07T17:15:29.530",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the profile_familiar.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the id_dependente parameter. This vulnerability is fixed in 3.4.3."
+ },
+ {
+ "lang": "es",
+ "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado en el endpoint profile_familiar.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro id_dependente. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.4.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53526.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53526.json
index 698c14a14e5..12da8d84bf6 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53526.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53526.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53526",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:29.690",
- "lastModified": "2025-07-07T17:15:29.690",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. An XSS Injection vulnerability was identified in novo_memorando.php.\nAfter the memo was submitted, the vulnerability was confirmed by accessing listar_memorandos_antigos.php. Upon loading this page, the injected script was executed in the browser. This vulnerability is fixed in 3.4.3."
+ },
+ {
+ "lang": "es",
+ "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de inyecci\u00f3n XSS en novo_memorando.php. Tras enviar el memorando, se confirm\u00f3 la vulnerabilidad accediendo a listar_memorandos_antigos.php. Al cargar esta p\u00e1gina, el script inyectado se ejecut\u00f3 en el navegador. Esta vulnerabilidad est\u00e1 corregida en la versi\u00f3n 3.4.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53527.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53527.json
index 61d0b9def56..75eaf266b8a 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53527.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53527.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53527",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:29.860",
- "lastModified": "2025-07-08T14:15:28.937",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53529.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53529.json
index fdf0f1d6ac6..fa5d3bec606 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53529.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53529.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53529",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:30.030",
- "lastModified": "2025-07-07T17:15:30.030",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. An SQL Injection vulnerability was identified in the /html/funcionario/profile_funcionario.php endpoint. The id_funcionario parameter is not properly sanitized or validated before being used in a SQL query, allowing an unauthenticated attacker to inject arbitrary SQL commands. The vulnerability is fixed in 3.4.3."
+ },
+ {
+ "lang": "es",
+ "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en el endpoint /html/funcionario/profile_funcionario.php. El par\u00e1metro id_funcionario no se depur\u00f3 ni valid\u00f3 correctamente antes de usarse en una consulta SQL, lo que permiti\u00f3 que un atacante no autenticado inyectara comandos SQL arbitrarios. La vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.4.3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53530.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53530.json
index 87cd4fb0d4e..ef8647f6dd2 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53530.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53530.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53530",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:30.197",
- "lastModified": "2025-07-07T17:15:30.197",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the errorstr parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks. This vulnerability is fixed in 3.3.0."
+ },
+ {
+ "lang": "es",
+ "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. El servidor Wegia presenta una vulnerabilidad que permite solicitudes HTTP GET excesivamente largas a una URL espec\u00edfica. Este problema se debe a la falta de validaci\u00f3n de la longitud del par\u00e1metro errorstr. Las pruebas confirmaron que el servidor procesa URL de hasta 8142 caracteres, lo que resulta en un alto consumo de recursos, alta latencia, tiempos de espera y errores de lectura. Esto hace que el servidor sea susceptible a ataques de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.3.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53531.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53531.json
index 44433294c15..569a70ee66d 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53531.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53531.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53531",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:30.363",
- "lastModified": "2025-07-07T17:15:30.363",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the fid parameter. Tests confirmed that the server processes URLs up to 8,142 characters, resulting in high resource consumption, elevated latency, timeouts, and read errors. This makes the server susceptible to Denial of Service (DoS) attacks. This vulnerability is fixed in 3.3.0."
+ },
+ {
+ "lang": "es",
+ "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. El servidor Wegia presenta una vulnerabilidad que permite solicitudes HTTP GET excesivamente largas a una URL espec\u00edfica. Este problema se debe a la falta de validaci\u00f3n de la longitud del par\u00e1metro fid. Las pruebas confirmaron que el servidor procesa URL de hasta 8142 caracteres, lo que resulta en un alto consumo de recursos, alta latencia, tiempos de espera y errores de lectura. Esto hace que el servidor sea susceptible a ataques de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.3.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53532.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53532.json
index d4db3a61a03..4b3f9fc092c 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53532.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53532.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53532",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T17:15:30.533",
- "lastModified": "2025-07-07T17:15:30.533",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "giscus is a commenting system powered by GitHub Discussions. A bug in giscus' discussions creation API allowed an unauthorized user to create discussions on any repository where giscus is installed. This affects the server-side part of giscus, which is provided via http://giscus.app or your own self-hosted service. This vulnerability is fixed by the c43af7806e65adfcf4d0feeebef76dc36c95cb9a and 4b9745fe1a326ce08d69f8a388331bc993d19389 commits."
+ },
+ {
+ "lang": "es",
+ "value": "giscus es un sistema de comentarios impulsado por Discusiones de GitHub. Un error en la API de creaci\u00f3n de discusiones de giscus permiti\u00f3 que un usuario no autorizado creara discusiones en cualquier repositorio donde estuviera instalado. Esto afecta a la parte del servidor de giscus, que se proporciona a trav\u00e9s de http://giscus.app o de un servicio alojado por el usuario. Esta vulnerabilidad se corrige con las confirmaciones c43af7806e65adfcf4d0feeebef76dc36c95cb9a y 4b9745fe1a326ce08d69f8a388331bc993d19389."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53535.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53535.json
index e441abd80ef..e6673e590af 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53535.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53535.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53535",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T18:15:28.810",
- "lastModified": "2025-07-07T18:15:28.810",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Better Auth is an authentication and authorization library for TypeScript. An open redirect has been found in the originCheck middleware function, which affects the following routes: /verify-email, /reset-password/:token, /delete-user/callback, /magic-link/verify, /oauth-proxy-callback. This vulnerability is fixed in 1.2.10."
+ },
+ {
+ "lang": "es",
+ "value": "Better Auth es una librer\u00eda de autenticaci\u00f3n y autorizaci\u00f3n para TypeScript. Se ha detectado una redirecci\u00f3n abierta en la funci\u00f3n de middleware originCheck, que afecta a las siguientes rutas: /verify-email, /reset-password/:token, /delete-user/callback, /magic-link/verify y /oauth-proxy-callback. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.2.10."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53536.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53536.json
index d10dca3dfef..d9682b2ee38 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53536.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53536.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53536",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T18:15:28.980",
- "lastModified": "2025-07-07T18:15:28.980",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Roo Code is an AI-powered autonomous coding agent. Prior to 3.22.6, if the victim had \"Write\" auto-approved, an attacker with the ability to submit prompts to the agent could write to VS Code settings files and trigger code execution. There were multiple ways to achieve that. One example is with the php.validate.executablePath setting which lets you set the path for the php executable for syntax validation. The attacker could have written the path to an arbitrary command there and then created a php file to trigger it. This vulnerability is fixed in 3.22.6."
+ },
+ {
+ "lang": "es",
+ "value": "Roo Code es un agente de codificaci\u00f3n aut\u00f3nomo basado en IA. Antes de la versi\u00f3n 3.22.6, si la v\u00edctima ten\u00eda la opci\u00f3n \"Escribir\" aprobada autom\u00e1ticamente, un atacante con la capacidad de enviar solicitudes al agente pod\u00eda escribir en los archivos de configuraci\u00f3n de VS Code y activar la ejecuci\u00f3n del c\u00f3digo. Hab\u00eda varias maneras de lograrlo. Un ejemplo es la configuraci\u00f3n php.validate.executablePath, que permite establecer la ruta del ejecutable PHP para la validaci\u00f3n de sintaxis. El atacante podr\u00eda haber escrito la ruta a un comando arbitrario y luego haber creado un archivo PHP para activarlo. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.22.6."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53539.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53539.json
index e1425492929..d044762846d 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53539.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53539.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53539",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T20:15:28.027",
- "lastModified": "2025-07-07T20:15:28.027",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FastAPI Guard is a security library for FastAPI that provides middleware to control IPs, log requests, and detect penetration attempts. fastapi-guard's penetration attempts detection uses regex to scan incoming requests. However, some of the regex patterns used in detection are extremely inefficient and can cause polynomial complexity backtracks when handling specially crafted inputs. This vulnerability is fixed in 3.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "FastAPI Guard es una librer\u00eda de seguridad para FastAPI que proporciona middleware para controlar IP, registrar solicitudes y detectar intentos de penetraci\u00f3n. La detecci\u00f3n de intentos de penetraci\u00f3n de fastapi-guard utiliza expresiones regulares para analizar las solicitudes entrantes. Sin embargo, algunos patrones de expresiones regulares utilizados en la detecci\u00f3n son extremadamente ineficientes y pueden causar retrocesos de complejidad polin\u00f3mica al procesar entradas especialmente manipuladas. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.0.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53540.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53540.json
index ae23d388cdb..e7bd8e34e73 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53540.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53540.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53540",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T20:15:28.173",
- "lastModified": "2025-07-07T20:15:28.173",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Several OTA update examples and the HTTPUpdateServer implementation are vulnerable to Cross-Site Request Forgery (CSRF). The update endpoints accept POST requests for firmware uploads without CSRF protection. This allows an attacker to upload and execute arbitrary firmware, resulting in remote code execution (RCE). This vulnerability is fixed in 3.2.1."
+ },
+ {
+ "lang": "es",
+ "value": "Arduino-esp32 es un n\u00facleo Arduino para los microcontroladores ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 y ESP32-H2. Varios ejemplos de actualizaciones OTA y la implementaci\u00f3n HTTPUpdateServer son vulnerables a Cross-Site Request Forgery (CSRF). Los endpoints de actualizaci\u00f3n aceptan solicitudes POST para la carga de firmware sin protecci\u00f3n CSRF. Esto permite a un atacante cargar y ejecutar firmware arbitrario, lo que resulta en la ejecuci\u00f3n remota de c\u00f3digo (RCE). Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.1."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53543.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53543.json
index 46c9fd503f6..fa179a65034 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53543.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53543.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53543",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-07T20:15:28.323",
- "lastModified": "2025-07-07T20:15:28.323",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kestra is an event-driven orchestration platform. The error message in execution \"Overview\" tab is vulnerable to stored XSS due to improper handling of HTTP response received. This vulnerability is fixed in 0.22.0."
+ },
+ {
+ "lang": "es",
+ "value": "Kestra es una plataforma de orquestaci\u00f3n basada en eventos. El mensaje de error en la pesta\u00f1a \"Overview\" de la ejecuci\u00f3n es vulnerable a XSS almacenado debido al manejo incorrecto de la respuesta HTTP recibida. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.22.0."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53545.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53545.json
index 4d2d4c0713c..5055a00a0ec 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53545.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53545.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53545",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-08T15:15:29.850",
- "lastModified": "2025-07-08T15:15:29.850",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53566.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53566.json
index 7564247505c..98341dfcec9 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53566.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53566.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53566",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:35.737",
- "lastModified": "2025-07-04T09:15:35.737",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53568.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53568.json
index 8f4e176f01d..996593705f0 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53568.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53568.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53568",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:36.370",
- "lastModified": "2025-07-04T09:15:36.370",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53569.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53569.json
index f63b3b41546..e07cfe6fdba 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53569.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53569.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53569",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-07-04T09:15:36.560",
- "lastModified": "2025-07-04T09:15:36.560",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53599.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53599.json
index 2e8d929767b..47203d8f81c 100644
--- a/CVE-2025/CVE-2025-535xx/CVE-2025-53599.json
+++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53599.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53599",
"sourceIdentifier": "cve@navercorp.com",
"published": "2025-07-04T08:15:25.687",
- "lastModified": "2025-07-04T08:15:25.687",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53600.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53600.json
index c3a62674734..3a021980a22 100644
--- a/CVE-2025/CVE-2025-536xx/CVE-2025-53600.json
+++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53600.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53600",
"sourceIdentifier": "cve@navercorp.com",
"published": "2025-07-04T08:15:25.823",
- "lastModified": "2025-07-04T08:15:25.823",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53602.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53602.json
index 8a0eac2a8db..df8f64ce982 100644
--- a/CVE-2025/CVE-2025-536xx/CVE-2025-53602.json
+++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53602.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53602",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T21:15:23.560",
- "lastModified": "2025-07-04T21:15:23.560",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zipkin through 3.5.1 has a /heapdump endpoint (associated with the use of Spring Boot Actuator), a similar issue to CVE-2025-48927."
+ },
+ {
+ "lang": "es",
+ "value": "Zipkin hasta la versi\u00f3n 3.5.1 tiene un endpoint /heapdump (asociado con el uso de Spring Boot Actuator), un problema similar a CVE-2025-48927."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53603.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53603.json
index e8b8af615b8..c7a4f80a181 100644
--- a/CVE-2025/CVE-2025-536xx/CVE-2025-53603.json
+++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53603.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-53603",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T01:15:27.360",
- "lastModified": "2025-07-08T15:15:30.317",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53604.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53604.json
index 561d568066f..0e2e5d43a55 100644
--- a/CVE-2025/CVE-2025-536xx/CVE-2025-53604.json
+++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53604.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53604",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T01:15:28.340",
- "lastModified": "2025-07-05T01:15:28.340",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web-push crate before 0.10.3 for Rust allows a denial of service (memory consumption) in the built-in clients via a large integer in a Content-Length header."
+ },
+ {
+ "lang": "es",
+ "value": "web-push crate anterior a la versi\u00f3n 0.10.3 para Rust permite una denegaci\u00f3n de servicio (consumo de memoria) en los clientes integrados a trav\u00e9s de un entero grande en un encabezado Content-Length."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53605.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53605.json
index 4488f31f724..f38659a5e17 100644
--- a/CVE-2025/CVE-2025-536xx/CVE-2025-53605.json
+++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53605.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-53605",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-05T01:15:28.523",
- "lastModified": "2025-07-05T01:15:28.523",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The protobuf crate before 3.7.2 for Rust allows uncontrolled recursion in the protobuf::coded_input_stream::CodedInputStream::skip_group parsing of unknown fields in untrusted input."
+ },
+ {
+ "lang": "es",
+ "value": "protobuf crate anterior a 3.7.2 para Rust permite una recursi\u00f3n no controlada en el an\u00e1lisis protobuf::coded_input_stream::CodedInputStream::skip_group de campos desconocidos en entradas no confiables."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5322.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5322.json
index 46dc1dfa6a8..40a156bbeb6 100644
--- a/CVE-2025/CVE-2025-53xx/CVE-2025-5322.json
+++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5322.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5322",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-03T22:15:21.287",
- "lastModified": "2025-07-03T22:15:21.287",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5333.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5333.json
index 6c2c17004d9..d904041ea8c 100644
--- a/CVE-2025/CVE-2025-53xx/CVE-2025-5333.json
+++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5333.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5333",
"sourceIdentifier": "secure@symantec.com",
"published": "2025-07-06T14:15:27.573",
- "lastModified": "2025-07-07T14:15:25.123",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5351.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5351.json
index 421dcc89305..483dfeb8537 100644
--- a/CVE-2025/CVE-2025-53xx/CVE-2025-5351.json
+++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5351.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5351",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-07-04T09:15:37.100",
- "lastModified": "2025-07-04T09:15:37.100",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5372.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5372.json
index 5bfdfa05387..abef37f92fe 100644
--- a/CVE-2025/CVE-2025-53xx/CVE-2025-5372.json
+++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5372.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5372",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-07-04T06:15:24.930",
- "lastModified": "2025-07-04T06:15:24.930",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5450.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5450.json
index c4c24f4a548..6dba2cd0b72 100644
--- a/CVE-2025/CVE-2025-54xx/CVE-2025-5450.json
+++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5450.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5450",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-07-08T15:15:31.103",
- "lastModified": "2025-07-08T15:15:31.103",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5451.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5451.json
index a45c602b38c..939cd2a79f3 100644
--- a/CVE-2025/CVE-2025-54xx/CVE-2025-5451.json
+++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5451.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5451",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-07-08T15:15:31.817",
- "lastModified": "2025-07-08T15:15:31.817",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5463.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5463.json
index b4a3c3bb8be..b823bc87a7f 100644
--- a/CVE-2025/CVE-2025-54xx/CVE-2025-5463.json
+++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5463.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5463",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-07-08T15:15:32.010",
- "lastModified": "2025-07-08T15:15:32.010",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5464.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5464.json
new file mode 100644
index 00000000000..51f89636548
--- /dev/null
+++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5464.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-5464",
+ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "published": "2025-07-08T16:15:58.547",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Insertion of sensitive information into a log file in Ivanti Connect Secure before version 22.7R2.8 allows a local authenticated attacker to obtain that information."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs",
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5472.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5472.json
index 51fe1155dc5..57e5ebbc71e 100644
--- a/CVE-2025/CVE-2025-54xx/CVE-2025-5472.json
+++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5472.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-5472",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:28.873",
- "lastModified": "2025-07-07T10:15:28.873",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structures, leading to a RecursionError and crashing applications. The root cause is the unsafe recursive traversal design and lack of depth validation, which makes the JSONReader susceptible to stack overflow when processing deeply nested JSON. This impacts the availability of services, making them unreliable and disrupting workflows. The issue is resolved in version 0.12.38."
+ },
+ {
+ "lang": "es",
+ "value": "JSONReader en run-llama/llama_index, versi\u00f3n 0.12.28, es vulnerable a un desbordamiento de pila debido al an\u00e1lisis recursivo incontrolado de JSON. Esta vulnerabilidad permite a los atacantes activar una denegaci\u00f3n de servicio (DoS) al enviar estructuras JSON profundamente anidadas, lo que genera un error de recursi\u00f3n (RecursionError) y bloquea las aplicaciones. La causa principal es el dise\u00f1o inseguro del recorrido recursivo y la falta de validaci\u00f3n de profundidad, lo que hace que el JSONReader sea susceptible a un desbordamiento de pila al procesar JSON profundamente anidado. Esto afecta la disponibilidad de los servicios, haci\u00e9ndolos poco fiables e interrumpiendo los flujos de trabajo. El problema se ha resuelto en la versi\u00f3n 0.12.38."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5537.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5537.json
index 1d43bd1c91b..54253069a70 100644
--- a/CVE-2025/CVE-2025-55xx/CVE-2025-5537.json
+++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5537.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-5537",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T05:15:30.420",
- "lastModified": "2025-07-08T05:15:30.420",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Lightbox & Modal Popup WordPress Plugin \u2013 FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and including, 2.7.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Lightbox & Modal Popup WordPress Plugin \u2013 FooBox para WordPress es vulnerable a cross site scripting almacenado mediante textos alternativos de im\u00e1genes en todas las versiones hasta la 2.7.34 incluida, debido a una limpieza de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de autor o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5567.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5567.json
index b205b2f976a..4c879c8b97f 100644
--- a/CVE-2025/CVE-2025-55xx/CVE-2025-5567.json
+++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5567.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5567",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:21.040",
- "lastModified": "2025-07-04T03:15:21.040",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5570.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5570.json
index fb2f9067183..80e9bd7e09f 100644
--- a/CVE-2025/CVE-2025-55xx/CVE-2025-5570.json
+++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5570.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-5570",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T03:15:30.423",
- "lastModified": "2025-07-08T03:15:30.423",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AI Engine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the mwai_chatbot shortcode 'id' parameter in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento AI Engine para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'id' del shortcode mwai_chatbot en todas las versiones hasta la 2.8.4 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5920.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5920.json
index 8de2d059ac0..70804106942 100644
--- a/CVE-2025/CVE-2025-59xx/CVE-2025-5920.json
+++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5920.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5920",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-07-04T10:15:24.223",
- "lastModified": "2025-07-04T10:15:24.223",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5924.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5924.json
index 665fac8c2f2..e184be9e643 100644
--- a/CVE-2025/CVE-2025-59xx/CVE-2025-5924.json
+++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5924.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5924",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:21.240",
- "lastModified": "2025-07-04T03:15:21.240",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5933.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5933.json
index 832c9da2992..2a081220169 100644
--- a/CVE-2025/CVE-2025-59xx/CVE-2025-5933.json
+++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5933.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5933",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:21.407",
- "lastModified": "2025-07-04T03:15:21.407",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5953.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5953.json
index de86f41e5b3..d1cc92e8f42 100644
--- a/CVE-2025/CVE-2025-59xx/CVE-2025-5953.json
+++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5953.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5953",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:21.583",
- "lastModified": "2025-07-04T03:15:21.583",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5956.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5956.json
index e8a1cdd4d65..aff5c05bde6 100644
--- a/CVE-2025/CVE-2025-59xx/CVE-2025-5956.json
+++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5956.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-5956",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:21.747",
- "lastModified": "2025-07-04T03:15:21.747",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5957.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5957.json
index 6c6a58432da..ab973baac41 100644
--- a/CVE-2025/CVE-2025-59xx/CVE-2025-5957.json
+++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5957.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-5957",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T05:15:30.660",
- "lastModified": "2025-07-08T05:15:30.660",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Guest Support \u2013 Complete customer support ticket system for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteMassTickets' function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete arbitrary support tickets."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Guest Support \u2013 Complete customer support ticket system for WordPress para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a la falta de comprobaci\u00f3n de la funci\u00f3n \"deleteMassTickets\" en todas las versiones hasta la 1.2.2 incluida. Esto permite que atacantes no autenticados eliminen tickets de soporte arbitrarios."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5987.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5987.json
index 3018b148364..7b910101229 100644
--- a/CVE-2025/CVE-2025-59xx/CVE-2025-5987.json
+++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5987.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-5987",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-07-07T15:15:28.180",
- "lastModified": "2025-07-07T15:15:28.180",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes."
+ },
+ {
+ "lang": "es",
+ "value": "Se detect\u00f3 una falla en libssh al usar el cifrado ChaCha20 con la librer\u00eda OpenSSL. Si un atacante logra agotar el espacio del mont\u00f3n, este error no se detecta y puede provocar que libssh use un contexto de cifrado parcialmente inicializado. Esto se debe a que el c\u00f3digo de error de OpenSSL devolvi\u00f3 alias con el c\u00f3digo SSH_OK, lo que impide que libssh detecte correctamente el error devuelto por la librer\u00eda OpenSSL. Este problema puede provocar un comportamiento indefinido, como la confidencialidad e integridad de los datos comprometidas o fallos."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6039.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6039.json
index d150b58d215..35d3c689d15 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6039.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6039.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6039",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:21.910",
- "lastModified": "2025-07-04T03:15:21.910",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6041.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6041.json
index b836863cd0a..a5b3545d6bc 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6041.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6041.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6041",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:22.080",
- "lastModified": "2025-07-04T03:15:22.080",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6044.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6044.json
index b4eec78db6c..2d17e08003b 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6044.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6044.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6044",
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
"published": "2025-07-07T19:15:23.920",
- "lastModified": "2025-07-07T19:15:23.920",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on Lenovo devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de control de acceso inadecuado en el componente Stylus Tools de Google ChromeOS versi\u00f3n 16238.64.0 en dispositivos Lenovo permite a un atacante f\u00edsico eludir la pantalla de bloqueo y acceder a los archivos del usuario quitando el l\u00e1piz mientras el dispositivo est\u00e1 cerrado y usando la funci\u00f3n de captura de pantalla."
}
],
"metrics": {},
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6056.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6056.json
index 4decfe5ba51..c7218902c70 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6056.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6056.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6056",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-07-04T12:15:35.407",
- "lastModified": "2025-07-04T12:15:35.407",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Timing difference in password reset in Ergon Informatik AG's Airlock IAM 7.7.9, 8.0.8, 8.1.7, 8.2.4 and 8.3.1 allows unauthenticated attackers to enumerate usernames."
+ },
+ {
+ "lang": "es",
+ "value": "La diferencia de tiempo en el restablecimiento de contrase\u00f1a en Airlock IAM 7.7.9, 8.0.8, 8.1.7, 8.2.4 y 8.3.1 de Ergon Informatik AG permite a atacantes no autenticados enumerar nombres de usuario."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6071.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6071.json
index bde19436cf2..6d850c2e72d 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6071.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6071.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6071",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2025-07-03T17:15:40.373",
- "lastModified": "2025-07-03T17:15:40.373",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6072.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6072.json
index c05f37db4c9..7a72d7eda6f 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6072.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6072.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6072",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2025-07-03T17:15:40.567",
- "lastModified": "2025-07-03T17:15:40.567",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6073.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6073.json
index aa9daaf2b47..c8c4e206da7 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6073.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6073.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6073",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2025-07-03T17:15:40.750",
- "lastModified": "2025-07-03T17:15:40.750",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6074.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6074.json
index bb88336660e..cd0640f1596 100644
--- a/CVE-2025/CVE-2025-60xx/CVE-2025-6074.json
+++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6074.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6074",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2025-07-03T17:15:40.920",
- "lastModified": "2025-07-03T17:15:40.920",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6209.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6209.json
index 2480d3bf9ba..d5510cc3635 100644
--- a/CVE-2025/CVE-2025-62xx/CVE-2025-6209.json
+++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6209.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6209",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T13:15:28.823",
- "lastModified": "2025-07-07T14:15:25.287",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de path traversal en las versiones 0.12.27 a 0.12.40 de run-llama/llama_index, espec\u00edficamente en la funci\u00f3n `encode_image` de `generic_utils.py`. Esta vulnerabilidad permite a un atacante manipular la entrada `image_path` para leer archivos arbitrarios en el servidor, incluyendo archivos sensibles del sistema. El problema surge debido a una validaci\u00f3n o depuraci\u00f3n incorrecta de la ruta del archivo, lo que permite que las secuencias de path traversal accedan a archivos fuera del directorio previsto. La vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.12.41."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6210.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6210.json
index 4be33092bc5..51e6867146d 100644
--- a/CVE-2025/CVE-2025-62xx/CVE-2025-6210.json
+++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6210.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6210",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:29.040",
- "lastModified": "2025-07-07T10:15:29.040",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6238.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6238.json
index cde4d6ed812..ad2b9d0f078 100644
--- a/CVE-2025/CVE-2025-62xx/CVE-2025-6238.json
+++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6238.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6238",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:22.237",
- "lastModified": "2025-07-04T03:15:22.237",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6244.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6244.json
index da06aa7e4da..ef3cd139ed2 100644
--- a/CVE-2025/CVE-2025-62xx/CVE-2025-6244.json
+++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6244.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6244",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T03:15:30.947",
- "lastModified": "2025-07-08T03:15:30.947",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Essential Addons for Elementor \u2013 Popular Elementor Templates and Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the via `Calendar` And `Business Reviews` Widgets attributes in all versions up to, and including, 6.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Essential Addons for Elementor \u2013 Popular Elementor Templates and Widgets para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s de los atributos de los widgets \"Calendario\" y \"Rese\u00f1as de negocios\" en todas las versiones hasta la 6.1.19 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6278.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6278.json
index ba593651d0b..3078d717b7e 100644
--- a/CVE-2025/CVE-2025-62xx/CVE-2025-6278.json
+++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6278.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-19T21:15:27.017",
- "lastModified": "2025-06-23T20:16:40.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:38:18.260",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -120,26 +140,62 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:upsonic:upsonic:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "0.55.6",
+ "matchCriteriaId": "17760E5D-1975-49B2-92E4-AE56DA2031E0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/Upsonic/Upsonic/issues/356",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.313282",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.313282",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.593096",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/Upsonic/Upsonic/issues/356",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6279.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6279.json
index 9b7fc63ca00..bbad3290633 100644
--- a/CVE-2025/CVE-2025-62xx/CVE-2025-6279.json
+++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6279.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-19T21:15:27.203",
- "lastModified": "2025-06-23T20:16:40.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-07-08T16:36:41.900",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -122,28 +142,76 @@
"value": "CWE-502"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:upsonic:upsonic:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "0.55.6",
+ "matchCriteriaId": "17760E5D-1975-49B2-92E4-AE56DA2031E0"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/Upsonic/Upsonic/issues/353",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.313283",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.313283",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.593099",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/Upsonic/Upsonic/issues/353",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6386.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6386.json
index 4c7de6b9d9f..bb4dca0cb54 100644
--- a/CVE-2025/CVE-2025-63xx/CVE-2025-6386.json
+++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6386.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6386",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-07-07T10:15:29.187",
- "lastModified": "2025-07-07T10:15:29.187",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The parisneo/lollms repository is affected by a timing attack vulnerability in the `authenticate_user` function within the `lollms_authentication.py` file. This vulnerability allows attackers to enumerate valid usernames and guess passwords incrementally by analyzing response time differences. The affected version is the latest, and the issue is resolved in version 20.1. The vulnerability arises from the use of Python's default string equality operator for password comparison, which compares characters sequentially and exits on the first mismatch, leading to variable response times based on the number of matching initial characters."
+ },
+ {
+ "lang": "es",
+ "value": "El repositorio parisneo/lollms se ve afectado por una vulnerabilidad de ataque de tiempo en la funci\u00f3n `authenticate_user` del archivo `lollms_authentication.py`. Esta vulnerabilidad permite a los atacantes enumerar nombres de usuario v\u00e1lidos y adivinar contrase\u00f1as de forma incremental mediante el an\u00e1lisis de las diferencias en los tiempos de respuesta. La versi\u00f3n afectada es la m\u00e1s reciente y el problema se ha resuelto en la versi\u00f3n 20.1. La vulnerabilidad surge del uso del operador de igualdad de cadenas predeterminado de Python para la comparaci\u00f3n de contrase\u00f1as, que compara caracteres secuencialmente y finaliza con la primera discrepancia, lo que genera tiempos de respuesta variables seg\u00fan el n\u00famero de caracteres iniciales coincidentes."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6586.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6586.json
index e42054f936d..50240bfd124 100644
--- a/CVE-2025/CVE-2025-65xx/CVE-2025-6586.json
+++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6586.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6586",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:22.407",
- "lastModified": "2025-07-04T03:15:22.407",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6663.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6663.json
index b0b0a274403..a6685d3d8f5 100644
--- a/CVE-2025/CVE-2025-66xx/CVE-2025-6663.json
+++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6663.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6663",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:28.480",
- "lastModified": "2025-07-07T15:15:28.480",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila en el an\u00e1lisis de GStreamer H266 Codec. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de GStreamer. Se requiere la interacci\u00f3n con esta librer\u00eda para explotar esta vulnerabilidad, pero los vectores de ataque pueden variar seg\u00fan la implementaci\u00f3n. La falla espec\u00edfica se encuentra en el an\u00e1lisis de los mensajes sei H266. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-27381."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6673.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6673.json
index fb156af3037..31db90f30b4 100644
--- a/CVE-2025/CVE-2025-66xx/CVE-2025-6673.json
+++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6673.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6673",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T08:15:25.950",
- "lastModified": "2025-07-04T08:15:25.950",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6711.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6711.json
index 588abca7644..1d21384fbdd 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6711.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6711.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6711",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-07-07T15:15:28.703",
- "lastModified": "2025-07-07T15:15:28.703",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue has been identified in MongoDB Server where unredacted queries may inadvertently appear in server logs when certain error conditions are encountered. This issue affects MongoDB Server v8.0 versions prior to 8.0.5, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v6.0 versions prior to 6.0.21."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado un problema en MongoDB Server que provoca la aparici\u00f3n accidental de consultas sin redactar en los registros del servidor al detectarse ciertas condiciones de error. Este problema afecta a MongoDB Server v8.0 anteriores a la 8.0.5, MongoDB Server v7.0 anteriores a la 7.0.18 y MongoDB Server v6.0 anteriores a la 6.0.21."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6712.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6712.json
index ca3198dc625..2793923d171 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6712.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6712.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6712",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-07-07T15:15:28.890",
- "lastModified": "2025-07-07T15:15:28.890",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MongoDB Server may be susceptible to disruption caused by high memory usage, potentially leading to server crash. This condition is linked to inefficiencies in memory management related to internal operations. In scenarios where certain internal processes persist longer than anticipated, memory consumption can increase, potentially impacting server stability and availability. This issue affects MongoDB Server v8.0 versions prior to 8.0.10"
+ },
+ {
+ "lang": "es",
+ "value": "MongoDB Server puede ser susceptible a interrupciones causadas por un alto uso de memoria, lo que podr\u00eda provocar un bloqueo del servidor. Esta condici\u00f3n est\u00e1 relacionada con ineficiencias en la gesti\u00f3n de memoria relacionadas con las operaciones internas. En escenarios donde ciertos procesos internos persisten m\u00e1s de lo previsto, el consumo de memoria puede aumentar, lo que podr\u00eda afectar la estabilidad y la disponibilidad del servidor. Este problema afecta a las versiones 8.0 y anteriores a la 8.0.10 de MongoDB Server."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6713.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6713.json
index e895eb56488..50266c52c95 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6713.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6713.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6713",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-07-07T15:15:29.090",
- "lastModified": "2025-07-07T15:15:29.090",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.20 and MongoDB Server v6.0 versions prior to 6.0.22"
+ },
+ {
+ "lang": "es",
+ "value": "Un usuario no autorizado podr\u00eda usar una canalizaci\u00f3n de agregaci\u00f3n especialmente manipulada para acceder a los datos sin la debida autorizaci\u00f3n debido a la gesti\u00f3n incorrecta de la etapa $mergeCursors en MongoDB Server. Esto puede provocar el acceso a los datos sin autorizaci\u00f3n adicional. Este problema afecta a MongoDB Server v8.0 anteriores a la 8.0.7, MongoDB Server v7.0 anteriores a la 7.0.20 y MongoDB Server v6.0 anteriores a la 6.0.22."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6714.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6714.json
index 0e399323964..31bd6651f97 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6714.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6714.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6714",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-07-07T15:15:29.263",
- "lastModified": "2025-07-07T15:15:29.263",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MongoDB Server's mongos component can become unresponsive to new connections due to incorrect handling of incomplete data. This affects MongoDB when configured with load balancer support. This issue affects MongoDB Server v6.0 prior to 6.0.23, MongoDB Server v7.0 prior to 7.0.20 and MongoDB Server v8.0 prior to 8.0.9\n\nRequired Configuration:\n\nThis affects MongoDB sharded clusters when configured with load balancer support for mongos using HAProxy on specified ports."
+ },
+ {
+ "lang": "es",
+ "value": "El componente Mongos de MongoDB Server puede dejar de responder a nuevas conexiones debido a la gesti\u00f3n incorrecta de datos incompletos. Esto afecta a MongoDB cuando se configura con compatibilidad con balanceadores de carga. Este problema afecta a MongoDB Server v6.0 anterior a 6.0.23, MongoDB Server v7.0 anterior a 7.0.20 y MongoDB Server v8.0 anterior a 8.0.9. Configuraci\u00f3n requerida: Afecta a los cl\u00fasteres fragmentados de MongoDB cuando se configura con compatibilidad con balanceadores de carga para Mongos mediante HAProxy en los puertos especificados."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6729.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6729.json
index fa32e2de889..ca55c724fee 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6729.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6729.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6729",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:22.577",
- "lastModified": "2025-07-04T03:15:22.577",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6739.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6739.json
index 2e9af3ab2c2..9cf68871913 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6739.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6739.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6739",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:22.740",
- "lastModified": "2025-07-04T03:15:22.740",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6740.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6740.json
index 2c09520e9ca..98647a252bb 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6740.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6740.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6740",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T12:15:35.570",
- "lastModified": "2025-07-04T12:15:35.570",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contact Form 7 Database Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018tmpD\u2019 parameter in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Contact Form 7 Database Addon para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'tmpD' en todas las versiones hasta la 1.3.1 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6743.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6743.json
index ef499e1988a..e52f007149f 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6743.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6743.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6743",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T07:15:26.410",
- "lastModified": "2025-07-08T07:15:26.410",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Woodmart theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'multiple_markers' attribute in all versions up to, and including, 8.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El tema Woodmart para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del atributo 'multiple_markers' del complemento en todas las versiones hasta la 8.2.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6744.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6744.json
index 99957fded7e..a66d8eae364 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6744.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6744.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6744",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T10:15:22.947",
- "lastModified": "2025-07-08T10:15:22.947",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Woodmart theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.2.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode through the woodmart_get_products_shortcode() function. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
+ },
+ {
+ "lang": "es",
+ "value": "El tema Woodmart para WordPress es vulnerable a la ejecuci\u00f3n de shortcodes arbitrarios en todas las versiones hasta la 8.2.3 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode mediante la funci\u00f3n woodmart_get_products_shortcode(). Esto permite que atacantes no autenticados ejecuten shortcodes arbitrarios."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6746.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6746.json
index 24f4d9304e0..9feb911f8bf 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6746.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6746.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6746",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T07:15:26.587",
- "lastModified": "2025-07-08T07:15:26.587",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WoodMart plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.2.3 via the 'layout' attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php files can be uploaded and included."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WoodMart para WordPress es vulnerable a la inclusi\u00f3n local de archivos en todas las versiones hasta la 8.2.3 incluida, a trav\u00e9s del atributo \"layout\". Esto permite a atacantes autenticados, con acceso de colaborador o superior, incluir y ejecutar archivos .php arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en dichos archivos. Esto puede utilizarse para eludir los controles de acceso, obtener datos confidenciales o ejecutar c\u00f3digo cuando se pueden subir e incluir archivos .php."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6770.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6770.json
index 7a5433fb86e..f7724d56375 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6770.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6770.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6770",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-07-08T15:15:33.287",
- "lastModified": "2025-07-08T15:15:33.287",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6771.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6771.json
new file mode 100644
index 00000000000..490069a733b
--- /dev/null
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6771.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-6771",
+ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "published": "2025-07-08T16:15:58.703",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2,12.4.0.3 and 12.3.0.3 allows a remote authenticated attacker with high privileges to achieve remote code execution"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2025-6770-CVE-2025-6771?language=en_US",
+ "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6782.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6782.json
index 8b7fd724883..617c4cfcca8 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6782.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6782.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6782",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:22.913",
- "lastModified": "2025-07-04T03:15:22.913",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6783.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6783.json
index a2ca96b2ec1..0dfc52bfc4c 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6783.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6783.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6783",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:23.077",
- "lastModified": "2025-07-04T03:15:23.077",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6786.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6786.json
index d4e153aa40e..03dc3e3f5f3 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6786.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6786.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6786",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:23.237",
- "lastModified": "2025-07-04T03:15:23.237",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6787.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6787.json
index d046d6c8974..27f004a3c2b 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6787.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6787.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6787",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:23.403",
- "lastModified": "2025-07-04T03:15:23.403",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6793.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6793.json
index c35f756e078..490d8ff3a4c 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6793.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6793.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6793",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:29.637",
- "lastModified": "2025-07-07T15:15:29.637",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole QLogicDownloadImpl Directory Traversal Arbitrary File Deletion and Information Disclosure Vulnerability. This vulnerability allows remote attackers to delete arbitrary files and disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the QLogicDownloadImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files and disclose information in the context of SYSTEM. Was ZDI-CAN-24912."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de borrado arbitrario de archivos y divulgaci\u00f3n de informaci\u00f3n Directory Traversal en Marvell QConvergeConsole QLogicDownloadImpl. Esta vulnerabilidad permite a atacantes remotos eliminar archivos arbitrarios y divulgar informaci\u00f3n confidencial en las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe en la clase QLogicDownloadImpl. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para eliminar archivos y divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24912."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6794.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6794.json
index 230254a3aec..c8440fa9154 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6794.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6794.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6794",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:29.793",
- "lastModified": "2025-07-07T15:15:29.793",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole saveAsText Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the saveAsText method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-24913."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Directory Traversal en Marvell QConvergeConsole saveAsText. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo saveAsText. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de SYSTEM. Era ZDI-CAN-24913."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6795.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6795.json
index 89b2461e1b2..1e85eeefdae 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6795.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6795.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6795",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:29.967",
- "lastModified": "2025-07-07T15:15:29.967",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole getFileUploadSize Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the getFileUploadSize method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24914."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n Directory Traversal en Marvell QConvergeConsole getFileUploadSize. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo getFileUploadSize. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24914."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6796.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6796.json
index 659a47c34e5..80d3a7cc885 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6796.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6796.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6796",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:30.283",
- "lastModified": "2025-07-07T15:15:30.283",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole getAppFileBytes Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the getAppFileBytes method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24916."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n Directory Traversal en Marvell QConvergeConsole getAppFileBytes. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo getAppFileBytes. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24916."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6797.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6797.json
index b293b994172..bdde6ed4034 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6797.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6797.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6797",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:30.430",
- "lastModified": "2025-07-07T15:15:30.430",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole getFileUploadBytes Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the getFileUploadBytes method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24917."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n Directory Traversal en Marvell QConvergeConsole getFileUploadBytes. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo getFileUploadBytes. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24917."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6798.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6798.json
index 3e516ae7f95..a5acb1442a7 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6798.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6798.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6798",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:30.563",
- "lastModified": "2025-07-07T15:15:30.563",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole deleteAppFile Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the deleteAppFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM. Was ZDI-CAN-24918."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de eliminaci\u00f3n arbitraria de archivos Directory Traversal en Marvell QConvergeConsole deleteAppFile. Esta vulnerabilidad permite a atacantes remotos eliminar archivos arbitrarios en las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo deleteAppFile. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para eliminar archivos en el contexto de SYSTEM. Era ZDI-CAN-24918."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6799.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6799.json
index 9b394c99b9c..250ffbac040 100644
--- a/CVE-2025/CVE-2025-67xx/CVE-2025-6799.json
+++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6799.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6799",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:30.710",
- "lastModified": "2025-07-07T15:15:30.710",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole getFileUploadBytes Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the getFileUploadBytes method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24919."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n Directory Traversal en Marvell QConvergeConsole getFileUploadBytes. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo getFileUploadBytes. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24919."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6800.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6800.json
index 9b0af6c0f90..9577de4985b 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6800.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6800.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6800",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:30.847",
- "lastModified": "2025-07-07T15:15:30.847",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole restoreESwitchConfig Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the restoreESwitchConfig method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24920."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n Directory Traversal en Marvell QConvergeConsole restoreESwitchConfig. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo restoreESwitchConfig. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24920."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6801.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6801.json
index dfa15c6e499..f5efffbca0b 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6801.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6801.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6801",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:30.987",
- "lastModified": "2025-07-07T15:15:30.987",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole saveNICParamsToFile Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the saveNICParamsToFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of SYSTEM. Was ZDI-CAN-24921."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de escritura arbitraria de archivos Directory Traversal en Marvell QConvergeConsole saveNICParamsToFile. Esta vulnerabilidad permite a atacantes remotos crear archivos arbitrarios en las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo saveNICParamsToFile. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para escribir archivos en el contexto de SYSTEM. Era ZDI-CAN-24921."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6802.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6802.json
index 92385066814..a8faf0bf719 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6802.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6802.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6802",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:31.123",
- "lastModified": "2025-07-07T15:15:31.123",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole getFileFromURL Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the getFileFromURL method. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-24922."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en la carga de archivos sin restricciones Marvell QConvergeConsole getFileFromURL. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo getFileFromURL. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede permitir la carga de archivos arbitrarios. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de SYSTEM. Era ZDI-CAN-24922."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6803.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6803.json
index a1be46b2e83..1c08a0bf5d1 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6803.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6803.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6803",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:31.270",
- "lastModified": "2025-07-07T15:15:31.270",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole compressDriverFiles Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the compressDriverFiles method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24923."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Directory Traversal en Marvell QConvergeConsole compressDriverFiles. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo compressDriverFiles. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24923."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6804.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6804.json
index cb17c7e101d..77243f4adb4 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6804.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6804.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6804",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:31.407",
- "lastModified": "2025-07-07T15:15:31.407",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole compressFirmwareDumpFiles Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the compressFirmwareDumpFiles method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24924."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Directory Traversal en Marvell QConvergeConsole compressFirmwareDumpFiles. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo compressFirmwareDumpFiles. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24924."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6805.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6805.json
index 48e4882f5e0..ebc1d07e2bd 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6805.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6805.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6805",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:31.557",
- "lastModified": "2025-07-07T15:15:31.557",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole deleteEventLogFile Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the deleteEventLogFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM. Was ZDI-CAN-24925."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de eliminaci\u00f3n arbitraria de archivos Marvell QConvergeConsole deleteEventLogFile. Esta vulnerabilidad permite a atacantes remotos eliminar archivos arbitrarios en las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo \"deleteEventLogFile\". El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para eliminar archivos en el contexto de SYSTEM. Era ZDI-CAN-24925."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6806.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6806.json
index f2a4074d4e3..970d8d27967 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6806.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6806.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6806",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:31.700",
- "lastModified": "2025-07-07T15:15:31.700",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole decryptFile Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the decryptFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of SYSTEM. Was ZDI-CAN-24979."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de escritura arbitraria de archivos Directory Traversal en Marvell QConvergeConsole decryptFile. Esta vulnerabilidad permite a atacantes remotos crear archivos arbitrarios en las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo decryptFile. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para escribir archivos en el contexto de SYSTEM. Era ZDI-CAN-24979."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6807.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6807.json
index ab6d2df2ead..2842cad83f9 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6807.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6807.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6807",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:31.860",
- "lastModified": "2025-07-07T15:15:31.860",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Marvell QConvergeConsole getDriverTmpPath Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the getDriverTmpPath method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24980."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Directory Traversal getDriverTmpPath en Marvell QConvergeConsole. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Marvell QConvergeConsole. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo getDriverTmpPath. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para divulgar informaci\u00f3n en el contexto de SYSTEM. Era ZDI-CAN-24980."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6810.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6810.json
index c7e4f26f84f..bc432d2a32b 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6810.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6810.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6810",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:32.020",
- "lastModified": "2025-07-07T15:15:32.020",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mescius ActiveReports.NET ReadValue Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mescius ActiveReports.NET. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the implementation of the ReadValue method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25246."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por deserializaci\u00f3n de datos no confiables en Mescius ActiveReports.NET. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Mescius ActiveReports.NET. Se requiere la interacci\u00f3n con esta librer\u00eda para explotar esta vulnerabilidad, pero los vectores de ataque pueden variar seg\u00fan la implementaci\u00f3n. La falla espec\u00edfica se encuentra en la implementaci\u00f3n del m\u00e9todo ReadValue. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar la deserializaci\u00f3n de datos no confiables. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-25246."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6811.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6811.json
index dd64e6415bb..e97148904ac 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6811.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6811.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-6811",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-07-07T15:15:32.173",
- "lastModified": "2025-07-07T15:15:32.173",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mescius ActiveReports.NET TypeResolutionService Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mescius ActiveReports.NET. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the TypeResolutionService class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25397."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por deserializaci\u00f3n de datos no confiables en Mescius ActiveReports.NET TypeResolutionService. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Mescius ActiveReports.NET. Se requiere la interacci\u00f3n con esta librer\u00eda para explotar esta vulnerabilidad, pero los vectores de ataque pueden variar seg\u00fan la implementaci\u00f3n. La falla espec\u00edfica se encuentra en la clase TypeResolutionService. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar la deserializaci\u00f3n de datos no confiables. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-25397."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-68xx/CVE-2025-6814.json b/CVE-2025/CVE-2025-68xx/CVE-2025-6814.json
index f950a9025cf..f48bda0ba3b 100644
--- a/CVE-2025/CVE-2025-68xx/CVE-2025-6814.json
+++ b/CVE-2025/CVE-2025-68xx/CVE-2025-6814.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6814",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:23.580",
- "lastModified": "2025-07-04T03:15:23.580",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6926.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6926.json
index bb0e04877d6..e67c45033d8 100644
--- a/CVE-2025/CVE-2025-69xx/CVE-2025-6926.json
+++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6926.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6926",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-03T17:15:41.100",
- "lastModified": "2025-07-03T18:15:22.797",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:19:11.700",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6944.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6944.json
index bba8ecafce8..acf3f6b93c7 100644
--- a/CVE-2025/CVE-2025-69xx/CVE-2025-6944.json
+++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6944.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6944",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T06:15:25.203",
- "lastModified": "2025-07-04T06:15:25.203",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6995.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6995.json
index 71e457872e9..f584580d2d5 100644
--- a/CVE-2025/CVE-2025-69xx/CVE-2025-6995.json
+++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6995.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6995",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-07-08T15:15:33.707",
- "lastModified": "2025-07-08T15:15:33.707",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6996.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6996.json
index fe521834a4f..0f46aa111b3 100644
--- a/CVE-2025/CVE-2025-69xx/CVE-2025-6996.json
+++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6996.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-6996",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-07-08T15:15:33.860",
- "lastModified": "2025-07-08T15:15:33.860",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7037.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7037.json
index e4f2d320140..eccd6018b6e 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7037.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7037.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7037",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-07-08T15:15:34.010",
- "lastModified": "2025-07-08T15:15:34.010",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7046.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7046.json
index 023f29dd7e0..2e2d2536be9 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7046.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7046.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7046",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-04T03:15:23.743",
- "lastModified": "2025-07-04T03:15:23.743",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7053.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7053.json
index 5431165bd49..4aa43838114 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7053.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7053.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-04T03:15:23.917",
- "lastModified": "2025-07-08T14:15:29.430",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7056.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7056.json
index 8b44d642bd5..b7fe29d93d3 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7056.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7056.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7056",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T14:15:25.407",
- "lastModified": "2025-07-07T15:15:32.377",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - UrlShortener Extension allows Stored XSS.This issue affects Mediawiki - UrlShortener Extension: from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - UrlShortener Extension permite XSS almacenado. Este problema afecta a Mediawiki - UrlShortener de Wikimedia Foundation: desde 1.42.X hasta 1.42.7, desde 1.43.X hasta 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7057.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7057.json
index 467c6e23dfc..b1a9beafff6 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7057.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7057.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7057",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-07-07T16:15:26.123",
- "lastModified": "2025-07-07T20:15:28.577",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - Quiz Extension allows Stored XSS.This issue affects Mediawiki - Quiz Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - Quiz Extension permite XSS almacenado. Este problema afecta a la extensi\u00f3n Mediawiki - Quiz: desde la versi\u00f3n 1.39.X hasta la 1.39.13, desde la versi\u00f3n 1.42.X hasta la 1.42.7 y desde la versi\u00f3n 1.43.X hasta la 1.43.2."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json
index 987561fb2f5..939d43660d8 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7060.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-04T11:15:51.683",
- "lastModified": "2025-07-07T17:15:31.427",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json
index bf04e057623..1bb4e530b7c 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7061.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-04T13:15:25.987",
- "lastModified": "2025-07-07T17:15:31.597",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7066.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7066.json
index d6e2496f24f..9f560f1c060 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7066.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7066.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7066",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-07-04T12:15:35.740",
- "lastModified": "2025-07-04T12:15:35.740",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jirafeau normally prevents browser preview for text files due to the possibility that for example SVG and HTML documents could be exploited for cross site scripting. This was done by storing the MIME type of a file and allowing only browser preview for MIME types beginning with image (except for image/svg+xml, see CVE-2022-30110 and CVE-2024-12326), video and audio. However, it was possible to bypass this check by sending a manipulated MIME type containing a comma and an other MIME type like text/html (for example image/png,text/html). Browsers see multiple MIME types and text/html would takes precedence, allowing a possible attacker to do a cross-site scripting attack. The check for MIME types was enhanced to prevent a browser preview when the stored MIME type contains a comma."
+ },
+ {
+ "lang": "es",
+ "value": "Jirafeau normalmente impide la vista previa del navegador para archivos de texto debido a la posibilidad de que, por ejemplo, documentos SVG y HTML pudieran ser explotados para ataques de cross site scripting. Esto se lograba almacenando el tipo MIME de un archivo y permitiendo solo la vista previa del navegador para tipos MIME que empiezan por imagen (excepto para image/svg+xml, v\u00e9anse CVE-2022-30110 y CVE-2024-12326), v\u00eddeo y audio. Sin embargo, era posible omitir esta comprobaci\u00f3n enviando un tipo MIME manipulado que conten\u00eda una coma y otro tipo MIME como text/html (por ejemplo, image/png,text/html). Los navegadores ven m\u00faltiples tipos MIME y text/html tendr\u00eda prioridad, lo que permitir\u00eda a un posible atacante realizar un ataque de cross site scripting. La comprobaci\u00f3n de tipos MIME se mejor\u00f3 para evitar la vista previa del navegador cuando el tipo MIME almacenado contiene una coma."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7067.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7067.json
index fdf02982435..86ba836fdfe 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7067.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7067.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-04T18:15:23.610",
- "lastModified": "2025-07-08T14:15:29.597",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7068.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7068.json
index fac135c7fce..7cd285576ae 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7068.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7068.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-04T21:15:23.770",
- "lastModified": "2025-07-08T14:15:30.160",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7069.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7069.json
index a41b9a8f876..57ce0219bef 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7069.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7069.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7069",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-04T21:15:23.967",
- "lastModified": "2025-07-08T14:15:30.420",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7070.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7070.json
index 315e14d098e..7fd3193680b 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7070.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7070.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-04T22:15:22.450",
- "lastModified": "2025-07-08T14:15:30.593",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json
index cdbde3cc8ff..f4f6b20af16 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7074.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-05T09:15:27.913",
- "lastModified": "2025-07-07T16:15:26.250",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json
index 7394e48c281..e0296621d5d 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7075.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T00:15:22.177",
- "lastModified": "2025-07-07T16:15:26.400",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json
index f69f3a61159..48bbfb9457c 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7076.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T01:15:20.563",
- "lastModified": "2025-07-07T16:15:26.560",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json
index 85b1faa270d..b9b886ea05f 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7077.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T07:15:35.383",
- "lastModified": "2025-07-07T17:15:31.753",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:53.607",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json
index e8a52575831..551bdb718df 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7078.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T09:15:23.400",
- "lastModified": "2025-07-07T17:15:31.903",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json
index 3c6fe538d04..49ebcdf569e 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7079.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T13:15:35.413",
- "lastModified": "2025-07-07T17:15:32.050",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7080.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7080.json
index 6356c6685c7..43992163d56 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7080.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7080.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T14:15:28.203",
- "lastModified": "2025-07-06T14:15:28.203",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Done-0 Jank up to 322caebbad10568460364b9667aa62c3080bfc17. Affected is an unknown function of the file internal/utils/jwt_utils.go of the component JWT Token Handler. The manipulation of the argument accessSecret/refreshSecret with the input jank-blog-secret/jank-blog-refresh-secret leads to use of hard-coded password. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Done-0 Jank hasta 322caebbad10568460364b9667aa62c3080bfc17. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo internal/utils/jwt_utils.go del componente JWT Token Handler. La manipulaci\u00f3n del argumento accessSecret/refreshSecret con la entrada jank-blog-secret/jank-blog-refresh-secret conlleva el uso de una contrase\u00f1a predefinida. Es posible ejecutar el ataque en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7081.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7081.json
index 589ee3f1a27..0a61d919aeb 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7081.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7081.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T14:15:28.413",
- "lastModified": "2025-07-06T14:15:28.413",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Belkin F9K1122 1.00.33 and classified as critical. Affected by this vulnerability is the function formSetWanStatic of the file /goform/formSetWanStatic of the component webs. The manipulation of the argument m_wan_ipaddr/m_wan_netmask/m_wan_gateway/m_wan_staticdns1/m_wan_staticdns2 is directly passed by the attacker/so we can control the m_wan_ipaddr/m_wan_netmask/m_wan_gateway/m_wan_staticdns1/m_wan_staticdns2 leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad en Belkin F9K1122 1.00.33, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formSetWanStatic del archivo /goform/formSetWanStatic del componente webs. La manipulaci\u00f3n del argumento m_wan_ipaddr/m_wan_netmask/m_wan_gateway/m_wan_staticdns1/m_wan_staticdns2 es transferida directamente por el atacante, lo que permite controlar m_wan_ipaddr/m_wan_netmask/m_wan_gateway/m_wan_staticdns1/m_wan_staticdns2, lo que provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7082.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7082.json
index 2c84ab8b3e4..981af34986f 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7082.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7082.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T14:15:28.607",
- "lastModified": "2025-07-06T14:15:28.607",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Belkin F9K1122 1.00.33 and classified as critical. Affected by this issue is the function formBSSetSitesurvey of the file /goform/formBSSetSitesurvey of the component webs. The manipulation of the argument wan_ipaddr/wan_netmask/wan_gateway/wl_ssid is directly passed by the attacker/so we can control the wan_ipaddr/wan_netmask/wan_gateway/wl_ssid leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Belkin F9K1122 1.00.33, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n formBSSetSitesurvey del archivo /goform/formBSSetSitesurvey del componente webs. La manipulaci\u00f3n del argumento wan_ipaddr/wan_netmask/wan_gateway/wl_ssid, que el atacante pasa directamente, permite controlar wan_ipaddr/wan_netmask/wan_gateway/wl_ssid, lo que provoca la inyecci\u00f3n de comandos en el sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json
index abf34390efb..4c7e8493b16 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7083.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7083",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T16:15:27.780",
- "lastModified": "2025-07-07T16:15:26.727",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json
index e3fb82c3803..2e3481dd53b 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7084.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T16:15:28.447",
- "lastModified": "2025-07-07T16:15:26.873",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json
index 475247ac934..f26c2f2536c 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7085.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T17:15:23.197",
- "lastModified": "2025-07-07T16:15:27.007",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7086.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7086.json
index ce3885d98f1..9566a3e7c3d 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7086.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7086.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7086",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T17:15:24.003",
- "lastModified": "2025-07-06T17:15:24.003",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Belkin F9K1122 1.00.33. Affected is the function formPPTPSetup of the file /goform/formPPTPSetup of the component webs. The manipulation of the argument pptpUserName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Belkin F9K1122 1.00.33. La funci\u00f3n formPPTPSetup del archivo /goform/formPPTPSetup del componente webs se ve afectada. La manipulaci\u00f3n del argumento pptpUserName provoca un desbordamiento del b\u00fafer basado en la pila. Es posible ejecutar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json
index 13504d6eaef..234559072e0 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7087.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7087",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T18:15:21.863",
- "lastModified": "2025-07-07T16:15:27.140",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json
index 3d95be52c40..80d43d8ad79 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7088.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T18:15:22.683",
- "lastModified": "2025-07-07T16:15:27.267",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json
index 9258fe906da..ada2b7f7684 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7089.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T19:15:24.420",
- "lastModified": "2025-07-07T16:15:27.437",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json
index 43eafb496b1..7425006d92a 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7090.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T19:15:24.693",
- "lastModified": "2025-07-07T16:15:27.590",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json
index eb92187d6c5..71584b3ff0c 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7091.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T20:15:23.800",
- "lastModified": "2025-07-07T16:15:27.727",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json
index 6abe72764ca..347c9d95fc2 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7092.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T20:15:24.000",
- "lastModified": "2025-07-07T16:15:27.860",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json
index a5fc55645aa..6b510865294 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7093.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T21:15:20.830",
- "lastModified": "2025-07-07T16:15:27.993",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json
index 7bd122f9ab8..40e51ddc34c 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7094.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T21:15:21.727",
- "lastModified": "2025-07-07T16:15:28.120",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json
index 1cc1d37c969..d2cf970ec95 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7095.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T22:15:24.090",
- "lastModified": "2025-07-07T16:15:28.253",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Comodo Internet Security Premium 12.3.4.8162. This affects an unknown part of the component Update Handler. The manipulation leads to improper certificate validation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Comodo Internet Security Premium 12.3.4.8162. Esta afecta a una parte desconocida del componente Update Handler. La manipulaci\u00f3n provoca una validaci\u00f3n incorrecta del certificado. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se contact\u00f3 con el proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json
index b741a6e2a49..1a7f2f9db4f 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7096.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T22:15:25.067",
- "lastModified": "2025-07-07T16:15:28.390",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Comodo Internet Security Premium 12.3.4.8162. This vulnerability affects unknown code of the file cis_update_x64.xml of the component Manifest File Handler. The manipulation leads to improper validation of integrity check value. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se detect\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Comodo Internet Security Premium 12.3.4.8162. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo cis_update_x64.xml del componente Manifest File Handler. La manipulaci\u00f3n provoca una validaci\u00f3n incorrecta del valor de la comprobaci\u00f3n de integridad. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json
index 281e0b9eb93..8981a153d51 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7097.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T23:15:21.960",
- "lastModified": "2025-07-07T16:15:28.527",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Comodo Internet Security Premium 12.3.4.8162. This issue affects some unknown processing of the file cis_update_x64.xml of the component Manifest File Handler. The manipulation of the argument binary/params leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Comodo Internet Security Premium 12.3.4.8162. Este problema afecta a un procesamiento desconocido del archivo cis_update_x64.xml del componente Manifest File Handler. La manipulaci\u00f3n del argumento binary/params provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json
index 35d3eb2e6dd..a5e2425d491 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7098.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-06T23:15:22.143",
- "lastModified": "2025-07-07T16:15:28.647",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Comodo Internet Security Premium 12.3.4.8162. Affected is an unknown function of the component File Name Handler. The manipulation of the argument name/folder leads to path traversal. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Comodo Internet Security Premium 12.3.4.8162. Se trata de una funci\u00f3n desconocida del componente File Name Handler. La manipulaci\u00f3n del argumento nombre/carpeta provoca path traversal. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json b/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json
index e0c7f691a1b..8bcccac381c 100644
--- a/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json
+++ b/CVE-2025/CVE-2025-70xx/CVE-2025-7099.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T00:15:22.513",
- "lastModified": "2025-07-07T16:15:28.783",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in BoyunCMS up to 1.21 on PHP7 and classified as critical. Affected by this vulnerability is an unknown functionality of the file install/install2.php of the component Installation Handler. The manipulation of the argument db_host leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad en BoyunCMS hasta la versi\u00f3n 1.21 en PHP7, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo install/install2.php del componente Installation Handler. La manipulaci\u00f3n del argumento db_host provoca la deserializaci\u00f3n. El ataque puede ejecutarse en remoto. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json
index 7d0305f07bb..54973a247b8 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7100.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T01:15:22.633",
- "lastModified": "2025-07-07T16:15:28.920",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BoyunCMS up to 1.4.20 and classified as critical. Affected by this issue is some unknown functionality of the file /application/user/controller/Index.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en BoyunCMS hasta la versi\u00f3n 1.4.20, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /application/user/controller/Index.php. La manipulaci\u00f3n del argumento \"image\" permite la carga sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json
index 85f5c03869f..1e1927d9957 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7101.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T01:15:23.450",
- "lastModified": "2025-07-07T16:15:29.047",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BoyunCMS up to 1.4.20. It has been classified as critical. This affects an unknown part of the file /install/install_ok.php of the component Configuration File Handler. The manipulation of the argument db_pass leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en BoyunCMS hasta la versi\u00f3n 1.4.20. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /install/install_ok.php del componente \"Configuration File Handler\". La manipulaci\u00f3n del argumento db_pass provoca la inyecci\u00f3n de c\u00f3digo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json
index a1bd658b249..2f92a550965 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7102.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T01:15:23.637",
- "lastModified": "2025-07-07T16:15:29.177",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BoyunCMS up to 1.4.20. It has been declared as critical. This vulnerability affects unknown code of the file application/update/controller/Server.php. The manipulation of the argument phone leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en BoyunCMS hasta la versi\u00f3n 1.4.20. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo application/update/controller/Server.php. La manipulaci\u00f3n del argumento phone provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json
index befdaff1a99..cf77c8a12d1 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7103.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T02:15:20.693",
- "lastModified": "2025-07-07T16:15:29.303",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BoyunCMS up to 1.4.20. It has been rated as critical. This issue affects some unknown processing of the file /application/pay/controller/Index.php of the component curl. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en BoyunCMS hasta la versi\u00f3n 1.4.20. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /application/pay/controller/Index.php del componente curl. La manipulaci\u00f3n provoca server-side request forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json
index 655649af4f2..0a81ee974fe 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7107.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7107",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T03:15:30.363",
- "lastModified": "2025-07-07T16:15:29.440",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SimStudioAI sim up to 0.1.17. Affected is the function handleLocalFile of the file apps/sim/app/api/files/parse/route.ts. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as b2450530d1ddd0397a11001a72aa0fde401db16a. It is recommended to apply a patch to fix this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad cr\u00edtica en SimStudioAI sim (hasta la versi\u00f3n 0.1.17). La funci\u00f3n handleLocalFile del archivo apps/sim/app/api/files/parse/route.ts est\u00e1 afectada. La manipulaci\u00f3n del argumento filePath provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se identifica como b2450530d1ddd0397a11001a72aa0fde401db16a. Se recomienda aplicar un parche para solucionar este problema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7108.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7108.json
index 66866591772..f1ac6e745c7 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7108.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7108.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7108",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T03:15:30.547",
- "lastModified": "2025-07-07T03:15:30.547",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in risesoft-y9 Digital-Infrastructure up to 9.6.7. Affected by this vulnerability is the function deleteFile of the file /Digital-Infrastructure-9.6.7/y9-digitalbase-webapp/y9-module-filemanager/risenet-y9boot-webapp-filemanager/src/main/java/net/risesoft/y9public/controller/Y9FileController.java. The manipulation of the argument fullPath leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en risesoft-y9 Digital-Infrastructure hasta la versi\u00f3n 9.6.7. Esta vulnerabilidad afecta a la funci\u00f3n deleteFile del archivo /Digital-Infrastructure-9.6.7/y9-digitalbase-webapp/y9-module-filemanager/risenet-y9boot-webapp-filemanager/src/main/java/net/risesoft/y9public/controller/Y9FileController.java. La manipulaci\u00f3n del argumento fullPath provoca path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7109.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7109.json
index 383c2bccd0a..3189dfebe49 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7109.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7109.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7109",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T03:15:30.730",
- "lastModified": "2025-07-07T03:15:30.730",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.9.0. Affected by this issue is some unknown functionality of the file /intranet/educar_aluno_beneficio_lst.php of the component Student Benefits Registration. The manipulation of the argument Benef\u00edcio leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Portabilis i-Educar 2.9.0. Este problema afecta a una funcionalidad desconocida del archivo /intranet/educar_aluno_beneficio_lst.php del componente \"Registro de Beneficios Estudiantiles\". La manipulaci\u00f3n del argumento \"Beneficio\" provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7110.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7110.json
index 521366e9d50..0f05acb4dbf 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7110.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7110.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7110",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T04:15:31.707",
- "lastModified": "2025-07-07T04:15:31.707",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Portabilis i-Educar 2.9.0. This affects an unknown part of the file /intranet/educar_escola_lst.php of the component School Module. The manipulation of the argument Escola leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Portabilis i-Educar 2.9.0. Esta afecta a una parte desconocida del archivo /intranet/educar_escola_lst.php del componente M\u00f3dulo Escolar. La manipulaci\u00f3n del argumento \"Escola\" provoca ataques de Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7111.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7111.json
index c13363cb32f..46a314d5e4f 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7111.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7111.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T05:15:42.367",
- "lastModified": "2025-07-07T05:15:42.367",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en Portabilis i-Educar 2.9.0, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /intranet/educar_curso_det.php?cod_curso=ID del componente M\u00f3dulo del Curso. La manipulaci\u00f3n del argumento Curso provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7112.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7112.json
index 4733de7838e..d045bbdd466 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7112.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7112.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T05:15:42.607",
- "lastModified": "2025-07-07T05:15:42.607",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Portabilis i-Educar 2.9.0 and classified as problematic. This issue affects some unknown processing of the file /intranet/educar_funcao_det.php?cod_funcao=COD&ref_cod_instituicao=COD of the component Function Management Module. The manipulation of the argument Fun\u00e7\u00e3o leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Portabilis i-Educar 2.9.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /intranet/educar_funcao_det.php?cod_funcao=COD&ref_cod_instituicao=COD del componente M\u00f3dulo de Gesti\u00f3n de Funciones. La manipulaci\u00f3n del argumento \"Fun\u00e7\u00e3o\" provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7113.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7113.json
index 3989ac6823c..88eea823052 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7113.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7113.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T05:15:42.853",
- "lastModified": "2025-07-07T05:15:42.853",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Portabilis i-Educar 2.9.0. It has been classified as problematic. Affected is an unknown function of the file /module/ComponenteCurricular/edit?id=ID of the component Curricular Components Module. The manipulation of the argument Nome leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Portabilis i-Educar 2.9.0. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /module/ComponenteCurricular/edit?id=ID del componente M\u00f3dulo de Componentes Curriculares. La manipulaci\u00f3n del argumento \"Nome\" provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7114.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7114.json
index fe2f163a597..f48eb15fbbf 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7114.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7114.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7114",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T06:15:30.230",
- "lastModified": "2025-07-07T06:15:30.230",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SimStudioAI sim up to 37786d371e17d35e0764e1b5cd519d873d90d97b. It has been declared as critical. Affected by this vulnerability is the function POST of the file apps/sim/app/api/files/upload/route.ts of the component Session Handler. The manipulation of the argument Request leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SimStudioAI sim hasta 37786d371e17d35e0764e1b5cd519d873d90d97b. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n POST del archivo apps/sim/app/api/files/upload/route.ts del componente Session Handler. La manipulaci\u00f3n del argumento Request provoca la omisi\u00f3n de la autenticaci\u00f3n. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7115.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7115.json
index eda784b726c..28c597bca72 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7115.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7115.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7115",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T06:15:30.590",
- "lastModified": "2025-07-07T06:15:30.590",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in rowboatlabs rowboat up to 8096eaf63b5a0732edd8f812bee05b78e214ee97. It has been rated as critical. Affected by this issue is the function PUT of the file apps/rowboat/app/api/uploads/[fileId]/route.ts of the component Session Handler. The manipulation of the argument params leads to missing authentication. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is expected that this issue will be fixed in the near future."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en rowboatlabs rowboat hasta la versi\u00f3n 8096eaf63b5a0732edd8f812bee05b78e214ee97. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n PUT del archivo apps/rowboat/app/api/uploads/[fileId]/route.ts del componente Session Handler. La manipulaci\u00f3n de los par\u00e1metros del argumento provoca la omisi\u00f3n de la autenticaci\u00f3n. El ataque puede ejecutarse en remoto. Este producto utiliza la entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de versiones actualizadas. Se espera que este problema se solucione pr\u00f3ximamente."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7116.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7116.json
index b2d410d426d..157f4b65873 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7116.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7116.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7116",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T07:15:24.313",
- "lastModified": "2025-07-07T07:15:24.313",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in UTT \u8fdb\u53d6 750W up to 3.2.2-191225. This affects an unknown part of the file /goform/Fast_wireless_conf. The manipulation of the argument ssid leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en UTT ?? 750W hasta la versi\u00f3n 3.2.2-191225. Esta afecta a una parte desconocida del archivo /goform/Fast_wireless_conf. La manipulaci\u00f3n del argumento ssid provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7117.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7117.json
index 6d44c0cfe25..94f71b419be 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7117.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7117.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7117",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T07:15:24.563",
- "lastModified": "2025-07-07T07:15:24.563",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in UTT HiPER 840G up to 3.1.1-190328. This vulnerability affects unknown code of the file /goform/websWhiteList. The manipulation of the argument addHostFilter leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se detect\u00f3 una vulnerabilidad clasificada como cr\u00edtica en UTT HiPER 840G hasta la versi\u00f3n 3.1.1-190328. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /goform/websWhiteList. La manipulaci\u00f3n del argumento addHostFilter provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7118.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7118.json
index f9d3efb54c2..ff3e70ee691 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7118.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7118.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7118",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T08:15:25.603",
- "lastModified": "2025-07-07T08:15:25.603",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in UTT HiPER 840G up to 3.1.1-190328. This issue affects some unknown processing of the file /goform/formPictureUrl. The manipulation of the argument importpictureurl leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en UTT HiPER 840G hasta la versi\u00f3n 3.1.1-190328. Este problema afecta a un procesamiento desconocido del archivo /goform/formPictureUrl. La manipulaci\u00f3n del argumento importpictureurl provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json
index 365613aa92e..404c653a63e 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7119.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T08:15:25.787",
- "lastModified": "2025-07-07T08:15:25.787",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Campcodes Complaint Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /users/index.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad en Campcodes Complaint Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /users/index.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7120.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7120.json
index 4eff1a0caab..5f9bff93aa4 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7120.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7120.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T09:15:27.097",
- "lastModified": "2025-07-07T09:15:27.097",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /users/check_availability.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complaint Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /users/check_availability.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7121.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7121.json
index 21035b11694..e9924daada6 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7121.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7121.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7121",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T09:15:27.290",
- "lastModified": "2025-07-07T09:15:27.290",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0. It has been classified as critical. This affects an unknown part of the file /users/complaint-details.php. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complaint Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /users/complaint-details.php. La manipulaci\u00f3n del argumento cid provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7122.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7122.json
index 493fa6dbdd0..2b700392336 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7122.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7122.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7122",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T10:15:29.333",
- "lastModified": "2025-07-07T10:15:29.333",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complaint Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/index.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7123.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7123.json
index cd3e7c05e36..617fc3c5088 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7123.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7123.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7123",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T10:15:29.580",
- "lastModified": "2025-07-07T10:15:29.580",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complaint Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/complaint-details.php. The manipulation of the argument cid/uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complaint Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/complaint-details.php. La manipulaci\u00f3n del argumento cid/uid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7124.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7124.json
index 0eb54c51646..f37cad1565f 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7124.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7124.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7124",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T11:15:51.483",
- "lastModified": "2025-07-07T11:15:51.483",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Online Note Sharing 1.0. Affected is an unknown function of the file /dashboard/userprofile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad cr\u00edtica en code-projects Online Note Sharing 1.0. Se trata de una funci\u00f3n desconocida del archivo /dashboard/userprofile.php del componente Profile Image Handler. La manipulaci\u00f3n del argumento \"image\" permite la carga sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7125.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7125.json
index 10dd8afc40b..1c4cd6bb525 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7125.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7125.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7125",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T11:15:52.217",
- "lastModified": "2025-07-07T14:15:25.823",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in itsourcecode Employee Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/editempeducation.php. The manipulation of the argument coursepg leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en itsourcecode Employee Management System (hasta la versi\u00f3n 1.0). Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/editempeducation.php. La manipulaci\u00f3n del argumento coursepg provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7126.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7126.json
index d539ce4836b..69eb36c3d27 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7126.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7126.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7126",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T12:15:23.347",
- "lastModified": "2025-07-07T14:15:25.993",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in itsourcecode Employee Management System up to 1.0. Affected by this issue is some unknown functionality of the file /admin/adminprofile.php. The manipulation of the argument AdminName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en itsourcecode Employee Management System hasta la versi\u00f3n 1.0. Este problema afecta a una funcionalidad desconocida del archivo /admin/adminprofile.php. La manipulaci\u00f3n del argumento AdminName provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7127.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7127.json
index 279c059370a..18ad4262f30 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7127.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7127.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7127",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T12:15:23.947",
- "lastModified": "2025-07-07T14:15:26.130",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in itsourcecode Employee Management System up to 1.0. This affects an unknown part of the file /admin/changepassword.php. The manipulation of the argument currentpassword leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad, clasificada como cr\u00edtica, en itsourcecode Employee Management System hasta la versi\u00f3n 1.0. Esta afecta a una parte desconocida del archivo /admin/changepassword.php. La manipulaci\u00f3n del argumento currentpassword provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7128.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7128.json
index 1e09dcc4b73..17d1de9b750 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7128.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7128.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7128",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T13:15:29.427",
- "lastModified": "2025-07-07T14:15:26.267",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Campcodes Payroll Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /ajax.php?action=calculate_payroll. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad en Campcodes Payroll Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /ajax.php?action=calculate_payroll. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7129.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7129.json
index 939565c0c86..f213adfd087 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7129.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7129.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7129",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T13:15:29.627",
- "lastModified": "2025-07-07T13:15:29.627",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Payroll Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=delete_employee_attendance_single. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Payroll Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /ajax.php?action=delete_employee_attendance_single. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7130.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7130.json
index 2d315ab096b..094c6eb1235 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7130.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7130.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7130",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T14:15:26.497",
- "lastModified": "2025-07-07T14:15:26.497",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Payroll Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /ajax.php?action=delete_payroll. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Payroll Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /ajax.php?action=delete_payroll. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7131.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7131.json
index f3a9e0ca252..5d2d53e49b1 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7131.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7131.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7131",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T14:15:26.707",
- "lastModified": "2025-07-07T14:15:26.707",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Payroll Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax.php?action=save_employee_attendance. The manipulation of the argument employee_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Payroll Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /ajax.php?action=save_employee_attendance. La manipulaci\u00f3n del argumento \"employee_id\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7132.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7132.json
index ce90994467f..569a24cbc54 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7132.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7132.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7132",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T15:15:32.937",
- "lastModified": "2025-07-07T15:15:32.937",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Payroll Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /ajax.php?action=save_payroll. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Payroll Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /ajax.php?action=save_payroll. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7133.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7133.json
index c00d4615fb5..10fce4de5b7 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7133.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7133.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7133",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T15:15:33.210",
- "lastModified": "2025-07-07T15:15:33.210",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in CodeAstro Online Movie Ticket Booking System 1.0. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en CodeAstro Online Movie Ticket Booking System 1.0. Esta afecta a una parte desconocida. La manipulaci\u00f3n provoca un cross-site request forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json
index 72d44740edb..1a4ce9b9410 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7134.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7134",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T16:15:29.800",
- "lastModified": "2025-07-07T16:15:29.800",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Campcodes Online Recruitment Management System 1.0. This vulnerability affects unknown code of the file /admin/ajax.php?action=delete_application. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en Campcodes Online Recruitment Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/ajax.php?action=delete_application. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json
index 4fccd563ddd..23ff5b994bf 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7135.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7135",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T16:15:30.080",
- "lastModified": "2025-07-08T14:15:30.760",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json
index d632c577924..1de8a24dd05 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7136.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7136",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T17:15:32.693",
- "lastModified": "2025-07-07T17:15:32.693",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Campcodes Online Recruitment Management System 1.0. Affected is an unknown function of the file /admin/view_vacancy.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Campcodes Online Recruitment Management System 1.0. La funci\u00f3n afectada es desconocida en el archivo /admin/view_vacancy.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json
index 608ccf266bf..96cb4236d3d 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7137.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7137",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T17:15:32.903",
- "lastModified": "2025-07-07T17:15:32.903",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /panel/schedule-staff.php. The manipulation of the argument staff_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Best Salon Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /panel/schedule-staff.php. La manipulaci\u00f3n del argumento staff_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json
index 7e760cd1a54..5dda074eba9 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7138.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7138",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T18:15:29.603",
- "lastModified": "2025-07-07T18:15:29.603",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /panel/admin-profile.php. The manipulation of the argument adminname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Best Salon Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /panel/admin-profile.php. La manipulaci\u00f3n del argumento adminname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json
index 1c6fa8ef9d0..ae11c0abc14 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7139.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7139",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T18:15:29.793",
- "lastModified": "2025-07-07T19:15:24.023",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /panel/edit-customer-detailed.php of the component Update Customer Details Page. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Best Salon Management System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /panel/edit-customer-detailed.php del componente \"Actualizar p\u00e1gina de detalles del cliente\". La manipulaci\u00f3n del argumento \"Name\" provoca cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json
index f22c863b562..e397206db89 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7140.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7140",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T19:15:24.160",
- "lastModified": "2025-07-07T19:15:24.160",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/edit-staff.php of the component Update Staff Page. The manipulation of the argument Staff Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best Salon Management System 1.0. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /panel/edit-staff.php del componente \"Actualizar p\u00e1gina del personal\". La manipulaci\u00f3n del argumento \"Staff Name\" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7141.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7141.json
index a60ba7cc426..6373852e9ed 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7141.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7141.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7141",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T19:15:24.353",
- "lastModified": "2025-07-07T19:15:24.353",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in SourceCodester Best Salon Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /panel/edit_plan.php of the component Update Staff Page. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best Salon Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /panel/edit_plan.php del componente \"Actualizar p\u00e1gina de personal\". Esta manipulaci\u00f3n provoca cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json
index d349cd25704..198ffb13807 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7142.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7142",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T20:15:28.787",
- "lastModified": "2025-07-07T20:15:28.787",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Best Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /panel/search-appointment.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best Salon Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /panel/search-appointment.php. La manipulaci\u00f3n provoca cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json
index fae818a7736..1c328b406b4 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7143.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7143",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T20:15:28.973",
- "lastModified": "2025-07-07T20:15:28.973",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/edit-tax.php of the component Update Tax Page. The manipulation of the argument Tax Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best Salon Management System 1.0. Esta afecta a una parte desconocida del archivo /panel/edit-tax.php del componente \"Actualizar p\u00e1gina de impuestos\". La manipulaci\u00f3n del argumento \"Tax Name\" provoca cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json
index cc5273ea984..66667fe57da 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7144.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7144",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T21:15:25.987",
- "lastModified": "2025-07-07T21:15:25.987",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Best Salon Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /panel/admin-profile.php of the component Admin Profile Page. The manipulation of the argument Admin Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Salon Management System 1.0, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /panel/admin-profile.php del componente Admin Profile Page. La manipulaci\u00f3n del argumento Admin Name provoca cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7145.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7145.json
index d39f96a6d84..bb42de0a818 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7145.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7145.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7145",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-07-07T03:15:30.917",
- "lastModified": "2025-07-07T03:15:30.917",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ThreatSonar Anti-Ransomware developed by TeamT5 has an OS Command Injection vulnerability, allowing remote attackers with product platform intermediate privileges to inject arbitrary OS commands and execute them on the server, thereby gaining administrative access to the remote host."
+ },
+ {
+ "lang": "es",
+ "value": "ThreatSonar Anti-Ransomware desarrollado por TeamT5 tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos con privilegios intermedios en la plataforma del producto inyectar comandos arbitrarios del sistema operativo y ejecutarlos en el servidor, obteniendo as\u00ed acceso administrativo al host remoto."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7146.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7146.json
index 2acc94b3ccf..41c2fc68821 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7146.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7146.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7146",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-07-08T02:15:22.367",
- "lastModified": "2025-07-08T02:15:22.367",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The iPublish System developed by Jhenggao has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to read arbitrary system file."
+ },
+ {
+ "lang": "es",
+ "value": "El sistema iPublish desarrollado por Jhenggao tiene una vulnerabilidad de lectura arbitraria de archivos, que permite a atacantes remotos no autenticados leer archivos arbitrarios del sistema."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json
index 5c62592dc52..ba126ded66d 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7147.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7147",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T21:15:26.187",
- "lastModified": "2025-07-07T21:15:26.187",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in CodeAstro Patient Record Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad en CodeAstro Patient Record Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /login.php. La manipulaci\u00f3n del argumento uname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json
index 0f0aa60aa71..04c2e9247cf 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7148.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7148",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T22:15:27.227",
- "lastModified": "2025-07-07T22:15:27.227",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CodeAstro Simple Hospital Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /patient.html of the component POST Parameter Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en CodeAstro Simple Hospital Management System 1.0, clasificada como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /patient.html del componente POST Parameter Handler. Esta manipulaci\u00f3n provoca cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. M\u00faltiples par\u00e1metros podr\u00edan verse afectados."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7149.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7149.json
index d126f717a0e..ff53f05182a 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7149.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7149.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7149",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T22:15:27.460",
- "lastModified": "2025-07-07T22:15:27.460",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/candidates_delete.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Advanced Online Voting System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /admin/candidates_delete.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7150.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7150.json
index 1b0a86e4920..1b279957c84 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7150.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7150.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7150",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T23:15:23.207",
- "lastModified": "2025-07-07T23:15:23.207",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/voters_delete.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Advanced Online Voting System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/voters_delete.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7151.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7151.json
index 1f3d0e6139f..891093ddefe 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7151.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7151.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T23:15:23.813",
- "lastModified": "2025-07-07T23:15:23.813",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/voters_add.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Advanced Online Voting System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/voters_add.php. La manipulaci\u00f3n del argumento \"photo\" permite la subida sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7152.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7152.json
index 50567af547b..71467d13b05 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7152.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7152.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T00:15:22.443",
- "lastModified": "2025-07-08T00:15:22.443",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Campcodes Advanced Online Voting System 1.0. Affected is an unknown function of the file /admin/candidates_add.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Campcodes Advanced Online Voting System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/candidates_add.php. La manipulaci\u00f3n del argumento \"photo\" permite la subida sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7153.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7153.json
index a84e8f6f5dc..dfe7bfa8236 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7153.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7153.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7153",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T00:15:23.237",
- "lastModified": "2025-07-08T00:15:23.237",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in CodeAstro Simple Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /doctor.html of the component POST Parameter Handler. The manipulation of the argument First Name/Last name/Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en CodeAstro Simple Hospital Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /doctor.html del componente POST Parameter Handler. La manipulaci\u00f3n del argumento Nombre/Apellido/Direcci\u00f3n provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7154.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7154.json
index 2fa8c584265..fbce3d95e2e 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7154.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7154.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7154",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T01:15:26.200",
- "lastModified": "2025-07-08T01:15:26.200",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T17:16:04.893",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in TOTOLINK N200RE 9.3.5u.6095_B20200916/9.3.5u.6139_B20201216. Affected by this issue is the function sub_41A0F8 of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Hostname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK N200RE 9.3.5u.6095_B20200916/9.3.5u.6139_B20201216. Este problema afecta a la funci\u00f3n sub_41A0F8 del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento \"Hostname\" provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -140,6 +144,10 @@
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/FLY200503/IoT-vul/blob/master/Totolink/N200RE/README.md",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7155.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7155.json
index a6154f16aed..1b708d7a741 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7155.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7155.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7155",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T01:15:26.400",
- "lastModified": "2025-07-08T01:15:26.400",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T17:16:05.053",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Online Notes Sharing System 1.0. This affects an unknown part of the file /Dashboard of the component Cookie Handler. The manipulation of the argument sessionid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The original researcher disclosure suspects an XPath Injection vulnerability; however, the provided attack payload appears to be characteristic of an SQL Injection attack."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Online Notes Sharing System 1.0. Esta afecta a una parte desconocida del archivo /Dashboard del componente Cookie Handler. La manipulaci\u00f3n del argumento sessionid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La divulgaci\u00f3n original del investigador sospecha una vulnerabilidad de inyecci\u00f3n XPath; sin embargo, la carga \u00fatil del ataque proporcionada parece ser caracter\u00edstica de un ataque de inyecci\u00f3n SQL."
}
],
"metrics": {
@@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -144,6 +148,10 @@
{
"url": "https://vuldb.com/?submit.606281",
"source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/Vanshdhawan188/Online-Notes-Sharing-System-Php-Gurukul-Python/blob/main/Online-Notes-Sharing-System-Php-Gurukul-Python-Xpath-Injection.md",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7156.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7156.json
index 2db108d8f1d..beb45c953fc 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7156.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7156.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7156",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T02:15:22.580",
- "lastModified": "2025-07-08T02:15:22.580",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in hitsz-ids airda 0.0.3 and classified as critical. This vulnerability affects the function execute of the file /v1/chat/completions. The manipulation of the argument question leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en hitsz-ids airda 0.0.3, clasificada como cr\u00edtica. Esta vulnerabilidad afecta la funci\u00f3n de ejecuci\u00f3n del archivo /v1/chat/completions. La manipulaci\u00f3n del argumento \"question\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7157.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7157.json
index 185dcc8638e..c2333547027 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7157.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7157.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7157",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T03:15:31.123",
- "lastModified": "2025-07-08T03:15:31.123",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Online Note Sharing 1.0. It has been classified as critical. Affected is an unknown function of the file /login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Online Note Sharing 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /login.php. La manipulaci\u00f3n del argumento nombre de usuario/contrase\u00f1a provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7158.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7158.json
index e7d31b86195..3dbc2d4b79c 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7158.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7158.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7158",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T03:15:31.373",
- "lastModified": "2025-07-08T03:15:31.373",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/manage-normal-ticket.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Zoo Management System 2.1. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/manage-normal-ticket.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7159.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7159.json
index fb816f05673..d2f5b879fad 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7159.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7159.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7159",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T03:15:31.590",
- "lastModified": "2025-07-08T03:15:31.590",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/manage-animals.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Zoo Management System 2.1. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/manage-animals.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7160.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7160.json
index d3478ea740e..07efbdce553 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7160.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7160.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7160",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T04:15:49.817",
- "lastModified": "2025-07-08T04:15:49.817",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. This affects an unknown part of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Zoo Management System 2.1. Esta afecta a una parte desconocida del archivo /admin/index.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7161.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7161.json
index 422d91c822b..ecd9adc67e5 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7161.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7161.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7161",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T04:15:55.210",
- "lastModified": "2025-07-08T04:15:55.210",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Zoo Management System 2.1. This vulnerability affects unknown code of the file /admin/add-normal-ticket.php. The manipulation of the argument cprice leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Zoo Management System 2.1. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/add-normal-ticket.php. La manipulaci\u00f3n del argumento cprice provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7162.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7162.json
index a192c2a0173..bfcf2c9b0a5 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7162.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7162.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7162",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T05:15:30.837",
- "lastModified": "2025-07-08T05:15:30.837",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Zoo Management System 2.1. This issue affects some unknown processing of the file /admin/add-foreigners-ticket.php. The manipulation of the argument cprice leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Zoo Management System 2.1. Este problema afecta a un procesamiento desconocido del archivo /admin/add-foreigners-ticket.php. La manipulaci\u00f3n del argumento cprice provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7163.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7163.json
index 529e604520c..224e7952950 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7163.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7163.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7163",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T05:15:31.040",
- "lastModified": "2025-07-08T05:15:31.040",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/add-animals.php. The manipulation of the argument cnum leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Zoo Management System 2.1. Se ve afectada una funci\u00f3n desconocida del archivo /admin/add-animals.php. La manipulaci\u00f3n del argumento cnum provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7164.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7164.json
index b0f4edb3e13..22eccdb2ac4 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7164.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7164.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7164",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T06:15:23.040",
- "lastModified": "2025-07-08T06:15:23.040",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en PHPGurukul/Campcodes Cyber Cafe Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /index.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7165.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7165.json
index ade1f341791..6a048a33005 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7165.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7165.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T06:15:24.513",
- "lastModified": "2025-07-08T06:15:24.513",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul/Campcodes Cyber Cafe Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /forgot-password.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7166.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7166.json
index 3af34af0b83..6b08f9138ec 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7166.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7166.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7166",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T07:15:26.770",
- "lastModified": "2025-07-08T07:15:26.770",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been classified as critical. This affects an unknown part of the file /single.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Responsive Blog Site 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /single.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7167.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7167.json
index 8f6d1322fe1..a28c89685f9 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7167.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7167.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7167",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T07:15:27.007",
- "lastModified": "2025-07-08T07:15:27.007",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /category.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Responsive Blog Site 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /category.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7168.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7168.json
index a0027cdac9e..6b62571dfea 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7168.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7168.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7168",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T08:15:21.993",
- "lastModified": "2025-07-08T08:15:21.993",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Crime Reporting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /userlogin.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Crime Reporting System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /userlogin.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7169.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7169.json
index 47689ed730f..75160161aa1 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7169.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7169.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7169",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T08:15:22.270",
- "lastModified": "2025-07-08T08:15:22.270",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Crime Reporting System 1.0. Affected is an unknown function of the file /complainer_page.php. The manipulation of the argument location leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad cr\u00edtica en code-projects Crime Reporting System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /complainer_page.php. La manipulaci\u00f3n de la ubicaci\u00f3n del argumento provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7170.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7170.json
index 1c4ab043990..5a24633d2fa 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7170.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7170.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7170",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T09:15:22.540",
- "lastModified": "2025-07-08T09:15:22.540",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Crime Reporting System 1.0. Affected by this vulnerability is an unknown functionality of the file /registration.php. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Crime Reporting System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /registration.php. La manipulaci\u00f3n del argumento \"Name\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7171.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7171.json
index ebf79273ee2..f22aa07e127 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7171.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7171.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7171",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T09:15:23.017",
- "lastModified": "2025-07-08T09:15:23.017",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Crime Reporting System 1.0. Affected by this issue is some unknown functionality of the file /policelogin.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Crime Reporting System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /policelogin.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7172.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7172.json
index 50c58718466..5a2b4dc3156 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7172.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7172.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7172",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T10:15:23.140",
- "lastModified": "2025-07-08T10:15:23.140",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Crime Reporting System 1.0. This affects an unknown part of the file /headlogin.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Crime Reporting System 1.0. Esta afecta a una parte desconocida del archivo /headlogin.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7173.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7173.json
index 1f15970f6ce..65139d80406 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7173.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7173.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7173",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T10:15:23.370",
- "lastModified": "2025-07-08T10:15:23.370",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T17:16:05.297",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-student.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad en code-projects Library System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /add-student.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.606656",
"source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/Qq2240151/CVE/issues/2",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7174.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7174.json
index 4d6078c5550..cf14ddd78e2 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7174.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7174.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7174",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T11:15:31.717",
- "lastModified": "2025-07-08T11:15:31.717",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T17:16:05.513",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Library System 1.0 and classified as critical. This issue affects some unknown processing of the file /teacher-issue-book.php. The manipulation of the argument idn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Library System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /teacher-issue-book.php. La manipulaci\u00f3n del argumento idn provoca una inyecci\u00f3n SQL. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.606657",
"source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/Qq2240151/CVE/issues/1",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7175.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7175.json
index 1849d4e2400..deda94165b4 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7175.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7175.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T11:15:31.920",
- "lastModified": "2025-07-08T11:15:31.920",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects E-Commerce Site 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en code-projects E-Commerce Site 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/users_photo.php. La manipulaci\u00f3n del argumento \"photo\" permite la carga sin restricciones. Es posible ejecutar el ataque en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7176.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7176.json
index 814f7da8825..1f07944e755 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7176.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7176.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T12:15:23.560",
- "lastModified": "2025-07-08T12:15:23.560",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7177.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7177.json
index d45c4ac8f8d..959d7c86a4a 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7177.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7177.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T12:15:23.773",
- "lastModified": "2025-07-08T12:15:23.773",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7178.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7178.json
index f997e385a64..789ee638468 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7178.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7178.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7178",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T13:15:33.940",
- "lastModified": "2025-07-08T13:15:33.940",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7179.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7179.json
index 6bd438647f4..4fb61e031b0 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7179.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7179.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7179",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T13:15:34.487",
- "lastModified": "2025-07-08T13:15:34.487",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7180.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7180.json
index 1f50b8005a5..f82d918492a 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7180.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7180.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7180",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T14:15:31.970",
- "lastModified": "2025-07-08T14:15:31.970",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7181.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7181.json
index d0d21270fd3..6d14e35d502 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7181.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7181.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7181",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T14:15:32.177",
- "lastModified": "2025-07-08T14:15:32.177",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T17:16:05.673",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.606917",
"source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/kn1g78/cve/blob/main/staff2/staff2.md",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7182.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7182.json
index 9da51939812..ce49de3ad96 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7182.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7182.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7182",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T15:15:34.230",
- "lastModified": "2025-07-08T15:15:34.230",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7183.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7183.json
index a08be0faa59..a4777f0b5f7 100644
--- a/CVE-2025/CVE-2025-71xx/CVE-2025-7183.json
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7183.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7183",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T15:15:34.430",
- "lastModified": "2025-07-08T15:15:34.430",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7184.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7184.json
new file mode 100644
index 00000000000..1162574ef2d
--- /dev/null
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7184.json
@@ -0,0 +1,149 @@
+{
+ "id": "CVE-2025-7184",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2025-07-08T16:15:59.130",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in code-projects Library System 1.0. It has been classified as critical. This affects an unknown part of the file /user/teacher/books.php. The manipulation of the argument Search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 6.9,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "LOW",
+ "vulnIntegrityImpact": "LOW",
+ "vulnAvailabilityImpact": "LOW",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "PROOF_OF_CONCEPT",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
+ "baseScore": 7.5,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL"
+ },
+ "baseSeverity": "HIGH",
+ "exploitabilityScore": 10.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://code-projects.org/",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/HeDunSec/cve/issues/2",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.315123",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.315123",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?submit.607185",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/HeDunSec/cve/issues/2",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7185.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7185.json
new file mode 100644
index 00000000000..518de967890
--- /dev/null
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7185.json
@@ -0,0 +1,145 @@
+{
+ "id": "CVE-2025-7185",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2025-07-08T16:15:59.330",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Undergoing Analysis",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in code-projects Library System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /approve.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 6.9,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "LOW",
+ "vulnIntegrityImpact": "LOW",
+ "vulnAvailabilityImpact": "LOW",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "PROOF_OF_CONCEPT",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
+ "baseScore": 7.5,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL"
+ },
+ "baseSeverity": "HIGH",
+ "exploitabilityScore": 10.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://code-projects.org/",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/HeDunSec/cve/issues/1",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.315124",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.315124",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?submit.607186",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7186.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7186.json
new file mode 100644
index 00000000000..8f4b60aab2d
--- /dev/null
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7186.json
@@ -0,0 +1,145 @@
+{
+ "id": "CVE-2025-7186",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2025-07-08T17:16:05.833",
+ "lastModified": "2025-07-08T17:16:05.833",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in code-projects Chat System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/fetch_chat.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "LOW",
+ "vulnIntegrityImpact": "LOW",
+ "vulnAvailabilityImpact": "LOW",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "PROOF_OF_CONCEPT",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
+ "baseScore": 6.5,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL"
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 8.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://code-projects.org/",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/LamentXU123/cve/blob/main/sql_fetch_chat.md",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.315125",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.315125",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?submit.607195",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7187.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7187.json
new file mode 100644
index 00000000000..421c1e569de
--- /dev/null
+++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7187.json
@@ -0,0 +1,145 @@
+{
+ "id": "CVE-2025-7187",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2025-07-08T17:16:06.057",
+ "lastModified": "2025-07-08T17:16:06.057",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability classified as critical has been found in code-projects Chat System 1.0. Affected is an unknown function of the file /user/fetch_member.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "LOW",
+ "vulnIntegrityImpact": "LOW",
+ "vulnAvailabilityImpact": "LOW",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "PROOF_OF_CONCEPT",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
+ "baseScore": 6.5,
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL"
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 8.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://code-projects.org/",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://github.com/LamentXU123/cve/blob/main/sql_fetch_member.md",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.315126",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.315126",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?submit.607196",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7259.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7259.json
index e935e01d4be..303355aa72d 100644
--- a/CVE-2025/CVE-2025-72xx/CVE-2025-7259.json
+++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7259.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7259",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-07-07T16:15:30.440",
- "lastModified": "2025-07-07T16:15:30.440",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:34.923",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authorized user can issue queries with duplicate _id fields, that leads to unexpected behavior in MongoDB Server, which may result to crash. This issue can only be triggered by authorized users and cause Denial of Service. This issue affects MongoDB Server v8.1 version 8.1.0."
+ },
+ {
+ "lang": "es",
+ "value": "Un usuario autorizado puede ejecutar consultas con campos _id duplicados, lo que provoca un comportamiento inesperado en MongoDB Server y puede provocar un bloqueo. Este problema solo lo pueden activar usuarios autorizados y causa una denegaci\u00f3n de servicio. Afecta a MongoDB Server v8.1 (versi\u00f3n 8.1.0)."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-73xx/CVE-2025-7326.json b/CVE-2025/CVE-2025-73xx/CVE-2025-7326.json
index cfbc833b166..074269fc1f7 100644
--- a/CVE-2025/CVE-2025-73xx/CVE-2025-7326.json
+++ b/CVE-2025/CVE-2025-73xx/CVE-2025-7326.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7326",
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"published": "2025-07-08T15:15:34.623",
- "lastModified": "2025-07-08T15:15:34.623",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-73xx/CVE-2025-7327.json b/CVE-2025/CVE-2025-73xx/CVE-2025-7327.json
index fb27b19c836..32710c45308 100644
--- a/CVE-2025/CVE-2025-73xx/CVE-2025-7327.json
+++ b/CVE-2025/CVE-2025-73xx/CVE-2025-7327.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7327",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-07-08T06:15:24.730",
- "lastModified": "2025-07-08T06:15:24.730",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Widget for Google Reviews plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.15 via the layout parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. This is limited to just PHP files."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Widget para Google Reviews para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 1.0.15 incluida, a trav\u00e9s del par\u00e1metro de dise\u00f1o. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, incluir y ejecutar archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en dichos archivos. Esto puede utilizarse para eludir los controles de acceso, obtener datos confidenciales o ejecutar c\u00f3digo cuando se pueden subir e incluir im\u00e1genes y otros tipos de archivos \"seguros\". Esto se limita \u00fanicamente a archivos PHP."
}
],
"metrics": {
diff --git a/CVE-2025/CVE-2025-73xx/CVE-2025-7345.json b/CVE-2025/CVE-2025-73xx/CVE-2025-7345.json
index 93826096585..d790f83a492 100644
--- a/CVE-2025/CVE-2025-73xx/CVE-2025-7345.json
+++ b/CVE-2025/CVE-2025-73xx/CVE-2025-7345.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-7345",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-07-08T14:15:32.397",
- "lastModified": "2025-07-08T14:15:32.397",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2025/CVE-2025-73xx/CVE-2025-7346.json b/CVE-2025/CVE-2025-73xx/CVE-2025-7346.json
index 93174708c81..54c4adc382e 100644
--- a/CVE-2025/CVE-2025-73xx/CVE-2025-7346.json
+++ b/CVE-2025/CVE-2025-73xx/CVE-2025-7346.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-7346",
"sourceIdentifier": "1c6b5737-9389-4011-8117-89fa251edfb2",
"published": "2025-07-08T07:15:27.220",
- "lastModified": "2025-07-08T08:15:22.460",
- "vulnStatus": "Received",
+ "lastModified": "2025-07-08T16:18:14.207",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Any unauthenticated attacker can bypass the localhost \nrestrictions posed by the application and utilize this to create \narbitrary packages"
+ },
+ {
+ "lang": "es",
+ "value": "Cualquier atacante no autenticado puede eludir las restricciones del host local impuestas por la aplicaci\u00f3n y utilizar esto para crear paquetes arbitrarios."
}
],
"metrics": {
diff --git a/README.md b/README.md
index ae336c863cf..a9bdf50a40e 100644
--- a/README.md
+++ b/README.md
@@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
-2025-07-08T16:00:11.703697+00:00
+2025-07-08T18:00:12.780009+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
-2025-07-08T15:59:52.273000+00:00
+2025-07-08T17:59:42.473000+00:00
```
### Last Data Feed Release
@@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
-300908
+301060
```
### CVEs added in the last Commit
-Recently added CVEs: `25`
+Recently added CVEs: `152`
-- [CVE-2024-52965](CVE-2024/CVE-2024-529xx/CVE-2024-52965.json) (`2025-07-08T15:15:22.313`)
-- [CVE-2024-55599](CVE-2024/CVE-2024-555xx/CVE-2024-55599.json) (`2025-07-08T15:15:23.870`)
-- [CVE-2025-24474](CVE-2025/CVE-2025-244xx/CVE-2025-24474.json) (`2025-07-08T15:15:26.220`)
-- [CVE-2025-2793](CVE-2025/CVE-2025-27xx/CVE-2025-2793.json) (`2025-07-08T15:15:27.023`)
-- [CVE-2025-2827](CVE-2025/CVE-2025-28xx/CVE-2025-2827.json) (`2025-07-08T15:15:27.190`)
-- [CVE-2025-29267](CVE-2025/CVE-2025-292xx/CVE-2025-29267.json) (`2025-07-08T15:15:26.827`)
-- [CVE-2025-3630](CVE-2025/CVE-2025-36xx/CVE-2025-3630.json) (`2025-07-08T15:15:27.560`)
-- [CVE-2025-36600](CVE-2025/CVE-2025-366xx/CVE-2025-36600.json) (`2025-07-08T15:15:27.403`)
-- [CVE-2025-47422](CVE-2025/CVE-2025-474xx/CVE-2025-47422.json) (`2025-07-08T14:15:27.997`)
-- [CVE-2025-53372](CVE-2025/CVE-2025-533xx/CVE-2025-53372.json) (`2025-07-08T15:15:29.560`)
-- [CVE-2025-53480](CVE-2025/CVE-2025-534xx/CVE-2025-53480.json) (`2025-07-08T15:15:29.720`)
-- [CVE-2025-53545](CVE-2025/CVE-2025-535xx/CVE-2025-53545.json) (`2025-07-08T15:15:29.850`)
-- [CVE-2025-5450](CVE-2025/CVE-2025-54xx/CVE-2025-5450.json) (`2025-07-08T15:15:31.103`)
-- [CVE-2025-5451](CVE-2025/CVE-2025-54xx/CVE-2025-5451.json) (`2025-07-08T15:15:31.817`)
-- [CVE-2025-5463](CVE-2025/CVE-2025-54xx/CVE-2025-5463.json) (`2025-07-08T15:15:32.010`)
-- [CVE-2025-6770](CVE-2025/CVE-2025-67xx/CVE-2025-6770.json) (`2025-07-08T15:15:33.287`)
-- [CVE-2025-6995](CVE-2025/CVE-2025-69xx/CVE-2025-6995.json) (`2025-07-08T15:15:33.707`)
-- [CVE-2025-6996](CVE-2025/CVE-2025-69xx/CVE-2025-6996.json) (`2025-07-08T15:15:33.860`)
-- [CVE-2025-7037](CVE-2025/CVE-2025-70xx/CVE-2025-7037.json) (`2025-07-08T15:15:34.010`)
-- [CVE-2025-7180](CVE-2025/CVE-2025-71xx/CVE-2025-7180.json) (`2025-07-08T14:15:31.970`)
-- [CVE-2025-7181](CVE-2025/CVE-2025-71xx/CVE-2025-7181.json) (`2025-07-08T14:15:32.177`)
-- [CVE-2025-7182](CVE-2025/CVE-2025-71xx/CVE-2025-7182.json) (`2025-07-08T15:15:34.230`)
-- [CVE-2025-7183](CVE-2025/CVE-2025-71xx/CVE-2025-7183.json) (`2025-07-08T15:15:34.430`)
-- [CVE-2025-7326](CVE-2025/CVE-2025-73xx/CVE-2025-7326.json) (`2025-07-08T15:15:34.623`)
-- [CVE-2025-7345](CVE-2025/CVE-2025-73xx/CVE-2025-7345.json) (`2025-07-08T14:15:32.397`)
+- [CVE-2025-49726](CVE-2025/CVE-2025-497xx/CVE-2025-49726.json) (`2025-07-08T17:16:00.703`)
+- [CVE-2025-49727](CVE-2025/CVE-2025-497xx/CVE-2025-49727.json) (`2025-07-08T17:16:00.930`)
+- [CVE-2025-49729](CVE-2025/CVE-2025-497xx/CVE-2025-49729.json) (`2025-07-08T17:16:01.190`)
+- [CVE-2025-49730](CVE-2025/CVE-2025-497xx/CVE-2025-49730.json) (`2025-07-08T17:16:01.423`)
+- [CVE-2025-49731](CVE-2025/CVE-2025-497xx/CVE-2025-49731.json) (`2025-07-08T17:16:01.653`)
+- [CVE-2025-49732](CVE-2025/CVE-2025-497xx/CVE-2025-49732.json) (`2025-07-08T17:16:01.857`)
+- [CVE-2025-49733](CVE-2025/CVE-2025-497xx/CVE-2025-49733.json) (`2025-07-08T17:16:02.077`)
+- [CVE-2025-49735](CVE-2025/CVE-2025-497xx/CVE-2025-49735.json) (`2025-07-08T17:16:02.270`)
+- [CVE-2025-49737](CVE-2025/CVE-2025-497xx/CVE-2025-49737.json) (`2025-07-08T17:16:02.460`)
+- [CVE-2025-49738](CVE-2025/CVE-2025-497xx/CVE-2025-49738.json) (`2025-07-08T17:16:02.647`)
+- [CVE-2025-49739](CVE-2025/CVE-2025-497xx/CVE-2025-49739.json) (`2025-07-08T17:16:02.837`)
+- [CVE-2025-49740](CVE-2025/CVE-2025-497xx/CVE-2025-49740.json) (`2025-07-08T17:16:03.023`)
+- [CVE-2025-49742](CVE-2025/CVE-2025-497xx/CVE-2025-49742.json) (`2025-07-08T17:16:03.420`)
+- [CVE-2025-49744](CVE-2025/CVE-2025-497xx/CVE-2025-49744.json) (`2025-07-08T17:16:03.630`)
+- [CVE-2025-49753](CVE-2025/CVE-2025-497xx/CVE-2025-49753.json) (`2025-07-08T17:16:03.827`)
+- [CVE-2025-49756](CVE-2025/CVE-2025-497xx/CVE-2025-49756.json) (`2025-07-08T17:16:04.020`)
+- [CVE-2025-49760](CVE-2025/CVE-2025-497xx/CVE-2025-49760.json) (`2025-07-08T17:16:04.197`)
+- [CVE-2025-53512](CVE-2025/CVE-2025-535xx/CVE-2025-53512.json) (`2025-07-08T17:16:04.400`)
+- [CVE-2025-53513](CVE-2025/CVE-2025-535xx/CVE-2025-53513.json) (`2025-07-08T17:16:04.593`)
+- [CVE-2025-5464](CVE-2025/CVE-2025-54xx/CVE-2025-5464.json) (`2025-07-08T16:15:58.547`)
+- [CVE-2025-6771](CVE-2025/CVE-2025-67xx/CVE-2025-6771.json) (`2025-07-08T16:15:58.703`)
+- [CVE-2025-7184](CVE-2025/CVE-2025-71xx/CVE-2025-7184.json) (`2025-07-08T16:15:59.130`)
+- [CVE-2025-7185](CVE-2025/CVE-2025-71xx/CVE-2025-7185.json) (`2025-07-08T16:15:59.330`)
+- [CVE-2025-7186](CVE-2025/CVE-2025-71xx/CVE-2025-7186.json) (`2025-07-08T17:16:05.833`)
+- [CVE-2025-7187](CVE-2025/CVE-2025-71xx/CVE-2025-7187.json) (`2025-07-08T17:16:06.057`)
### CVEs modified in the last Commit
-Recently modified CVEs: `137`
+Recently modified CVEs: `732`
-- [CVE-2025-6868](CVE-2025/CVE-2025-68xx/CVE-2025-6868.json) (`2025-07-08T14:37:18.003`)
-- [CVE-2025-6881](CVE-2025/CVE-2025-68xx/CVE-2025-6881.json) (`2025-07-08T14:18:32.693`)
-- [CVE-2025-6883](CVE-2025/CVE-2025-68xx/CVE-2025-6883.json) (`2025-07-08T14:18:19.600`)
-- [CVE-2025-6884](CVE-2025/CVE-2025-68xx/CVE-2025-6884.json) (`2025-07-08T14:18:11.347`)
-- [CVE-2025-6885](CVE-2025/CVE-2025-68xx/CVE-2025-6885.json) (`2025-07-08T14:17:03.797`)
-- [CVE-2025-6888](CVE-2025/CVE-2025-68xx/CVE-2025-6888.json) (`2025-07-08T14:16:55.400`)
-- [CVE-2025-6889](CVE-2025/CVE-2025-68xx/CVE-2025-6889.json) (`2025-07-08T14:16:47.070`)
-- [CVE-2025-6890](CVE-2025/CVE-2025-68xx/CVE-2025-6890.json) (`2025-07-08T14:16:41.300`)
-- [CVE-2025-6891](CVE-2025/CVE-2025-68xx/CVE-2025-6891.json) (`2025-07-08T14:16:33.023`)
-- [CVE-2025-6901](CVE-2025/CVE-2025-69xx/CVE-2025-6901.json) (`2025-07-08T14:16:24.390`)
-- [CVE-2025-6902](CVE-2025/CVE-2025-69xx/CVE-2025-6902.json) (`2025-07-08T14:16:12.293`)
-- [CVE-2025-6908](CVE-2025/CVE-2025-69xx/CVE-2025-6908.json) (`2025-07-08T14:15:57.870`)
-- [CVE-2025-6909](CVE-2025/CVE-2025-69xx/CVE-2025-6909.json) (`2025-07-08T14:15:29.440`)
-- [CVE-2025-6910](CVE-2025/CVE-2025-69xx/CVE-2025-6910.json) (`2025-07-08T14:15:16.237`)
-- [CVE-2025-6911](CVE-2025/CVE-2025-69xx/CVE-2025-6911.json) (`2025-07-08T14:15:05.867`)
-- [CVE-2025-6912](CVE-2025/CVE-2025-69xx/CVE-2025-6912.json) (`2025-07-08T14:14:24.530`)
-- [CVE-2025-6913](CVE-2025/CVE-2025-69xx/CVE-2025-6913.json) (`2025-07-08T14:14:13.950`)
-- [CVE-2025-6914](CVE-2025/CVE-2025-69xx/CVE-2025-6914.json) (`2025-07-08T14:13:59.330`)
-- [CVE-2025-6915](CVE-2025/CVE-2025-69xx/CVE-2025-6915.json) (`2025-07-08T14:52:37.427`)
-- [CVE-2025-7053](CVE-2025/CVE-2025-70xx/CVE-2025-7053.json) (`2025-07-08T14:15:29.430`)
-- [CVE-2025-7067](CVE-2025/CVE-2025-70xx/CVE-2025-7067.json) (`2025-07-08T14:15:29.597`)
-- [CVE-2025-7068](CVE-2025/CVE-2025-70xx/CVE-2025-7068.json) (`2025-07-08T14:15:30.160`)
-- [CVE-2025-7069](CVE-2025/CVE-2025-70xx/CVE-2025-7069.json) (`2025-07-08T14:15:30.420`)
-- [CVE-2025-7070](CVE-2025/CVE-2025-70xx/CVE-2025-7070.json) (`2025-07-08T14:15:30.593`)
-- [CVE-2025-7135](CVE-2025/CVE-2025-71xx/CVE-2025-7135.json) (`2025-07-08T14:15:30.760`)
+- [CVE-2025-7164](CVE-2025/CVE-2025-71xx/CVE-2025-7164.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7165](CVE-2025/CVE-2025-71xx/CVE-2025-7165.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7166](CVE-2025/CVE-2025-71xx/CVE-2025-7166.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7167](CVE-2025/CVE-2025-71xx/CVE-2025-7167.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7168](CVE-2025/CVE-2025-71xx/CVE-2025-7168.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7169](CVE-2025/CVE-2025-71xx/CVE-2025-7169.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7170](CVE-2025/CVE-2025-71xx/CVE-2025-7170.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7171](CVE-2025/CVE-2025-71xx/CVE-2025-7171.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7172](CVE-2025/CVE-2025-71xx/CVE-2025-7172.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7173](CVE-2025/CVE-2025-71xx/CVE-2025-7173.json) (`2025-07-08T17:16:05.297`)
+- [CVE-2025-7174](CVE-2025/CVE-2025-71xx/CVE-2025-7174.json) (`2025-07-08T17:16:05.513`)
+- [CVE-2025-7175](CVE-2025/CVE-2025-71xx/CVE-2025-7175.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7176](CVE-2025/CVE-2025-71xx/CVE-2025-7176.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7177](CVE-2025/CVE-2025-71xx/CVE-2025-7177.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7178](CVE-2025/CVE-2025-71xx/CVE-2025-7178.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7179](CVE-2025/CVE-2025-71xx/CVE-2025-7179.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7180](CVE-2025/CVE-2025-71xx/CVE-2025-7180.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7181](CVE-2025/CVE-2025-71xx/CVE-2025-7181.json) (`2025-07-08T17:16:05.673`)
+- [CVE-2025-7182](CVE-2025/CVE-2025-71xx/CVE-2025-7182.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7183](CVE-2025/CVE-2025-71xx/CVE-2025-7183.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7259](CVE-2025/CVE-2025-72xx/CVE-2025-7259.json) (`2025-07-08T16:18:34.923`)
+- [CVE-2025-7326](CVE-2025/CVE-2025-73xx/CVE-2025-7326.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7327](CVE-2025/CVE-2025-73xx/CVE-2025-7327.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7345](CVE-2025/CVE-2025-73xx/CVE-2025-7345.json) (`2025-07-08T16:18:14.207`)
+- [CVE-2025-7346](CVE-2025/CVE-2025-73xx/CVE-2025-7346.json) (`2025-07-08T16:18:14.207`)
## Download and Usage
diff --git a/_state.csv b/_state.csv
index 3c53749beaf..7fb6c66df87 100644
--- a/_state.csv
+++ b/_state.csv
@@ -51762,7 +51762,7 @@ CVE-2011-5276,0,0,b5f9432a947bffd9228ca15f6f16bb98f57aedf18dd462c465a931ad1a9341
CVE-2011-5277,0,0,8bdff731e16cb5a454961625ce0eb3902f4825081213839d427dffe3d00da725,2025-04-12T10:46:40.837000
CVE-2011-5278,0,0,b4a77a31802045dc2afae17124a2f8d6343b3869f7104094b2c4e506ce540d1f,2025-04-12T10:46:40.837000
CVE-2011-5279,0,0,1b3ffce55a95bf8624b3e797ff3b2124c23f4dffafd59c1f88311a4f77a642c8,2025-04-12T10:46:40.837000
-CVE-2011-5280,0,0,a1d46a60dc72e6f71a9af2480a0e0b7a0d92b9c97c09aa6f1da208b10c048c82,2025-04-12T10:46:40.837000
+CVE-2011-5280,0,1,436e94af72f868f1c285e6e02f9d8baa7735e5cc3955bb1ff28f114c816eff0c,2025-07-08T17:33:43.070000
CVE-2011-5282,0,0,5d218c2d9d6ca93a85b1e97c7a7dbb1c5d3628a6bb0054181da0d68ebba8c0f4,2024-11-21T01:34:03.410000
CVE-2011-5283,0,0,120c64cd422a0bcbb14cd46d8b4994d011d5941e0fcb014341a0014686e5e261,2025-04-12T10:46:40.837000
CVE-2011-5284,0,0,3fd3f2b719fa63dee596e2a3e2c130e94dbfe61013459552c64c45228214c987,2025-04-12T10:46:40.837000
@@ -56991,10 +56991,10 @@ CVE-2012-5856,0,0,d56a62dac11eeff06333b65e51feb0876faf3a88670a5c35609223902fe3dc
CVE-2012-5858,0,0,3eb625fb13b33eff84b7d9c34785013b5ad8b51d4465ebb281434ad6151d615c,2025-04-11T00:51:21.963000
CVE-2012-5859,0,0,0493b70a57038f6ab5abbda0a7216595c1a383b718a010bf902274c76cd77491,2025-04-11T00:51:21.963000
CVE-2012-5860,0,0,da15377714e73d4b1c7105b711cc3b9f4e7c603d105e0ef187df67bf6e2675f8,2025-04-11T00:51:21.963000
-CVE-2012-5861,0,0,797de49aea27f2e6482aafb6ec484c1eb72e1ec1535071e657c899fe5673f819,2025-04-11T00:51:21.963000
-CVE-2012-5862,0,0,882b10273278931129f7fc571b413bf6504638f348695dc4c9bf33ddf4abcadd,2025-04-11T00:51:21.963000
-CVE-2012-5863,0,0,693973d97fff609fc1b626b0be1d4eedd59724d9a4102f5c690ad76ed2675bcd,2025-04-11T00:51:21.963000
-CVE-2012-5864,0,0,1aa5b486e250257cfe400435f92ff99e29ba537dbf126a049d9d4f64794fcbf7,2025-04-11T00:51:21.963000
+CVE-2012-5861,0,1,1afe3853bb3d2b8d4316f1e989f177f16d95326c45c4a71438b8dd698489fa7b,2025-07-08T16:15:25.743000
+CVE-2012-5862,0,1,3cd78c9e306d4e9070274f97d25ffe5b5c24c440ed7d2a37333697960dd5279b,2025-07-08T16:15:26.580000
+CVE-2012-5863,0,1,5eb87c3c90c41c32ae40ded79c297f5db79851dea3fd4af731e79458dabeb712,2025-07-08T16:15:26.747000
+CVE-2012-5864,0,1,cfaf5c91a59c180b8b26a840b0bca3d69cca7ac65cceb74db43497aaf887623b,2025-07-08T16:15:26.917000
CVE-2012-5865,0,0,7b05df50c9e5d9b55243f3d52d2b71020618c856e02c14d18585947701c094d2,2025-04-12T10:46:40.837000
CVE-2012-5866,0,0,5392036c5e821cbfb2cea9865f98522d0c39975d459f64e9b8ddf7af44d6fca6,2025-04-12T10:46:40.837000
CVE-2012-5867,0,0,b4eeb23ac594ce781f99466fc914490b7be45508d175e43621f7b3b0e0cb25d5,2024-11-21T01:45:24.047000
@@ -59640,8 +59640,8 @@ CVE-2013-2014,0,0,bc0c48be2cfd5d0c360c7cee1e935041c27848aea19e039bdd6959f311a065
CVE-2013-2015,0,0,713383945eb299fc32f18df94ef72b10e0aabb8fd4f8b9ce7170283867b55037,2025-04-11T00:51:21.963000
CVE-2013-2016,0,0,2521895d1d7fb2676529d61e1ff0f3549928344a5b5cdb4c73eef6b1ea317e63,2024-11-21T01:50:52.110000
CVE-2013-2017,0,0,0a4915d8871da8f3552af239eb71c1a73a5124c1e6faff05afe350a5825edcba,2025-04-11T00:51:21.963000
-CVE-2013-2018,0,0,88bfc0b228b63608394d4959ee7e71d3f153c4ec3c4d5ae948774afe25136ce7,2024-11-21T01:50:52.380000
-CVE-2013-2019,0,0,77851bea63878df6fc364b12ddda6104bffcbcf7d4553b87759c5841c3792563,2025-04-12T10:46:40.837000
+CVE-2013-2018,0,1,bca97a6a0898f4d34cbc9ae50b0280224fcd00bb07db38b828bf0ba20afdff1c,2025-07-08T17:31:12.700000
+CVE-2013-2019,0,1,4ac092eff6579b81855d224e6f32a6233931e8010ee50ce29c90a10b00e2bcac,2025-07-08T17:33:43.070000
CVE-2013-2020,0,0,c0911002b31347e67ab505fa623577450adfd1f3f2f183313216d40aaf5d1a65,2025-04-11T00:51:21.963000
CVE-2013-2021,0,0,1119949ce2bfbaf9a72229fa8a9269a5a2914ac3948d8286c38f291a889c45ea,2025-04-11T00:51:21.963000
CVE-2013-2022,0,0,4e13b81e4e13f10063a7026750166cc3b6d22c343359afe4cfe6f59a97f6bf56,2025-04-11T00:51:21.963000
@@ -59908,7 +59908,7 @@ CVE-2013-2293,0,0,8d78a5611d2c27331b709474e4e2362f6990a69ee87bda0af8816a703b6423
CVE-2013-2294,0,0,4807498edba473c963a26c65b0ee6bc01fc32ea6ff369bda77d60cbc5716d51a,2024-11-21T01:51:24.837000
CVE-2013-2296,0,0,9fdc58b6a93f24b4c449f6a8f67dc1c4d83ea5e77d635a852dec4386d93b6b60,2025-04-11T00:51:21.963000
CVE-2013-2297,0,0,cddc4e8336aa557245a19fbd3ad78d9ca2d80ea6fbf284235326ed53b9ea4076,2025-04-11T00:51:21.963000
-CVE-2013-2298,0,0,442da58d6149db98aa7d51090205c00ca1db2da7889cc3b4bd150e41fc13d6af,2025-04-12T10:46:40.837000
+CVE-2013-2298,0,1,a993df072b0532d5326db9723f8e30767073ca357b4671be20f0f8183ded1250,2025-07-08T17:33:43.070000
CVE-2013-2299,0,0,ce0ce8e7c9fac6f1aaa2eb25fcecd8fabb6f28691f8cb6ed5c442bef10d2e452,2025-04-11T00:51:21.963000
CVE-2013-2300,0,0,db0410a3fde5d0c16ab3626f6113ca4f6bea6dc6a1707ecce3a64a03014192c0,2025-04-11T00:51:21.963000
CVE-2013-2301,0,0,b80d205ae57c96e1806a4e5d129e7c35c54016aaec626c5618d5100ed70c8321,2025-04-11T00:51:21.963000
@@ -64398,7 +64398,7 @@ CVE-2013-7382,0,0,01158df16749ef41bc5bbab832bf5292164ccf32212b26d888f40a89762656
CVE-2013-7383,0,0,63614e9a6dfdcd721c2a735ca46c23f760845626eea30f5e61c3e2f071159393,2025-04-12T10:46:40.837000
CVE-2013-7384,0,0,739df437b94511f841ef35a0ea94b5c2cad6eb60950b94da382009089179532d,2025-04-12T10:46:40.837000
CVE-2013-7385,0,0,18285529bfc0427983aec62bb41148d72cb9aa71792d9193d7945de8ea654008,2025-04-12T10:46:40.837000
-CVE-2013-7386,0,0,72bb6d84b0bdc4ced233492fc65098ace934a779cb7e78b4d4018de2dbfbc8fe,2025-04-12T10:46:40.837000
+CVE-2013-7386,0,1,6d68877f616c3f00a611fb2fa8d92d5cedcac5b2759609b72521c0a88c6b827a,2025-07-08T17:26:58.807000
CVE-2013-7387,0,0,f801a2fa369dd3dc25776d79e0b811468b86d75764cc8191634ff32f84079030,2025-04-12T10:46:40.837000
CVE-2013-7388,0,0,bec8f81f222684f1718a295474f0a654cc741d12085499565202a45a299d242a,2025-04-12T10:46:40.837000
CVE-2013-7389,0,0,b6d7b44645221f3956f37e839b21408386e51e81a29097e0a7ea31ae2cdec34c,2025-04-12T10:46:40.837000
@@ -222701,7 +222701,7 @@ CVE-2023-27345,0,0,ac9c559cd91913005b9c6f9c959637b20a514c388b73e0417b5486ec4822b
CVE-2023-27346,0,0,e25fb0dc4c8e226647a4070467c8ca2f796bc41956b1d62d7bbde7a2f33b0a8c,2024-11-21T07:52:42.237000
CVE-2023-27347,0,0,50d5c2457562f71e1189fc0d9fc85cccaf161f59deee5dde7d06b1419d1cbbb6,2024-11-21T07:52:42.350000
CVE-2023-27348,0,0,ab83e9d47a1c87a5fecd1538fcf551fcb9535be22b17d0f4ae4464bfe07cc5d7,2025-05-20T13:46:41.900000
-CVE-2023-27349,0,1,4322c2e72eae5ec4a075e787c1172ff9b0b25b12d8ab8cd677c411f89ab37ffa,2025-07-08T15:59:52.273000
+CVE-2023-27349,0,0,4322c2e72eae5ec4a075e787c1172ff9b0b25b12d8ab8cd677c411f89ab37ffa,2025-07-08T15:59:52.273000
CVE-2023-2735,0,0,71207ff2aa3fe96bf4a37466fc98812a19a0a9cbc14b3a56e51ec1bf25e56772,2024-11-21T07:59:11.627000
CVE-2023-27350,0,0,c8e0fdea8211d367acb6098a621fde52dbf56ae8bc2a583b632f2f7b59ab3abb,2025-02-07T14:59:06.530000
CVE-2023-27351,0,0,e7559d07e9ced6b5666e58bf0306b610aad03202812c6241ac15f7e0e269aa1e,2024-11-21T07:52:43.087000
@@ -225120,7 +225120,7 @@ CVE-2023-30300,0,0,384b34c8970c8d94d27211f584968a001e6158aadffb2a719513f04e0e593
CVE-2023-30305,0,0,41f7f9d2b6d02d9f14572959ad738425d2de384b8694736cf6a4739d441edc6b,2025-06-10T17:09:48.863000
CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000
CVE-2023-30307,0,0,770feea52682071fcf9018307b3ce7e46516bce082cff0011f0f356dbe14eb7a,2025-03-27T21:15:42.407000
-CVE-2023-30308,0,1,84a921fa16fb6c2fbc9b5bdf05c0ff66a02b4da48ba8c2b1b487087bef5f65ff,2025-07-08T14:29:29.840000
+CVE-2023-30308,0,0,84a921fa16fb6c2fbc9b5bdf05c0ff66a02b4da48ba8c2b1b487087bef5f65ff,2025-07-08T14:29:29.840000
CVE-2023-30309,0,0,ff60d8f6403371fdcc1759f7940ef48d661512b725e85bc96be6067ebc96ae5a,2025-05-30T16:35:16.470000
CVE-2023-3031,0,0,e2aec5206e5a0daa8d7b6f1685928c6f3be4a3f9026fd0ab515b66968c1ed2b4,2024-11-21T08:16:16.910000
CVE-2023-30310,0,0,4e60d91a8e9c9a089f7df4bff42ea8292d0daacd21f088522f019d1d6923680f,2024-11-21T08:00:00.283000
@@ -234493,11 +234493,11 @@ CVE-2023-42098,0,0,54d72860661e72bde77300b084eb35c8066d5d1ad92cc6f93778809a7ebd0
CVE-2023-42099,0,0,9931dca3d23d309a89f0d7a641e2be12b2920166a9169b2450c8164a1d9771bd,2024-11-21T08:22:16.313000
CVE-2023-4210,0,0,bca73ebcacf180926381198d1aa30e137cafee97df6c62c0910615b25cb3a91f,2025-02-11T02:15:32.220000
CVE-2023-42100,0,0,d52f409918e2e6a5cb63021533c7883d548100d593bb8329511762f63439bb1c,2024-11-21T08:22:16.450000
-CVE-2023-42101,0,0,ffab7501301208da707db4805f16d9c4e93d59f9256270a89191971a773196ef,2024-11-21T08:22:16.603000
-CVE-2023-42102,0,0,aaf431ee87e8a0d66536a9e11b48453c416e2313ebc38e32e1d2075ae067e6a5,2024-11-21T08:22:16.730000
-CVE-2023-42103,0,0,20e00b8c8ddfde1458a477de576ca0f0d30fa2c9841736df4a1e7d50bfc39507,2024-11-21T08:22:16.850000
-CVE-2023-42104,0,0,814636aa49a1b1314f78d99555c553643e1c3cc01719c6384173183a85512af4,2024-11-21T08:22:16.970000
-CVE-2023-42105,0,0,69e7253c44148efef5c6bc52e92536fc10ee77c7f9d374da0fb9782fe1266ac5,2024-11-21T08:22:17.100000
+CVE-2023-42101,0,1,710698824b81c2abe8c62818214d502cfc9030c2300bbc3c95a0f768a96f1f1e,2025-07-08T16:09:30.893000
+CVE-2023-42102,0,1,77265068043640da545e6fcd94fc9872e21743a2536f1c7bfd63e70e2d033b15,2025-07-08T16:09:41.143000
+CVE-2023-42103,0,1,a12c9a8965a5cace81cb0cdc4a14c3587c78278ea54174f1f087c256c8e50102,2025-07-08T16:09:56.370000
+CVE-2023-42104,0,1,24431d635b4cd70dd22457596bd60fc7ebc075bd08abc9441f2186fbb125964d,2025-07-08T16:10:03.773000
+CVE-2023-42105,0,1,0c1bf0604c60886c19a2559502df4ee99a19164f6e88584e5947d2c459fd4f1c,2025-07-08T16:14:38.037000
CVE-2023-42106,0,0,654690afd18932df832caae9f80b21e62712597adfbda6163cec5cd83907ea81,2025-05-16T16:18:37.077000
CVE-2023-42107,0,0,b0dcceae94be85cccf730b3a75ca89e158edff63be9126c30a93361e23f69e02,2025-05-16T16:18:20.137000
CVE-2023-42108,0,0,3ab3adba35ce6650c7451b4e5792f4122d4c79b2c8b28eeb95b5dddd0d617429,2025-05-16T16:18:05.060000
@@ -236181,7 +236181,7 @@ CVE-2023-44428,0,0,7ba427ec8daac675cc901d3eb39537bbf9552fd703535d3e11b4b4a57e1df
CVE-2023-44429,0,0,dfa40702f61fcde32607b8e65339f160a7e154b77d1ebf2027f97be3d9d962aa,2024-12-16T19:56:34.733000
CVE-2023-4443,0,0,1e94555c2145e45ec29dca5b3d19301cb9ea5ec612c1194355d64511597f6e31,2024-11-21T08:35:09.963000
CVE-2023-44430,0,0,1615412409194da3555272bcc3f61fedef274b4618ffe74a561db26e0e4744f5,2024-11-21T08:25:53.243000
-CVE-2023-44431,0,0,1733c4059baa65cce786b1f6646f7ced26681775769761f2e2445f788dc94cfa,2024-11-21T08:25:53.367000
+CVE-2023-44431,0,1,db9954bd829da976ba06b2371375f277e4eacc3764b77d813a02d3045535494b,2025-07-08T16:17:35.780000
CVE-2023-44432,0,0,eea484a9350a0b464d7c15d9a55a191c091fa6aeb52c1aba695ae8780fa25ac0,2024-11-21T08:25:53.493000
CVE-2023-44433,0,0,706ec279722ef55bb702968b0575aac728ef316d33739d32e434f88deb563c60,2024-11-21T08:25:53.603000
CVE-2023-44434,0,0,09f6ff21ad0f34c525fd3c005674fd45a5e1aed0297b5999b1c0767e3daa0136,2024-11-21T08:25:53.713000
@@ -240297,17 +240297,17 @@ CVE-2023-50183,0,0,5bded68a055fc3bd6e4f0272234b0c1984e3667eb01746f9bceb5b02deff5
CVE-2023-50184,0,0,a2eba33e402854cd96f36216b4184e8d5b82f4b6aa21943498c83f913c0be90d,2025-03-17T23:15:17.050000
CVE-2023-50185,0,0,fb912b70ac06b2428f0c0035c359bb79ab703a9a0f3e7863a1726824ee5ce7ec,2025-03-17T23:15:17.110000
CVE-2023-50186,0,0,047e2922b33df6f80409d7bff92b7afe0fa392a031f58749bfbea86569a72944,2024-12-16T20:26:46.057000
-CVE-2023-50187,0,1,468a64b6f4907b2d8f153243f12b897b21e52b4c6a9e4159a5640dc28757099f,2025-07-08T15:40:50.233000
-CVE-2023-50188,0,1,e1d5d1231d2e3a236d410a7e91cad9e5fc6910426a20ad58be48675187d8a712,2025-07-08T15:41:02.167000
-CVE-2023-50189,0,1,83e2edf62959cdcf443ba232c2764909594de1de3bad612fcc17eb54a2251bc4,2025-07-08T15:41:10.267000
+CVE-2023-50187,0,0,468a64b6f4907b2d8f153243f12b897b21e52b4c6a9e4159a5640dc28757099f,2025-07-08T15:40:50.233000
+CVE-2023-50188,0,0,e1d5d1231d2e3a236d410a7e91cad9e5fc6910426a20ad58be48675187d8a712,2025-07-08T15:41:02.167000
+CVE-2023-50189,0,0,83e2edf62959cdcf443ba232c2764909594de1de3bad612fcc17eb54a2251bc4,2025-07-08T15:41:10.267000
CVE-2023-5019,0,0,ce0908964f0985f5fbc6ec35489c220efdabba2b5c26c088d8e3f8c642c71e73,2024-11-21T08:40:54.210000
-CVE-2023-50190,0,1,f85f5edfbad221abc987d19055fc1208e6900ebce1a57898b7db48c8199a267e,2025-07-08T15:41:17.133000
-CVE-2023-50191,0,1,1442a5c5215dc71a87b036e9e317e84ee3699f58ce90786ed453bea8979737a0,2025-07-08T15:26:33.170000
-CVE-2023-50192,0,1,a86cfb33ecc8031ae1f5b44f8b3a57e93b7c1530efcc888323d5fc585701edea,2025-07-08T15:31:28.950000
-CVE-2023-50193,0,1,92e3c54614bbc0f8ff3ac5811af2de1a4744841d07081fb846cc7434f2aa9b7a,2025-07-08T15:39:28.320000
-CVE-2023-50194,0,1,acfb75d55f56bdc68f1705da0cc60b967e2d7c6a6ea87644139a0206dd8aeaa5,2025-07-08T15:39:58.680000
-CVE-2023-50195,0,1,53e923b2ef2914e7abbe3b973c497f1c104501fd34b916bd3312add4b5a9430d,2025-07-08T15:40:09
-CVE-2023-50196,0,1,c564c21adff14d4af6921fd52bd021842a75087ccd9f0852584388b7bb1a0708,2025-07-08T15:13:35.497000
+CVE-2023-50190,0,0,f85f5edfbad221abc987d19055fc1208e6900ebce1a57898b7db48c8199a267e,2025-07-08T15:41:17.133000
+CVE-2023-50191,0,0,1442a5c5215dc71a87b036e9e317e84ee3699f58ce90786ed453bea8979737a0,2025-07-08T15:26:33.170000
+CVE-2023-50192,0,0,a86cfb33ecc8031ae1f5b44f8b3a57e93b7c1530efcc888323d5fc585701edea,2025-07-08T15:31:28.950000
+CVE-2023-50193,0,0,92e3c54614bbc0f8ff3ac5811af2de1a4744841d07081fb846cc7434f2aa9b7a,2025-07-08T15:39:28.320000
+CVE-2023-50194,0,0,acfb75d55f56bdc68f1705da0cc60b967e2d7c6a6ea87644139a0206dd8aeaa5,2025-07-08T15:39:58.680000
+CVE-2023-50195,0,0,53e923b2ef2914e7abbe3b973c497f1c104501fd34b916bd3312add4b5a9430d,2025-07-08T15:40:09
+CVE-2023-50196,0,0,c564c21adff14d4af6921fd52bd021842a75087ccd9f0852584388b7bb1a0708,2025-07-08T15:13:35.497000
CVE-2023-50197,0,0,1d3b02b860128bb5029c41ac3776bf9f3c1ed8ab3f6bbf1e59772c2a98be0195,2024-11-21T08:36:38.490000
CVE-2023-50198,0,0,c732cbf6bc4abe7f1537a9afaa67cbed2afcd2d17151f53f304f9b20dd07bf5b,2025-03-10T16:33:57.583000
CVE-2023-50199,0,0,d3474b2080eab456db90d45fcf0842ccd092149121d7fa1a6ca6cdd19cee4894,2025-03-10T16:52:11.590000
@@ -240343,9 +240343,9 @@ CVE-2023-50225,0,0,96838204e74426c388654b10e9d53d3e97de8dc3d26059e1a7933d20edcf9
CVE-2023-50226,0,0,f1fbbbd8ab902cddd39f0e90f3ba4d8a4ba2b46e1842e8d9d339fbc65e105534,2024-11-21T08:36:42.200000
CVE-2023-50227,0,0,ff8fa97454a2848bef1e970411cd5cf32551b2c1397b9464233c18cc99b4f4dc,2024-11-21T08:36:42.337000
CVE-2023-50228,0,0,3e5d23aac1dc401c164f3f024be68b4416a671f3ff874701c6082ca0e0266cf8,2024-11-21T08:36:42.487000
-CVE-2023-50229,0,0,c4264395c387a0930cbca18a6036eefb0a2758b49d43ecd1e025e7676f952fa0,2024-11-21T08:36:42.623000
+CVE-2023-50229,0,1,e39cf38af92083e1fad99a1617bb3259709a0b3f69a64c042ce781fe35dfb401,2025-07-08T16:28:15.657000
CVE-2023-5023,0,0,ba840a1011c4efe55bd28c599f019fa52d65e5891e8bbb55647de6e528fe52a8,2024-11-21T08:40:54.760000
-CVE-2023-50230,0,0,1b9ce8f54adc33a8d13ef6bd1f95d29b83e32eeb848eb44050453a5523cb8f01,2024-11-21T08:36:42.750000
+CVE-2023-50230,0,1,23ad763db653470221a45c00508da1458bfe2e557cd22d68337ef51f5bd7df60,2025-07-08T16:28:02.977000
CVE-2023-50231,0,0,012fab22b29cc5e9eb9f7d862cee881c244ee37ad599e2fbbe4ace60ae9102be,2025-02-07T01:59:11.987000
CVE-2023-50232,0,0,5dbd2893f64f3633d3b20079bb4a6db0f509cbc188943506f47ead972c197d08,2025-03-12T14:02:20.797000
CVE-2023-50233,0,0,8a479579952b682e48a14b53ce5ccb9b404ef97e5033c1602258dccd9a7b4289,2025-03-12T13:52:14.297000
@@ -240648,7 +240648,7 @@ CVE-2023-50782,0,0,299729c2ec80e45a64acaf6b330dc08ad4fd39a65f8a06b4332c11a86131e
CVE-2023-50783,0,0,1ef78e5a5517555eceafa507821beb8eed1794b210be810f125231af396d7a2d,2024-11-21T08:37:18.497000
CVE-2023-50784,0,0,363a3d3c64d14d1ecf52616ef255522ebf1ecb39143069797ec28afd2fe3be87,2024-11-21T08:37:18.633000
CVE-2023-50785,0,0,04d09dececbdc3b8babc46de7b6d85787f302133d45e1225dfdddd4d21f84650,2024-11-21T08:37:18.780000
-CVE-2023-50786,0,0,845cb24f448c53d464c644752b975f2ee42a4f9c51c98d7ec85e247480ec6e9b,2025-07-07T19:15:22.473000
+CVE-2023-50786,0,1,fed6f173fd492d02a2897c2baeb784ff8942c19bc9e528ffbd034a66b165ade5,2025-07-08T16:18:53.607000
CVE-2023-5079,0,0,4d36ea6ee96620d3a4c4792c8036fe077bb40efeb13eab11aaf850251e9ea8d3,2024-11-21T08:41:01.513000
CVE-2023-5080,0,0,02339a01b1b6ff5fdf4d2ffb54b376d5f6ec3116879991b7f4f1d96a4548d024,2024-11-21T08:41:01.643000
CVE-2023-50803,0,0,266d81a4d6d4530ab8237d281ecc5bf2ca4948455b03314c272985e31769da35,2024-11-21T08:37:19.013000
@@ -240939,7 +240939,7 @@ CVE-2023-51217,0,0,c572e9fc555b67fbd8bd65745c6358aa86fe459a87669ead1694c0f780150
CVE-2023-51219,0,0,ed9264b5d5bba3ce65d2752c3b1850f14b4fb39ad5d6f529328c2a51d4c8e38c,2025-02-19T21:15:14.533000
CVE-2023-5122,0,0,05cac3257f237d04df2bc4fc8a8899b5106568e4dbd1ff40b3c5537d8f10e59a,2025-02-13T18:15:55.023000
CVE-2023-5123,0,0,fbc607d8916f6087859cdc46bf56c313ed6143ddbafacb1cd001f30ba0eeb2fb,2024-11-21T08:41:06.523000
-CVE-2023-51232,0,0,05f8a15197f5ceaa106c52f09b60ee6a3a443657216a6fdcb3de638607571b02,2025-07-07T16:15:21.693000
+CVE-2023-51232,0,1,d9611696106658543bd12a3f53e585208d2a4d22e476cf693309d6f24fe69d3b,2025-07-08T16:18:34.923000
CVE-2023-5124,0,0,4ae7f6d72e6f78b906157940196f4187fc84147c90874c38bcd29b0552e85a01,2025-05-22T18:15:31.467000
CVE-2023-51246,0,0,960fd793b1477fd8ef0b684daa2469cf1a3748c7b8a6e1e94349f13f7f5a7682,2025-06-16T19:15:25.843000
CVE-2023-5125,0,0,6f649fa8f5e8ab758347050d5c13f83daae1107df706ef0b699bd7df9523860b,2024-11-21T08:41:06.760000
@@ -241256,15 +241256,15 @@ CVE-2023-51585,0,0,d3dc56566d691aa4b817f3d1dbf49fd66f57aede6476ad4ed21712ef4abb5
CVE-2023-51586,0,0,56b786c685ebee98a04bada3e4c55a40a539809369b5c81d6f3fb961a9797fa8,2024-11-21T08:38:26.197000
CVE-2023-51587,0,0,c18bee7f2ec860cfc7f906250eda128695a9f8ca46ffab1284db587559fb9eb6,2024-11-21T08:38:26.310000
CVE-2023-51588,0,0,2fc923256297b4edf6541e9823e4f89bfa3091ef25aaa36d7013de2193be27a9,2024-11-21T08:38:26.427000
-CVE-2023-51589,0,0,2be5f2de94c451b7f35118d1dc638257953a46cc3e7c6f6feb7650d61b9a2311,2024-11-21T08:38:26.553000
+CVE-2023-51589,0,1,a47ab3178b3e4ed8cb04b562944ae67e3a6ae1cb4a18edb94c50399f76998d5d,2025-07-08T16:27:54.023000
CVE-2023-5159,0,0,7e82769c8669e5c343ab0138ada4d90e7d06c97d010af2621b39751b4d56428d,2024-11-21T08:41:12.140000
CVE-2023-51590,0,0,99e295efe363bd588b351de9e6e97d597cf3bf779440d59ae5ba71f8820ebd3f,2024-11-21T08:38:26.673000
CVE-2023-51591,0,0,e1f22ce73270e27205c2321a303a65f447a883e2762b1459ebf3a75df371cba2,2024-11-21T08:38:26.790000
-CVE-2023-51592,0,0,e011f8b741fd97c20997c0a2d9596deed867c9f84805a656c2df3f259325e364,2024-11-21T08:38:26.907000
+CVE-2023-51592,0,1,724b15a83f44d58c548464364abce44a301077b19391310ab1c103911b5069fa,2025-07-08T16:27:47.370000
CVE-2023-51593,0,0,afe011ad8d42939198cee27edeb7b82dc372eb9b8f2322876732e1c944b4e8bf,2024-11-21T08:38:27.030000
-CVE-2023-51594,0,0,136ea88dfe880eaa3ba54401dc1573ee4cbf99f70e98eb68fa8c18c97a30c437,2024-11-21T08:38:27.157000
+CVE-2023-51594,0,1,cc2fb9e2aabf8b5d974a87e9004a6ad044e6a08eb94a03f44e720980ab339085,2025-07-08T16:27:33.363000
CVE-2023-51595,0,0,9b259369998b9f50ab8256564d8ae0d12fc40b2fc18a1bcd6ed7c194b1645d2b,2024-11-21T08:38:27.277000
-CVE-2023-51596,0,0,8ab5de541d315d66656f3e2a2b3c90164d5b5b5e865cd7c8199cc64bfb4ad878,2024-11-21T08:38:27.397000
+CVE-2023-51596,0,1,342a38b1aa799bb4bbfd43b0da3b90fdbbb0fb53ce1195d49f3e1a69354d5358,2025-07-08T16:27:02.940000
CVE-2023-51597,0,0,7b4d277a728056fe4971ea53c93b2cf0919edd020f0df306b7d16bee44297414,2024-11-21T08:38:27.513000
CVE-2023-51598,0,0,1f69815fd41df9e4012b6cbd7dc4709845e56834886c48e38f67209eaff9ec34,2024-11-21T08:38:27.630000
CVE-2023-51599,0,0,881401ea871e3397ff3a2bdb69187a11c1acc7424c698bb06115437f37bee07d,2025-03-12T13:43:56.767000
@@ -241741,7 +241741,7 @@ CVE-2023-52232,0,0,25816897725e03b2601314f3c9389a2be7d7e262fad693583de240b223ce3
CVE-2023-52233,0,0,877bd66a154fad8c345ab7555640a1d78deadfb819ba5856bea098cb5a886a2f,2025-06-04T15:05:06.540000
CVE-2023-52234,0,0,6984b41c87b7f2d15b820bc3d8db1038b20cc6bb55fdedabf1511bd51365f7a8,2025-03-10T15:52:35.053000
CVE-2023-52235,0,0,4f1e2f38c8f4b55ae6d956cbec2c5763374a4cbfb41d1307d39af61dd9437d7b,2025-03-13T20:15:16.470000
-CVE-2023-52236,0,0,0e57b3089b13a39d4da9955b8213db71e16e528a891828e0afbc729b48690e1e,2025-07-08T11:15:23.750000
+CVE-2023-52236,0,1,23f912d5d70397203587d08c905f849f9c06e578a18e3b117a934844a8e04f99,2025-07-08T16:18:14.207000
CVE-2023-52237,0,0,ec00cd5043a647583ae661e798908ac8aae8b8c80323fd5ded69d2879fe6e25e,2024-11-21T08:39:27.630000
CVE-2023-52238,0,0,8b91affaee9fe41fbb00a1a88e4e12c3ca7d1995b7642fbf22e7576aa0f87b25,2024-11-21T08:39:27.907000
CVE-2023-52239,0,0,c28a063b7fa56cbc60e5bf7e799f7020ddac741446ed7e5a20eb359aae46640a,2025-06-17T16:15:28.247000
@@ -245444,7 +245444,7 @@ CVE-2024-10015,0,0,217a292c789a9f8ea3b1717a9a4b42a5c13589b9293af6ac699c09a1f0997
CVE-2024-10016,0,0,f77f52c803ffaca4f851d3ea7a048b10f89ed8d8abf952ae01a553fb73da8ac4,2024-10-25T12:56:07.750000
CVE-2024-10017,0,0,ac308af229b0d24d19fc095a4b9a87dbdbceea62cdb8273476acbd382c05e54e,2024-11-18T17:11:17.393000
CVE-2024-10018,0,0,f74fa5d6201156539ed33b98fac078f6c46290458b9c91a25d38f5f9bed11793,2024-10-16T18:35:03.460000
-CVE-2024-10019,0,0,c0f95f1a5cf73474133570e3b781ad888619af378423033f474f5174faa77b4b,2025-03-20T10:15:14.230000
+CVE-2024-10019,0,1,d00e99ee94996b0ff9934c553033cb23cdd949dac571af006c6e3bb6d2f500c7,2025-07-08T16:32:39.380000
CVE-2024-1002,0,0,16f6d6fc238b81bae617ff212eb49c31835779bdd213f9b5592bbc2b99bb253a,2024-11-21T08:49:33.997000
CVE-2024-10020,0,0,dd1a85f60dc6ff264af0333a1bf770d15a3c66529d00a5200d377d152346be7a,2024-11-08T21:19:58.813000
CVE-2024-10021,0,0,044cb9f16ce8be8cf159bf72bb3b151cb436819cdec58e617022f136c00c0c80,2024-10-21T13:13:25.677000
@@ -245469,7 +245469,7 @@ CVE-2024-10043,0,0,15debe6a05b2854b66ec2962b60af0c6901f10ade93dabb43ab1785dfa994
CVE-2024-10044,0,0,1d7ade8893de2903e11b513c25d66574af7eec0ab3c2aff1a3e7a655029b82a0,2024-12-30T12:15:05.990000
CVE-2024-10045,0,0,856fc9a539db9327702f3141fe8cd970de60cdb7e18125e39405eb0d41f31999,2024-10-25T18:52:30.337000
CVE-2024-10046,0,0,affe8ae08e1550f00dfad8d5468ae3e6fc09f4637e56fab36b963f0a53463c60,2024-12-07T02:15:17.543000
-CVE-2024-10047,0,0,4c8383edc99d2d256d44f0149347f5181da3ffa23770970f8bb18892b66e61f8,2025-03-20T10:15:14.360000
+CVE-2024-10047,0,1,9433ca3437a302151715eaccdfd3433f9a9b670cc954d452042cbd03088eb3b8,2025-07-08T16:28:09.237000
CVE-2024-10048,0,0,ecbd52d9f528e72b1a462b39f0bdabc3e6386a862771af6a7927a393730bf0a7,2024-10-29T14:34:04.427000
CVE-2024-10049,0,0,ab8109393fbebcc7c815ea82c43d722c48bbdc2cbe9b652f3c7396c228b70d66,2024-10-29T14:49:04.463000
CVE-2024-1005,0,0,ed2fd43005b4c02b996430d2e1b04298d8ee6eec22f834a1316dd06d26e06664,2024-11-21T08:49:34.437000
@@ -246734,10 +246734,10 @@ CVE-2024-1128,0,0,54a69d705f12085e9815f97438893085defbeff56c788628eb3154f79b1c48
CVE-2024-11280,0,0,55a96727b2485e04cc5b6b8add864215b2cd1aa8bc4bdf75a3cee41a9da85d1e,2024-12-17T12:15:19.343000
CVE-2024-11281,0,0,90e2bd5c8205361ece3136c81be65d202c124421a44b94b51cee816a97580eff,2024-12-25T07:15:11.777000
CVE-2024-11282,0,0,544f79fb119a13b42192bd1a63981f407562625562669123104c8f0013b15707,2025-06-05T15:42:54.053000
-CVE-2024-11283,0,1,ccd0da35a74b9d40a981b29d8fae905ffc0a0ca6dc05e4dc00669d0fb0dcd6aa,2025-07-08T15:25:15.597000
-CVE-2024-11284,0,1,db0eae0c4665830919d4e6a05c83b645c2d347814f33b6424b322c38c9ac9a5e,2025-07-08T15:21:52.530000
-CVE-2024-11285,0,1,59401337f502fcce6b6e47bac5eb84e891bc492d6e8f00ceb24f0d76bca55bdc,2025-07-08T15:20:09.593000
-CVE-2024-11286,0,1,7ed1e8db512350fa0a0cedb151e6f06e2b6faa2bb85ebe4e5d05dabdf96ee16f,2025-07-08T15:17:34.610000
+CVE-2024-11283,0,0,ccd0da35a74b9d40a981b29d8fae905ffc0a0ca6dc05e4dc00669d0fb0dcd6aa,2025-07-08T15:25:15.597000
+CVE-2024-11284,0,0,db0eae0c4665830919d4e6a05c83b645c2d347814f33b6424b322c38c9ac9a5e,2025-07-08T15:21:52.530000
+CVE-2024-11285,0,0,59401337f502fcce6b6e47bac5eb84e891bc492d6e8f00ceb24f0d76bca55bdc,2025-07-08T15:20:09.593000
+CVE-2024-11286,0,0,7ed1e8db512350fa0a0cedb151e6f06e2b6faa2bb85ebe4e5d05dabdf96ee16f,2025-07-08T15:17:34.610000
CVE-2024-11287,0,0,b8ef489e2496a64e11ea3ae2fe376c9efffdf5939c174816ea3ab47d9379300b,2025-02-28T23:03:04.507000
CVE-2024-11288,0,0,dd8a3651b65598db1e821ae128b6008d07487cb5109df54c50f8ebe2ba545930,2025-02-11T02:15:33.440000
CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000
@@ -247423,7 +247423,7 @@ CVE-2024-11933,0,0,ff719b80c8b04b1955877df42e564ce90eac2c09e4f59c20e785f18a1e880
CVE-2024-11934,0,0,744a72b875229eda9af00bf8cde59d77110b18803c7442665bf58299c9e4d643,2025-01-07T04:15:07.520000
CVE-2024-11935,0,0,f2a8d43d6f9999d38415d9b41f66ab77f7c4f7c94de5d0bc77beeed93d88f487,2024-12-04T13:15:05.910000
CVE-2024-11936,0,0,fabef096981e2f550c40dfe0d9724622960b49b3a39badb80025ebed8208ae38,2025-02-04T19:39:02.087000
-CVE-2024-11937,0,0,7d0247a97f10d626c6189726f787ed538c232e7bcaa02164772f0007db8b3acf,2025-07-04T08:15:24.900000
+CVE-2024-11937,0,1,1e945b4d9fa00cec5bdb0d0941b1b49e9a355d3b2523126745f91cb9e653665f,2025-07-08T16:18:53.607000
CVE-2024-11938,0,0,6867b7d1c50742be481431f973c83467fcdb9442488abece06649b31c7a1e61f,2024-12-21T07:15:08.453000
CVE-2024-11939,0,0,6345ccf177226852fd504f0bbd480483116e863a5c5b707e8b4952ffc0b3c45f,2025-01-08T09:15:06.630000
CVE-2024-1194,0,0,2ad6fa2abb4bb109947132f87b19e7c09219cf51535c19102f3cbbfcba6ba405,2024-11-21T08:50:00.573000
@@ -247998,7 +247998,7 @@ CVE-2024-12486,0,0,f221fe06047263b8f4576777d32c700bb8e394bc7cf4c88fb5aed64571bf3
CVE-2024-12487,0,0,dac76ee4b5b6dda43c8a5b25b978c597cbc5bba5f166e4fb0647c5ebb3b008d6,2024-12-12T17:36:03.097000
CVE-2024-12488,0,0,b0f91cfe64e50a95b276c79be22960486f35dadd24e50f2888c194ae5fb489e6,2024-12-12T17:37:05.537000
CVE-2024-12489,0,0,cbaa61dbaaf5450cc4fa4503ae760ba1505725775c654cf5aafb79e23c5892fa,2024-12-12T17:38:15.650000
-CVE-2024-1249,0,1,93660e04cab1a7751243ab7e43697b48daf41fb9e39a1b1990c197b296d94784,2025-07-08T14:15:24.283000
+CVE-2024-1249,0,0,93660e04cab1a7751243ab7e43697b48daf41fb9e39a1b1990c197b296d94784,2025-07-08T14:15:24.283000
CVE-2024-12490,0,0,b39fa2be0c4d2229089d571f0a98b21f5ea47c9bb140688e82a03b90ee7fd7c9,2025-04-07T15:16:41.913000
CVE-2024-12491,0,0,d9590e8254ca45b54a5272db38ba7d701c7bc7244fa53f0252652da7575fb348,2025-01-09T11:15:13.520000
CVE-2024-12492,0,0,2b51212ffb72d28387758820ff9bf713490d9e830e5ddea54c6f4af6372d81a6,2024-12-13T17:12:51.283000
@@ -248277,7 +248277,7 @@ CVE-2024-12762,0,0,206a825ad38b69604e590b710705d83cc340ac22f3d02beb2a107b23efee5
CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda161f,2025-02-11T02:15:33.770000
CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000
CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000
-CVE-2024-12766,0,0,ef2970185c4143546c0baeb597f342e9581a560cd490177245415b6c9c5f050f,2025-03-20T14:15:18.387000
+CVE-2024-12766,0,1,8e2b956439d8f0a9540ba8963fb7bd7e29e7ba35596c02fb05a9b37f77aac14a,2025-07-08T16:24:32.990000
CVE-2024-12767,0,0,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cbeac,2025-06-10T11:53:16.670000
CVE-2024-12768,0,0,cbf9ff20e80bb09942852fa2e956342eb17e9d4f27cf212ff4c0d8344126a292,2025-05-12T01:04:06.597000
CVE-2024-12769,0,0,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000
@@ -253868,7 +253868,7 @@ CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a59398430
CVE-2024-24775,0,0,7f0cbc7d6af894e75c1d6dc5713fcd9f630cd471f82e9ecb0a63fc95da2f7ff6,2025-01-23T19:53:31.737000
CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000
CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000
-CVE-2024-24778,0,1,82b16a3765800fb38798f898835f1fffcc02981f1e438efc9e1d5c5cd90bdb06,2025-07-08T14:02:27.340000
+CVE-2024-24778,0,0,82b16a3765800fb38798f898835f1fffcc02981f1e438efc9e1d5c5cd90bdb06,2025-07-08T14:02:27.340000
CVE-2024-24779,0,0,d1099767ab58965b8377911df500ad290244beb7b085f2560739aea6a8026dba,2025-02-13T18:17:09.103000
CVE-2024-2478,0,0,d5dc9b44807fe1d8aed8b3d5f340ae77ceaeaf8329820bfd973fa875853d68bb,2025-01-23T19:24:38.173000
CVE-2024-24780,0,0,a4222fbda2f225ecacbd43918d55da5cb020cd731b635b744ed1c4af943f19d6,2025-07-01T19:21:39.177000
@@ -254227,9 +254227,9 @@ CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0
CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000
CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000
CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000
-CVE-2024-25176,0,0,3836058f1755dacf2560d4d021be76bd175dc1f96054736856eb4b5eec23f313,2025-07-07T17:15:27.247000
-CVE-2024-25177,0,0,74f11d04f69d35694c6171a597a15c0c05fcbdfc9131bbb2d0b2e9bf0fc70f2d,2025-07-07T17:15:27.403000
-CVE-2024-25178,0,0,257402d2b1d3f477514e3ba0983fa7d32b3bad66e77d3a0b56b5e87d61b28714,2025-07-07T17:15:27.527000
+CVE-2024-25176,0,1,b4357b370148e530cb0029b9c3272f1e128e7b8f53d2af49a6f9f0b63ed1ad50,2025-07-08T16:18:34.923000
+CVE-2024-25177,0,1,46ebc7c52c415d44ad71ef2bca1e691bf49765fba544e9caeab909b4f8b8951d,2025-07-08T16:18:34.923000
+CVE-2024-25178,0,1,cd233969108837fb7c4990341263e58709ced7b9a7720d7b9780d02caeaf9b7c,2025-07-08T16:18:34.923000
CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000
CVE-2024-25180,0,0,6c4f9519ece96564cb8bbb38c56337d15b68729b9ea597b77e43cb8c48c7e78f,2025-05-13T14:46:15.803000
CVE-2024-25187,0,0,b5bdcba71ceb1efd4b7f3a75dfc46c9a93b6aa6414ead7bfb505e326018a4574,2025-06-10T00:46:34.737000
@@ -259334,8 +259334,8 @@ CVE-2024-3185,0,0,1c67103dbf88a510a8278b98b5d99e3057e7b8f69cfef404fe34f189a7ca07
CVE-2024-31850,0,0,3cf28f7334b4de0542e5428e9e2adb543da6f22147b194d3fb612012e6aa1a98,2024-11-21T09:14:01.337000
CVE-2024-31851,0,0,e45f336d82b2d3d9adbf3a8bac0b970c5266b3cdbe6939aeace9733f93a83fdc,2024-11-21T09:14:01.463000
CVE-2024-31852,0,0,ba9051f6bc6d3b5aba3b4d7f2092d68c6a17eb29edddb549caa75380b0b647ce,2024-12-04T21:15:23.467000
-CVE-2024-31853,0,0,cab61e3b35618d5f631c7bed03e2310289877bbfca4ff8110baadcdd5c7d0736,2025-07-08T11:15:23.997000
-CVE-2024-31854,0,0,52b2b00eb942b78651056a3a4cf01c91493b53456298d8d1b9031cbe0319ba90,2025-07-08T11:15:24.180000
+CVE-2024-31853,0,1,b9c986948e005c973f2fef3f3e6421936d2870f3f2cd1d6fafa0cfb7b7d9ac7d,2025-07-08T16:18:14.207000
+CVE-2024-31854,0,1,e7ef7379f6409a3d4c87447e1e8e3473ace641b0dab41702cf9de092f29efc77,2025-07-08T16:18:14.207000
CVE-2024-31856,0,0,b0ae28b2cf04a3d57b1162c504882bace010687db30d97cb579a93bed060de40,2024-11-21T09:14:01.757000
CVE-2024-31857,0,0,20dfb12af53dc65b264ed20f498f15824869d4ee981fc0225fa3ba43b44587e3,2025-04-04T13:03:08.680000
CVE-2024-31858,0,0,fb7ea5972ca29ef5dbb01c13ffa0f30c065ee6f5e39915061b97fa7a1c736b37,2025-02-12T22:15:33.340000
@@ -262882,8 +262882,12 @@ CVE-2024-36339,0,0,1b34ff5ccca3cdedd66bcf22531ed2f97591affc59a006dcedb42b8773702
CVE-2024-3634,0,0,77fc3568fde2ddee3d9bd99dd67fe36db715f96bda54aeed4b51c0d18043e4c1,2025-06-30T17:25:12.840000
CVE-2024-36340,0,0,199e523fb7080870f0938f9edebaec67a2499b220ae3b6249758953c6312289a,2025-05-13T19:35:18.080000
CVE-2024-36347,0,0,425b9fcc7804368f7933b0d358855b83a9cc1321ba9ebc1eab9f77c0ce2ed3fd,2025-06-30T18:38:23.493000
+CVE-2024-36348,1,1,b4e8e79154642c0c414b1840949739ec3697cdac99bd2558fd6b51e3046db11c,2025-07-08T17:15:31.200000
+CVE-2024-36349,1,1,8f6ad957aee2297bd3bbc866638d5dab1d85eecb7fcb895fc8e0b0f97f2cd32c,2025-07-08T17:15:31.400000
CVE-2024-3635,0,0,6b91ce08fb1c4fe8eb1c3b4b2db88c9ffd3abcddd772228d559fe4e3fab4a5b8,2024-10-02T14:30:24.627000
+CVE-2024-36350,1,1,d78401853392a743315452849bdb201ca60204d7290e6c9d9e26af9c68222ba2,2025-07-08T17:15:31.563000
CVE-2024-36353,0,0,caf07d2a6c34feb51886f1ce6edb50e9937e103b379c80565763a756df3ec242,2025-03-02T18:15:34.033000
+CVE-2024-36357,1,1,f2d080c16567643ef35e84846685dbb73544149cce7c870394ab08b9d13e11da,2025-07-08T17:15:31.723000
CVE-2024-36358,0,0,81b5623d6ec0aba632ed9ccbd9cbbeee602466b9c8b47e22ca90ce67f15c6d23,2025-03-13T14:15:26.933000
CVE-2024-36359,0,0,681447f14a7123230c23ae85426c8aaf48135d70ce8470eeb85fe0cc08ab2eb1,2025-03-18T16:15:21.627000
CVE-2024-3636,0,0,7998201ae43ad31a3690128e467b0e5b28dee8679cc095cec217932ed4c04872,2025-06-06T16:15:59.430000
@@ -263972,9 +263976,9 @@ CVE-2024-37645,0,0,ed1492295339d7a0140a77999293ad86a62381e2bd8a6493345d318dc45c9
CVE-2024-37649,0,0,162c02fd634f3857ac43a4b48233920dfa2eaee3a75657af8d68aaa5ded5f644,2024-12-31T20:16:06.253000
CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000
CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000
-CVE-2024-37656,0,0,79e3f64a38c17d3755e97011176fd6949201301c714ce2d3c384325b0cca0188,2025-07-07T18:15:25.120000
-CVE-2024-37657,0,0,a9d608d13ccbf413c953040eece9ec60a971277ff09b71ab33dbadd78fe73703,2025-07-07T18:15:25.233000
-CVE-2024-37658,0,0,2a79346e6f1ef52366aeb6a02a8fd22b5083889109acf258c00b471a7469de2c,2025-07-07T18:15:25.340000
+CVE-2024-37656,0,1,2151c7eab75115d0632ef79d2a5839f6bb7cbba17577f61118e63db4a6c27cc4,2025-07-08T16:18:34.923000
+CVE-2024-37657,0,1,64813d50e7fba9384f62642064670f3fae780cfa15486002f4c59fe96f8cfb41,2025-07-08T16:18:34.923000
+CVE-2024-37658,0,1,987659053ae8b1051e2fbb20a206874f5d1277260a7bc3bb14acb04803b2e5f0,2025-07-08T16:18:34.923000
CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000
CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000
CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000
@@ -265240,7 +265244,7 @@ CVE-2024-39243,0,0,10306514cc817e8ebf9d3a09128c9b7daa20f9b7eb6f85457b38ce7f19cc4
CVE-2024-39248,0,0,ef5bdeda9bf8b129f7fdf1bf335dbd2259ee8389ce9f4b740214a512856eaf82,2025-03-18T15:15:52.563000
CVE-2024-39249,0,0,7be8f0314a4b46939ea494f384d9ffdc384f5f98b6cd05eb17cc6b2d50d2a427,2024-11-21T09:27:22.130000
CVE-2024-3925,0,0,cd8dfd6d51ac6cd690d67929a196f6da1ca4ca4430d5caf127ecc9ab5f16da00,2025-01-29T15:31:21.800000
-CVE-2024-39250,0,1,07184ab35125b9d1cfffd08d854986f33f3fc962679f0c31a5bd7379f88e5a6e,2025-07-08T14:22:55.190000
+CVE-2024-39250,0,0,07184ab35125b9d1cfffd08d854986f33f3fc962679f0c31a5bd7379f88e5a6e,2025-07-08T14:22:55.190000
CVE-2024-39251,0,0,3942c4a7466e7fc2e4155921b6eb43faca48c11ce53c6ffaddd8e1977aa20a58,2025-03-13T16:15:20.597000
CVE-2024-3926,0,0,51434e29dfb2eebb8885224fae15204650299505b3306da193a5da4c23613de1,2025-02-27T01:57:21.590000
CVE-2024-3927,0,0,dfca90fba51f1cdb0e669b146eb8c364d8277c350a616c672c1dd922a72759a2,2025-02-27T02:05:14.560000
@@ -266007,7 +266011,7 @@ CVE-2024-40334,0,0,1cc55c7d262e1fe4311109f1b8889bb0596ed8b0bbb5eff12df349e099c78
CVE-2024-40336,0,0,57cb6037c294de1ccfe4321a4d715a39b76705e5ee0bc23550ea23e0a8a3618d,2025-04-15T17:00:47.123000
CVE-2024-4034,0,0,3e1edb4e313fcec881652216da691401d01ef765d0e32a87a1a27b2115e70200,2024-11-21T09:42:04.307000
CVE-2024-40347,0,0,5c4f900c27a79a65c2c1950bebc45a10727f89a6cff7435d7eeeb5c0e73aa596,2025-03-18T15:15:52.787000
-CVE-2024-40348,0,1,9a9e04260fa6540a32fe90b5e46398a5b4c6e4c4f64f4e657595994eb1377dba,2025-07-08T14:31:55.863000
+CVE-2024-40348,0,0,9a9e04260fa6540a32fe90b5e46398a5b4c6e4c4f64f4e657595994eb1377dba,2025-07-08T14:31:55.863000
CVE-2024-4035,0,0,f76d80111e81f9edad4b19e9027b1d70e9b8c1241f56329bd5838cbdf02e9566,2024-11-21T09:42:04.440000
CVE-2024-4036,0,0,7aded61cfc52a62565b948ab8633b838a5ee4d72bb993ac0cbd5158ad07150eb,2025-02-20T19:52:28.110000
CVE-2024-4037,0,0,7b51c55a35ef4682d923aae85eb8140bed047a666910995f8679da9cc7471053,2025-04-04T17:52:02.887000
@@ -268189,12 +268193,12 @@ CVE-2024-43176,0,0,891b637712be2674c69be360d1199f604c6250c1d09658a6ded8379b869ec
CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000
CVE-2024-4318,0,0,fc62d21c2c8b26ac8e0d1cd9f3141fb17772267ec7a232271f2e38a2b9942358,2025-01-24T17:11:02.097000
CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000
-CVE-2024-43186,0,0,ac029ad5bf97e653593ad0d2e428d7ef3060eab4e912b8ba67ce97b1918f9113,2025-04-01T20:26:30.593000
+CVE-2024-43186,0,1,a0481e0ee95f0290b773f414a046bfa623fee2cc85a4446be1eefdb92039e258,2025-07-08T17:28:18.497000
CVE-2024-43187,0,0,027b184f54ed6e57a4ade4830d3c1fbabe0bdf3c1bf35d43dcc0bd27e581a9dc,2025-02-04T21:15:26.537000
CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216c66,2024-09-29T00:24:49.103000
CVE-2024-43189,0,0,2fa7bb32398d34e31b3bba73357d5c7046fa6eed304e4a77287936cb5c5fc59d,2025-03-06T21:29:57.150000
CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000
-CVE-2024-43190,0,0,b4e389e659fd70eabe4c5a3dff442228198dc094e1bdb7d5ee4e4f48f64b01f7,2025-07-07T18:15:25.440000
+CVE-2024-43190,0,1,86cf591ab4d21672c48e0076ff5608f4b5688da868c19603ff94c8b67d31bd2e,2025-07-08T16:18:34.923000
CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000
CVE-2024-43196,0,0,28690c662f8f211bbcd40514363aadaa12a39094a3c559cb1e0c49f1d6ad4d9d,2025-03-11T14:57:13.920000
CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000
@@ -268340,7 +268344,7 @@ CVE-2024-43330,0,0,f2ec3d961afcbca3f9e7e4bba594e0e74b7f8e85a1889c6773f7c1bb45b52
CVE-2024-43331,0,0,025664322110c0c027d99cd84710e694013a5a44ce0687284a3850fe3e9da36e,2025-03-19T18:52:24.573000
CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000
CVE-2024-43333,0,0,fa6b02dae1883de1fb148b98324c0e9a99a1742032b0f262d9477cb0c1c7f458,2025-02-03T15:15:17.207000
-CVE-2024-43334,0,0,076c631a1b63b1ef02d791814410592d6ad39a5eacc535b64ae417d5e6cd790e,2025-07-07T10:15:25.593000
+CVE-2024-43334,0,1,8ee146c37b4311716c36e0ae74a700d776d69ddf0ecc543ffbc91ad28ce9102a,2025-07-08T16:18:34.923000
CVE-2024-43335,0,0,c1f646d4628edb84bd6ad7ba250c6419e109e4d8bcd82ce3fac5dd3b0e24a156,2024-09-13T14:25:12.027000
CVE-2024-43336,0,0,6c7a22fd3fd46088392b6f5f13736be099aec72322eac4ffcdfa6014e121cc97,2024-08-27T16:00:25.177000
CVE-2024-43337,0,0,33ef43135fde72666f7ac01bebe36bf95e345a40214f9090867b8b64d2e4ca1f,2024-08-27T15:59:57.127000
@@ -268621,7 +268625,7 @@ CVE-2024-43610,0,0,531fee574a493d6d17cbcfcc8b12aee01a4bdae3496f2cb465e3c91e82dee
CVE-2024-43611,0,0,a43082b318173acaf88ab8fedf18a695493c85d011ba81bbd1c7b0e31b837833,2024-10-22T16:01:19.373000
CVE-2024-43612,0,0,812c826e3c16ba289dfbb62de4b281704dbf93c4d4b0a921ae535f6bffcdffc3,2024-10-21T20:48:02.050000
CVE-2024-43613,0,0,d7299c559a75859017911328de01e3cf012a0c38c26222986e53798dd88d1547,2025-01-07T16:20:13.437000
-CVE-2024-43614,0,0,c5d2c4e61e699928a9aa80596895800f4eb921603cf99ac879c7ced052428111,2024-10-21T20:50:38.370000
+CVE-2024-43614,0,1,b9c0af1420e146b05abf6d447866700413ddbc5669847ad2ea9f00e41374d5d6,2025-07-08T16:15:45.507000
CVE-2024-43615,0,0,a7be6185efd769f927c83d1bcf5f6fbb2f4769f426bd0b8c50fc4d20209f00f6,2024-10-21T21:00:34.967000
CVE-2024-43616,0,0,53854d33ac39e3d7883338ceed28a977b17a47e36ed07fb5aef1617d3c509acc,2024-10-21T20:47:00.313000
CVE-2024-4362,0,0,bb774e1e8915d69721ba8e30a59811fec618bd2752bcac57607a0c7eea514be3,2025-03-24T12:47:20.663000
@@ -271256,10 +271260,10 @@ CVE-2024-47239,0,0,d6ca42533d7129daeda62ba444384afbde00359ac41a2b9f7ce8d590ade79
CVE-2024-4724,0,0,70317e70dfc9962a7d748aebec4dee6dd3e402150bdd88903799d886e383aa8f,2025-02-19T18:33:12.917000
CVE-2024-47240,0,0,92a5dec476dd087df4961145c909b905b6c005bf5a596b1ea14c96642acb150c,2024-10-22T15:28:55.637000
CVE-2024-47241,0,0,b0d6175169ec2eb1b3cefb7c95304da9c64f618bd3ffbb076b6917f1b435ff01,2024-12-13T14:37:10.467000
-CVE-2024-47248,0,1,ae9c3993e4ed940ea14dbaa91140497110e816ca1a029fb030fef28ab66b818a,2025-07-08T14:18:25.403000
-CVE-2024-47249,0,1,e837f00c8992e334222d04aa4b304b52c455926bff2c2111eb63dacce659f23d,2025-07-08T14:17:12.870000
+CVE-2024-47248,0,0,ae9c3993e4ed940ea14dbaa91140497110e816ca1a029fb030fef28ab66b818a,2025-07-08T14:18:25.403000
+CVE-2024-47249,0,0,e837f00c8992e334222d04aa4b304b52c455926bff2c2111eb63dacce659f23d,2025-07-08T14:17:12.870000
CVE-2024-4725,0,0,83b73a3252ef0d5fa2c5e37b2ec3eee70e225fc6897c16abb0ab24fb8d051522,2025-02-19T18:33:09.587000
-CVE-2024-47250,0,1,e563c2a874be96175749bfc13b7f3d55df8853e9c583752d3a4c43737ab4709e,2025-07-08T14:16:34.670000
+CVE-2024-47250,0,0,e563c2a874be96175749bfc13b7f3d55df8853e9c583752d3a4c43737ab4709e,2025-07-08T14:16:34.670000
CVE-2024-47253,0,0,530ab00b63e8441eac6af22fa0a9abb006f28bbe2de90227cc8791b7979c1184,2024-11-07T12:15:24.630000
CVE-2024-47254,0,0,2ab452b813a2090516d8f238800b10e27c786f7540ac56e33f7f38e348d84cdb,2024-11-07T12:15:24.747000
CVE-2024-47255,0,0,ee701a38d60abc2f20bd1d451be45a629b86833aefda6f8e361d6c4f9004efed,2024-11-07T12:15:24.857000
@@ -272920,9 +272924,9 @@ CVE-2024-49559,0,0,c9f99cd65622b1eab96771f64f0c9193f69cfbcd0c1ae00774d11ec2348e3
CVE-2024-4956,0,0,b59f0fa653d583ff50139b3494916619d3242eed1a7ae59aab01da9b6e8c6c91,2024-11-21T09:43:56.520000
CVE-2024-49560,0,0,3f26500c4dded44eae4dc46589e64362e416f55913f19fef12f4ea5a50ab24a4,2024-11-15T17:35:25.407000
CVE-2024-49561,0,0,9c3952a59e8f5871cb71f2fb8d782dfd6fbea2f260ab9533bb7b7440852936ec,2025-05-08T18:15:30.113000
-CVE-2024-49563,0,0,827ccbaea80bb5467dfc7289ca91a4d25f83cf30606ab4fec461139f2338b4eb,2025-03-28T18:11:40.180000
-CVE-2024-49564,0,0,8fb79c39b275f39082453aaf778c650f840e21c30d5bf7f5f4c7b0874de8c9d6,2025-03-28T18:11:40.180000
-CVE-2024-49565,0,0,86e9989132e287d257bb63a69e2b6ee4b796cbb5c943261cdbbee1512f302599,2025-03-28T18:11:40.180000
+CVE-2024-49563,0,1,36db7e37adf4ccc222740351ee70969ab55b604480bbef7fa0f1cfaf80889626,2025-07-08T16:25:00.350000
+CVE-2024-49564,0,1,d239895a92fc177b15f9f53d9f20c9938e3a8a9c9d9f479a7066212bd2d6b631,2025-07-08T16:33:22.117000
+CVE-2024-49565,0,1,f396334218acbce1e584736997fbee4a0f19208c5e1f50197c44a95a60a5ebe9,2025-07-08T16:33:18.680000
CVE-2024-49568,0,0,2424937b6c632a3bb8bbe23f1d59070173b0b27451c699774823ff5adcd561d7,2025-01-11T13:15:23.637000
CVE-2024-49569,0,0,c656afc1e37b05a2772fd3607af20e8af9829dc5345d9176667b64dff5c0bf85,2025-04-25T11:15:45.147000
CVE-2024-4957,0,0,1ddadfb64af8fecb88103e12922bed961d342eb131d4a3aebeb5ed22b814d1eb,2025-04-30T23:32:40.880000
@@ -272945,7 +272949,7 @@ CVE-2024-49596,0,0,b7966d34c19feea70dac540d15635d0013692b6eb03f14dffb223315ddbf0
CVE-2024-49597,0,0,0f43b6a26ef992927181ec924f91412689184ed4ddb965d5c97b9a85a48751d8,2025-02-04T18:08:57.110000
CVE-2024-4960,0,0,ab992808fb9ee8848a3377965f63c287d94fe1a52846232bceac2f30716952e0,2024-11-21T09:43:57.130000
CVE-2024-49600,0,0,e76167604d13f2ebffa0b3a871c9ce4a992612d959351091d21477e455c1050e,2025-02-04T16:10:48.620000
-CVE-2024-49601,0,0,57e5fbf97565427483aeaa04b5ef1117e54b8ac9d925f66112da316d76af8ad5,2025-03-28T18:11:40.180000
+CVE-2024-49601,0,1,1f5ba11896022db7ae488bd01d90a32f52f0792114140d27e15f2bb290bdfb86,2025-07-08T16:33:01.010000
CVE-2024-49602,0,0,ce2881877ef434cea49676d9552515f35e1e7fab160d8c28c4447d4378779323,2025-01-09T15:43:39.177000
CVE-2024-49603,0,0,a4bfea8d6205a36c6ccbfdcc6517bedb6fb1c64a34415f1f1c91481a5593a5b2,2025-01-09T15:46:25.277000
CVE-2024-49604,0,0,52d4bcd33cef053b3c621fc8feb1ba701ad78ff56ae956fe76566248ea674eb4,2024-10-23T15:49:25.567000
@@ -274493,7 +274497,7 @@ CVE-2024-51565,0,0,a7ddfdb609c02584d7a89c3915e0de70c86be13e9f8ef270589ef24614c5e
CVE-2024-51566,0,0,1fd52d54ba2a2afa1bd706d74deb2afeee5b314d5e4c8525c97ce6b09c31f06c,2024-11-26T21:15:08.313000
CVE-2024-51567,0,0,b4fe0cc4aa0e4033e15c94a29d624c9b7416a32ae46ce3c5d4b87b9b98a32187,2025-04-03T20:40:23.433000
CVE-2024-51568,0,0,f46ec860bb589ef7735149c2e918ec4dfa90da8a22f1b6ce4c56cff942d0f1f8,2025-07-07T16:17:23.937000
-CVE-2024-51569,0,1,66579b93bd127ce068b7911a822e4ee48e9dc3af8721b1d4849ffe412bfc95bb,2025-07-08T14:15:47.453000
+CVE-2024-51569,0,0,66579b93bd127ce068b7911a822e4ee48e9dc3af8721b1d4849ffe412bfc95bb,2025-07-08T14:15:47.453000
CVE-2024-5157,0,0,75c6b8b24f558cd83ee042ce806213ad234e3fa3949f34a265920db4ddf858ca,2025-03-27T20:15:27.833000
CVE-2024-51570,0,0,7ef279fad1ecc643141c7d475972198d020bd7ffff6e7ce123a18cfe7a427865,2024-11-12T13:56:24.513000
CVE-2024-51571,0,0,dc2c9d29753cdf34b15105d82a00ecb73b2037fa34d139be374327e97ac95d41,2024-11-12T13:55:21.227000
@@ -275576,7 +275580,7 @@ CVE-2024-52960,0,0,fae4551d6f5890cd1cc0118af23473ce9c16850a8f8d27eba0836b043bfb6
CVE-2024-52961,0,0,dea18f81475188c7e018159200e77f633cf269c0485ba3fe6589eb2b7c40b189,2025-03-11T15:15:42.960000
CVE-2024-52962,0,0,9240ade3fad853885a25bf28704e25cc341a5380bdb89f44660e2092b7a63982,2025-04-08T18:13:53.347000
CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000
-CVE-2024-52965,1,1,7128b5abd3c5e9f5368d59ef7c13ca0f1103a15e5cd12470c7fb8cbef1fd2225,2025-07-08T15:15:22.313000
+CVE-2024-52965,0,1,e1748bd3c1cf539e82aaa62d815cbbb8779497bf7e46025f1e9332f22c762082,2025-07-08T16:18:14.207000
CVE-2024-52966,0,0,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000
CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000
CVE-2024-52968,0,0,ff2b69e32eba4e9c984463e355806da0ee95362a6b2e0f606c9a874c6c5045d2,2025-02-11T17:15:23.400000
@@ -275619,7 +275623,7 @@ CVE-2024-53005,0,0,3dc6e47151847664b25c50b95732d760b83155ba3d3a6b0bd92fd6b07af51
CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a5382401c,2024-12-13T18:46:25.473000
CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a878,2025-01-31T08:15:08.157000
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
-CVE-2024-53009,0,0,32ac28a6f09951592000ecb2dabbf78ae570c913102d942f6be393bfe2c9e76f,2025-07-08T13:15:28.460000
+CVE-2024-53009,0,1,415a196ed71903b373db40b77f1a07609a2906eb98249599d92e367900039725,2025-07-08T16:18:14.207000
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
CVE-2024-53010,0,0,e92ea489ea86ddb06142add3a7b47a2b4c77fd3f05e7b1a7bf67e9e564744128,2025-06-04T14:54:33.783000
CVE-2024-53011,0,0,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000
@@ -277216,7 +277220,7 @@ CVE-2024-55548,0,0,60ec3cfbffa02335f07d92ff09758467617c9784164eac84c7091a0b78c95
CVE-2024-55549,0,0,45872684c91006c9c859ec6ed7a15c29f0f1c73c26724d1b5446bbef3622e130,2025-03-14T02:15:15.333000
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
-CVE-2024-55551,0,0,4d556eab46ca4db25780e9413d195e6d75b15d511ee9181a1c60a80257603947,2025-04-02T14:15:46.250000
+CVE-2024-55551,0,1,08d26c4dd5f895113d74be8ca6affda8e269797ed8b343961d2b09f8303a924c,2025-07-08T16:44:23.807000
CVE-2024-55553,0,0,7eeb75a14e5e1d77aed9e75af34c2f5c49991b3437b2609ee4ab7150515fb433,2025-01-23T18:15:31.327000
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
CVE-2024-55555,0,0,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000
@@ -277251,7 +277255,7 @@ CVE-2024-55593,0,0,4651565ceba3085bb8ca70fe9039d9f6a893a058022ead3391b6c8b5d7155
CVE-2024-55594,0,0,652ca5f6fdc5cee2f95cb982d050eb42d5c2e6c532d86b32904ea69a07dd0bba,2025-03-14T17:15:48.653000
CVE-2024-55595,0,0,dd39ac830a7ce3fd7123109fe2470943243b0c9cac027695c909c21a06e819a7,2025-06-10T03:15:38.093000
CVE-2024-55597,0,0,2f74eb8473fbbc1a45915a4593898ee2573223ce1862d3dcd91f3235728a48ad,2025-03-11T15:15:44.010000
-CVE-2024-55599,1,1,203737ccc25d3b354d5d667d7d891350d4626d7d4fe78696b855ae8bc0a8fa34,2025-07-08T15:15:23.870000
+CVE-2024-55599,0,1,6a5bd63846e162f75ff18e018fff783bb0c89c015f37e616b557b131d0004ff3,2025-07-08T16:18:14.207000
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
CVE-2024-55601,0,0,9b35d862d187fd3c6770804bae011b28b724e76b6c1dd4a3a89f0f4207a3e507,2024-12-09T22:15:23.100000
CVE-2024-55602,0,0,ec93de7c2f7009009d50a721d8465d25664f004f1b85173f28affbe368eb4e0c,2025-04-18T18:06:39.670000
@@ -277329,7 +277333,7 @@ CVE-2024-55891,0,0,e50484d6d9c8c803bdb7ddc1463259498c2d5dad263ea1badc722a0f7145c
CVE-2024-55892,0,0,3c8099213df5425eaba1a2e1930df12d4267be1588bfc9fa740e8a606ecc2b13,2025-01-14T20:15:28.963000
CVE-2024-55893,0,0,8480475cc00679e5b868b3fa525d0c017f3136217c3b4ef922ca48050975917d,2025-05-20T19:15:48.970000
CVE-2024-55894,0,0,6bc1464368d973e1c6c827bc429d51ce1a3c9546ee8e3c46e48ea85daab9421c,2025-05-20T18:15:44.700000
-CVE-2024-55895,0,0,0c93efedc8837ffb0e580b48ee2d8469450174527ac5918bba59f2d260d1ccb6,2025-04-01T20:26:30.593000
+CVE-2024-55895,0,1,1543c3a6ca90aa00f8aca4a74eaec225a3e09ebbac70eb7a96fd3bf393445a88,2025-07-08T17:22:06.477000
CVE-2024-55896,0,0,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18bc7,2025-01-03T23:15:08.437000
CVE-2024-55897,0,0,58cf144243772f0b1f0b9a9cc5589dadca8caff5d8595a5cc3b92284d83f7d70,2025-06-20T18:11:09.177000
CVE-2024-55898,0,0,ded8754e2961bc9ea3e7980cff04a20ee5fb7e167416f260c041b987f5dfd3a3,2025-07-03T20:52:55.190000
@@ -277376,7 +277380,7 @@ CVE-2024-55959,0,0,e15201f3fe07c29fc504912bcda6a1d944bac3e2bdd2796e6ef3e6f7a8349
CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000
CVE-2024-55963,0,0,ce371d5ab7acfbee47ddcf80816e47ca704268b6b93ec16eec35c8df2f8461ea,2025-04-01T16:34:41.947000
CVE-2024-55964,0,0,ad360934ad13aaa2e06c022fa87fdd78a90c88aecf7b5196766930aa8448a257,2025-04-01T16:34:34.710000
-CVE-2024-55965,0,0,1d9b40e4c3008f0ec71632a2a73c9c98e7793fc3e214dc0432880e5930a0e44f,2025-03-27T16:45:27.850000
+CVE-2024-55965,0,1,035095b710acde181a9d06ac2cddd56bd5f32c127ed0a0a1a70ca13734ebe14c,2025-07-08T17:35:30.287000
CVE-2024-55968,0,0,995c44b71d9e01a4860419991ee66c8184c28ef71dd6048a2030ad2ab3453a06,2025-03-24T17:15:19.730000
CVE-2024-55969,0,0,1d80cecd30844cd68ce96a6b7ee5ef5d3b9107e1b08adee083a129c50a18336c,2024-12-16T17:15:12.337000
CVE-2024-5597,0,0,aa4497df80d3d6fe949505890265f73455110a31d2be3305010d097a39965923,2024-11-21T09:47:59.443000
@@ -278897,14 +278901,14 @@ CVE-2024-58113,0,0,37d5efe126105105f509f811c1f66010427e6d8dfea43d5348f5a10e754f0
CVE-2024-58114,0,0,a7f585ce7dfbf0b97b3eee1b1073cb80827bf3d8e2069c0a57805f0a012fde61,2025-06-06T14:07:28.330000
CVE-2024-58115,0,0,8ee2d57aa555a84811a17c06b65aa39cf412a6df9d198ae25f7d44238b3b5ce0,2025-05-07T20:37:34.593000
CVE-2024-58116,0,0,f58b4e66b242172378a49c65b24c27c96f9911918be8c66bf34686462ff2d8ae,2025-05-07T20:37:53.310000
-CVE-2024-58117,0,0,41764428368f56c7b99f7762d543ecd3fbf2a466e75ab423db317ddbc136f761,2025-07-07T03:15:26.393000
+CVE-2024-58117,0,1,8083f6288c7250d28ee54c9c23409b4461a7c55af4a7f7b328ba86464539f101,2025-07-08T16:18:34.923000
CVE-2024-5812,0,0,6925a842f54ea6dbd38d5338f4d1bba7949620aed85abec9f4ea1fe79df642ce,2025-02-11T21:36:43.423000
CVE-2024-58124,0,0,1a2a2660355db97deb2d7c523b62f02f98a2b0a075c4ca31839a01e7eeca01e8,2025-05-07T20:39:45.673000
CVE-2024-58125,0,0,b23e3756132f59e6e57532212ad97d2e40a2fc5dbfa3683944f098f7868f6b85,2025-05-07T20:41:10.753000
CVE-2024-58126,0,0,dcba0f1a5052ff75843252f9a997c674bac3367ad5a82917c9c53ff971756ad6,2025-05-07T20:58:20.193000
CVE-2024-58127,0,0,972a832291d9225211f77a6eb799ddbe1cb4a49b807c8d96d5aaad31dd317dfc,2025-05-07T20:55:11.607000
-CVE-2024-58128,0,0,8e9667a8edc9cf35e5487159b6f5fc534cecbe537de59f297eeb43bc19344eae,2025-04-01T20:26:30.593000
-CVE-2024-58129,0,0,dd4f075885fdb6937605268c0c875f50ff0b71096c1752d579861b8ff69f752b,2025-04-01T20:26:30.593000
+CVE-2024-58128,0,1,e4879b0a3330eff7bb2d9cc0d8fc881eafdfd6039eadef04a00b9e321b1f8a93,2025-07-08T17:31:44.517000
+CVE-2024-58129,0,1,25d788deadf9691698c61dc6edd2d3d4c89c998fea84eaa5ffb8bd7d2fc7503a,2025-07-08T17:30:50.003000
CVE-2024-5813,0,0,53a768ef9b74ee03be1393dbcc310c528fc37406ef9a9107d27a6d2a3860c95b,2025-02-11T21:36:40.947000
CVE-2024-58130,0,0,034a6b9499c88f10200959a2cba6ac24ebc37326e05ecb8da4f953f480be6b9e,2025-04-01T20:26:30.593000
CVE-2024-58131,0,0,bc4908e979254be0dc1e1176cc36e7e2691904c3630b2abae16ce8f2a4516d81,2025-04-08T16:45:17.107000
@@ -280051,7 +280055,7 @@ CVE-2024-6982,0,0,bc12881eb8ece909068687b21d0db3bff06e4addc29a87a4aa81e84ad35574
CVE-2024-6983,0,0,587b62c803cbc10ae0c23135289c49daf36532602f2ead158bc0c89a5e961fa7,2024-09-30T12:45:57.823000
CVE-2024-6984,0,0,5c6acce30d9b749e7e760dc98cec99d533ada0037f7a413b79276c44f099bda0,2024-11-21T09:50:41.767000
CVE-2024-6985,0,0,35a788cd8d8b8f85ed704c3d08e328cd854ec7c996c53c3f6ea1eab2a3326c34,2024-11-15T17:10:59.157000
-CVE-2024-6986,0,0,022865fef5e652e12d890810885276f86249bdc5fe172cf38691ddd06d01b52a,2025-03-20T10:15:34.860000
+CVE-2024-6986,0,1,aa001f6166abc15fef855668a93dc79b43e01f18ef56c312931406f0c92fac63,2025-07-08T16:14:33.880000
CVE-2024-6987,0,0,223166f1b803f84b8f4a3c19d43d731f9bc060873bfb059607e3a6aac87afc69,2025-03-01T02:26:18.970000
CVE-2024-6988,0,0,3cb5403a693ce8680fc2ff57712faef2da780ca9986d4d5f6badaa92f2857fd8,2024-08-07T20:51:56.167000
CVE-2024-6989,0,0,3d31fb4898a4718ef52155740c79259679d457a75cd915d4fe4cfe98b60d0f29,2024-08-07T22:10:20.423000
@@ -280117,7 +280121,7 @@ CVE-2024-7054,0,0,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e
CVE-2024-7055,0,0,a95546707d1244f1599fb0f35c2a1adde70a63ba750d083baf9b8bf73031916f,2025-06-03T17:20:06.493000
CVE-2024-7056,0,0,bac082260ca51a1ea82f6fb6b5213d99a3f2bec407c17dde4d09c5ef27d1825a,2025-05-15T15:06:57.337000
CVE-2024-7057,0,0,3c6ad5d4517bec5901108debd01a08995bd05bb08470aa05a322d034ebbe1d3e,2024-11-21T09:50:48.570000
-CVE-2024-7058,0,0,c43155d4628b04966552663891ed17e7227d4b6ac1a56abb184e509e05df4c97,2025-03-20T10:15:36.340000
+CVE-2024-7058,0,1,bb133ef5e2d8f75e08a6db30098f1a307b31967d12aa4127b46ebd9b9389a06d,2025-07-08T16:10:59.790000
CVE-2024-7059,0,0,fdf4befd2d4c69847843181a62e069890bd61c713061f95fe1065430ff5bf21b,2024-11-09T23:15:13.563000
CVE-2024-7060,0,0,c0598e11620cb7c2d88064c17a434f301a6660aeeb00b2cac5526c91c534e6e7,2024-11-21T09:50:48.840000
CVE-2024-7061,0,0,8526b9d19b3673c6e22c5c23db6ddcae8c5c6af148f708c06649a9c2b60e9bab,2024-08-28T18:25:38.217000
@@ -280605,7 +280609,7 @@ CVE-2024-7573,0,0,b682119c0c2e97bcbd91b2c93bf46919696a7eb8e95fa746f7aa6d0673139d
CVE-2024-7574,0,0,106be632638a1455774778a439b2b71255f9e422f278f5780c7394e5714ad7fa,2025-04-10T20:42:04.943000
CVE-2024-7575,0,0,ba29cf0e51a0aa84f9f8bb6306bda402315dcd07d96b2b4cb9bb886b9e2624e2,2024-10-03T13:52:23.060000
CVE-2024-7576,0,0,698298feb762529c7ee6054dcc9f0a75d11ce490e51cce479da74b6eba19e0af,2024-10-03T13:51:45.997000
-CVE-2024-7577,0,0,07aa788ff55d138fdaac8a33332d1f84cec76b9c34907cc7777b7d65e4c76abf,2025-04-01T20:26:30.593000
+CVE-2024-7577,0,1,4ebc7f853de75538f8e3cca908d8ce4f732628a45e6ba02401a67e56ef743612,2025-07-08T17:26:02.110000
CVE-2024-7578,0,0,60a7d65073e20d9b789e9eaf5e57b473f5aecdb44bf9342f568c787e891fb844,2024-08-28T18:27:18.510000
CVE-2024-7579,0,0,ee2b717a98e6a4eb178d9b31b1f4cd465ebbe0a2ac1bb3b26cd97f641bd7874d,2024-08-28T18:26:46.117000
CVE-2024-7580,0,0,da79669e7cd416dbeaa19446ead43fa3bbe9db5fa647fd058c83c6b550f4da51,2024-08-07T20:47:00.277000
@@ -281557,7 +281561,7 @@ CVE-2024-8577,0,0,e8f5a3d1fb84eebb8c2651cb4cf84e538b8143f08a12c0446ee6173289a770
CVE-2024-8578,0,0,d902c660b7728b8b21a9cb0384b8ccd2082f2ec64a950b3898cbe2d7f16246e4,2024-09-09T18:46:00.300000
CVE-2024-8579,0,0,0fbaa850c4d170545eff862a0f591e0b5fe07b2207ab6dab681b710fc429c165,2024-09-10T15:47:10.393000
CVE-2024-8580,0,0,febd2b658a33383b1844bf5e4ca8e8406b84b45b0db85240e7a616229be21768,2024-09-10T15:47:47.397000
-CVE-2024-8581,0,0,9c7e0ead351dd63cf5ec34c36722a229f8ee6ed8b3ea393a834d71e2ea8a9987,2025-03-20T10:15:43.350000
+CVE-2024-8581,0,1,966a308a4611b17ad6413e2fd13337fff73fbdf2a8d14d71ca22c36eae09fb2f,2025-07-08T16:05:51.403000
CVE-2024-8582,0,0,45e008e574b868ab3d2116a4822a817d620ab0c28e8cb04233f74d54ccec154a,2024-09-10T15:48:30.537000
CVE-2024-8583,0,0,59c8a01f617dc408233b1477928fdb42fe7e3b1da570046a62c1155fe317284c,2024-09-10T15:49:29.103000
CVE-2024-8584,0,0,60ab30ec7339bc7a3dd0e4a0283ec54560c855749c55796fe229fc5e23ab86d8,2025-02-17T04:15:08.240000
@@ -282380,7 +282384,7 @@ CVE-2024-9449,0,0,2a3228e9059253e1a1bfcfc05cb787fa2d46cff95eac90562166618dea81a0
CVE-2024-9450,0,0,2661da4f486d2ba51950537d763e8f7bfc0038f8d91059640be3d9f2fc346337,2025-06-04T20:06:46.927000
CVE-2024-9451,0,0,2239eaaf3fd7789edad40c5525852bb325176f712e20628bfdfd3b25e7c703fb,2024-10-10T12:51:56.987000
CVE-2024-9452,0,0,1b70a258cdd4589c43f41f7bb65ef24a7987fea2fd0819044bb17b6cb999203c,2024-10-22T16:23:59.420000
-CVE-2024-9453,0,0,bdd636fda5c08885a782c1aaf91a9612a500543259045d34213f300a012a2a2f,2025-07-04T09:15:24.537000
+CVE-2024-9453,0,1,052233eab7fb1c3facf3bc3ec3edda3a298f0b8b33589c64e7f1580ff4fb9871,2025-07-08T16:18:53.607000
CVE-2024-9454,0,0,4cfd8c9859408ba78039f10d28df6e1d2294fdb1d97b8a1f2d893fd722a84bdc,2024-10-28T13:58:09.230000
CVE-2024-9455,0,0,70eeb7921ee78f299c01776fe53c55197cf0553da95f449adab4e5d1eea63401,2024-10-07T17:48:28.117000
CVE-2024-9456,0,0,b03c9a73b6e647ff0388281429dea3f2c132c7dea689a2671a1020405e57dd58,2024-10-28T13:58:09.230000
@@ -283077,6 +283081,8 @@ CVE-2025-0288,0,0,6e46aa41047917377afbbbc6b2f2184a83b69fc8184059fcbad60b88220f31
CVE-2025-0289,0,0,724459e95ff2f059380801be4e4ba41665a4f682d6c11a8a634d0e674302c08a,2025-06-25T16:49:25.730000
CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000
CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000
+CVE-2025-0292,1,1,3a008008a2d0fcad08e98f6a4e930c84c9da8d8bdbb04a6b3bc8a69eb811ff93,2025-07-08T16:18:14.207000
+CVE-2025-0293,1,1,0240888c99380c728caa15f1a30f57c613f11f95c9bc7edab7ac529e82518a8a,2025-07-08T16:18:14.207000
CVE-2025-0294,0,0,59b12ae5f530ff90dea06baeb6f7c91bc818f645e6410027534af3208e6b543c,2025-04-29T20:22:46.553000
CVE-2025-0295,0,0,8ef86c549eec2b5ffd9e1320d65baf37ec53485f9073e7f04af13fa0f3c739c3,2025-04-03T13:59:53.160000
CVE-2025-0296,0,0,efb7236b9c45859ae15a27fb6657b53eb89774d2ca82bad3b36219d11164fad6,2025-04-03T13:52:49.223000
@@ -283366,7 +283372,7 @@ CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961
CVE-2025-0631,0,0,f678fe6dd09f7e9ac50fdb058244ff83ef796d29890119e12d088befc24858a0,2025-01-28T19:15:14.270000
CVE-2025-0632,0,0,116a78a4ecafb2eff0d1fcf266f43bd66a9f05a302e980fadcc1496f2f0b35ab,2025-04-28T03:15:18.253000
CVE-2025-0633,0,0,d99126f9166a4e84d3e57050e6aafa26d9cc8a19aa8e9fa3be65f2f9a812f3e1,2025-02-19T07:15:33.537000
-CVE-2025-0634,0,1,de5fd28039c4d343b48c90ab8951c166874b70d9f845dec10d948e507409a533,2025-07-08T14:19:24.293000
+CVE-2025-0634,0,0,de5fd28039c4d343b48c90ab8951c166874b70d9f845dec10d948e507409a533,2025-07-08T14:19:24.293000
CVE-2025-0635,0,0,97c2ba48a72c7101c06a2ce11947aa32804795ad5ed76ef5586cdf1bab2602b3,2025-01-23T11:15:10.890000
CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000
CVE-2025-0638,0,0,d2f28f2eed7bea7b9f8ec19bd8fd1769a6b74ef8696049ed8fd676bfab511c4b,2025-01-22T16:15:29.977000
@@ -283383,10 +283389,10 @@ CVE-2025-0660,0,0,2f19aefbc1c75c0364e72feb29e1b4f1f08ec1e05080e6fe5457fb25f53939
CVE-2025-0661,0,0,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000
CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd7414,2025-02-07T17:15:31.157000
CVE-2025-0665,0,0,cb0bd9cf98484accede609d5aacb307ca092db3e8f950b5383edcf9901c2a4ad,2025-03-18T18:15:28.427000
-CVE-2025-0666,0,0,3cca27fd89fe622e58d83622c0f938bf3096df5be8fd305239c2cb5598d67279,2025-05-07T14:15:39.450000
-CVE-2025-0667,0,0,144f7a60d37fa80191a5165be31b48e53c91dc80e5891deb665604625cee3e51,2025-05-07T14:15:39.550000
-CVE-2025-0668,0,0,14746cb11b941445d7b77db7d67a16fee597e6ccdc3bd758317dc7dfb2486cff,2025-05-07T14:15:39.637000
-CVE-2025-0669,0,0,be5117def81799854a86cbff3809c33d91d0a8ed26a53b10e981885615bd223f,2025-05-07T14:15:39.767000
+CVE-2025-0666,0,1,268ee8f25b3d1563db844b7efcb4320ce69ae00fccee558f2e5b3d262a358c58,2025-07-08T16:44:16.057000
+CVE-2025-0667,0,1,6932cee93d8c1d8acbd591fca347f430599f6a2d315cad39c9facfd17066f2e2,2025-07-08T16:48:19.440000
+CVE-2025-0668,0,1,f66778ca107537f0654cf4877437694c73fea82838af1aed21ac2e7902e5c328,2025-07-08T16:47:25
+CVE-2025-0669,0,1,bba99daa2bf6c7bf9cdf6c56f42f0300952f109ccbe5fef0072b455fe069352d,2025-07-08T16:48:58.790000
CVE-2025-0671,0,0,3a282aeee20ec4df56c2d30983b0ab79d0413c46bb4ee2f47c79eed3d9f2eade,2025-04-29T21:20:21.147000
CVE-2025-0673,0,0,6a77fe02d3b2698c47ed8cd209e545614bfe784ac3eca171a592d7fe61ab0314,2025-06-12T16:06:20.180000
CVE-2025-0674,0,0,6c39db7af62f37c0b44063680ba18af7d951adbde12586340e38d9aeb6048261,2025-02-07T00:15:27.017000
@@ -283626,7 +283632,7 @@ CVE-2025-0958,0,0,8e934c42a8ae7048365dcc09aa09f32a5218f596be70202f3292fa3b9e1add
CVE-2025-0959,0,0,2ef0e74d37106a9147ba132a96f3962a471250250ebc475b9bdb4c0c141acc13,2025-03-13T14:59:44.297000
CVE-2025-0960,0,0,499907aaf0daa1209acd23a8382909ccee8a784758e88e7f103cadb30772d3d2,2025-02-04T20:15:50.103000
CVE-2025-0961,0,0,346daf6e4766249f748146548eba00ad58cef7728e5a80d5d79af93be768a67d,2025-05-28T17:17:22.983000
-CVE-2025-0966,0,1,4feac6178f0bba814becc6b29e9f09abed23b5d54c2cef705e526d06ad1e945d,2025-07-08T14:55:16.967000
+CVE-2025-0966,0,0,4feac6178f0bba814becc6b29e9f09abed23b5d54c2cef705e526d06ad1e945d,2025-07-08T14:55:16.967000
CVE-2025-0967,0,0,d8c64e0386338d50f41e26d5ea4b324d68ccfa9e57d63544f495e90b3a5b315a,2025-02-25T19:05:40.627000
CVE-2025-0968,0,0,a4e9e6689859f7c2eea936619747aa6ea0cae6f7cc09990c02ad9c83b9675838,2025-02-25T20:21:17.287000
CVE-2025-0970,0,0,dbb9a878c26220e6c6fcf04d86cb830c57c2ed2708896797c1f2c042f5dde1ff,2025-02-02T23:15:19.027000
@@ -283946,7 +283952,7 @@ CVE-2025-1340,0,0,b9875780a16a13744dbcd5d844e8ca36a7e2aa268ada35546ad50497001d4e
CVE-2025-1341,0,0,81c73205f91da4e4a53e62a4a3612a03f01d8a5a3578739a3ddcdc59f89bd9d8,2025-02-16T14:15:21.893000
CVE-2025-1348,0,0,ab815c71f3de914c23737b7e6739ab83b4fab2a0fb7fc5f61379af694b9ba8bc,2025-06-23T20:16:59.783000
CVE-2025-1349,0,0,4532668383d59e35fa5addba37fb3c13cae3bed698caa0eef3b8d64d3648b7e8,2025-06-23T20:16:59.783000
-CVE-2025-1351,0,0,841d0477a940f021cb657d587174eb9a74fc2b04476d30224d3384e629d52492,2025-07-07T17:15:27.693000
+CVE-2025-1351,0,1,c71826477985f8691860e9c0183e75baa596946246dccc835cbedd4f058f0abc,2025-07-08T16:18:34.923000
CVE-2025-1352,0,0,49ac14e9196cb2742d9d61507be651bb74f909d13564705f3ec967ee19bb4a5a,2025-02-16T15:15:09.133000
CVE-2025-1353,0,0,592b3b5fa0e656024e4607b02db6b1922da161f4886bf146bf25aacc925677e1,2025-02-26T08:13:23.443000
CVE-2025-1354,0,0,e55c21cbd1f75bac3c8a803805ffb3f723d0da78df46917ed4345de571306e58,2025-03-13T07:15:36.740000
@@ -284298,7 +284304,7 @@ CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c
CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000
CVE-2025-1768,0,0,101a8e82a70ef71552223d868f10de460a054da869dc42f7ffd13f2896bfa127,2025-04-09T20:52:13.823000
CVE-2025-1769,0,0,e0fbdfd6bf02a5ffc1011e706d92290907306f1fe018e60c69fba96618b70abd,2025-03-27T16:45:27.850000
-CVE-2025-1770,0,0,5c3ef808a1248c9c095e422cdbee757859e7e8230c89d0aea7049905789b5890,2025-03-20T06:15:22.903000
+CVE-2025-1770,0,1,6bdb74957078f28e2cbf832f7cedb437678d109353ac383326d2e56bef2ca3c6,2025-07-08T16:38:54.230000
CVE-2025-1771,0,0,c85ae8d5b444fca4235a111290e26baf0c09c1219a46277bdb0b1ec9dbd7934c,2025-03-28T15:05:47.470000
CVE-2025-1772,0,0,b7c0154a53f8cc21a6c2f4476fba52aa9d268a6b02a4ac85f567309b48289954,2025-07-05T23:15:25.213000
CVE-2025-1773,0,0,10b8afc2b67c1ec534acf6a2e864bcd7ed785a68ced539a560488e697d406767,2025-03-28T15:02:33.313000
@@ -284311,7 +284317,7 @@ CVE-2025-1781,0,0,822d9dd7d94e5b498257a849d2a77ab936366d257a4d3fe0593c5d9951a3a2
CVE-2025-1782,0,0,c63bbaca795d770dd3d41b498ef50010308f74d5485f5283e76b3450888c5cab,2025-04-30T18:15:37.500000
CVE-2025-1783,0,0,97b234335fc72515520c729040ce2359891e543a794c711027c0cb792a65c067,2025-03-24T18:10:03.760000
CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000
-CVE-2025-1785,0,1,f9531b5ca3a7fd491288a7d2c194180cd3b43e4c79082acb96097776f782b518,2025-07-08T15:34:55.257000
+CVE-2025-1785,0,0,f9531b5ca3a7fd491288a7d2c194180cd3b43e4c79082acb96097776f782b518,2025-07-08T15:34:55.257000
CVE-2025-1786,0,0,ad5ad2cc482ea0e990ccfde4284bed8bd985e906e2b3d6d5c46c5b7aa325f660,2025-03-03T21:15:16.130000
CVE-2025-1788,0,0,eea96ff8d7571aa32dee65283e84ed9282f70445eccb027f53ff2ff5b53af011,2025-03-03T21:15:16.263000
CVE-2025-1791,0,0,3cf9b7d8e0a71b22167e460e5b2f4168bb3dafe4dd55c2517179b9dda1ae73d2,2025-06-12T20:26:54.890000
@@ -284663,7 +284669,7 @@ CVE-2025-20199,0,0,f3df46efa679b891adde0924c665fde4891fd5a14b0775e729978cf8bf84e
CVE-2025-2020,0,0,9d4ec350b539786bd35b02e115c635ada2d38c5941cafaca03f828bfd2898d09,2025-07-07T18:06:35.070000
CVE-2025-20200,0,0,5f150b6a708dc68bfc2b09ae693931c6d8798d1daccf894098b5d0a2b293c29a,2025-05-08T14:39:09.683000
CVE-2025-20201,0,0,ee006f3e77ee311098edfd254400f52a9eeeb91c4e2cb362d5bcc3015d8fbb24,2025-05-08T14:39:09.683000
-CVE-2025-20202,0,0,8a862dddfd56af502947e2f17cbd42caf2227d83f92a7d851ddf1d00d36b19a8,2025-05-08T14:39:09.683000
+CVE-2025-20202,0,1,0fac4ced4d72ee8751d5f05de9e080bc99ae3809434dd872971d036d8a6a5c96,2025-07-08T17:17:00.210000
CVE-2025-20203,0,0,c6205ac7723f655162b8998c8e92cc88453782c3490e6bbf3d7d0b13dbc396e1,2025-04-07T14:18:49.830000
CVE-2025-20204,0,0,2b6b6ddefc7e8c547b3afe6dfb9aa6736ec6236ca717a0ced1d667cab3b86129,2025-03-28T13:42:57.807000
CVE-2025-20205,0,0,03630bbe3c11efc78e3ed40a1f588f87d7d457dd8b7e950dc0ee6df5e2126d41,2025-03-28T13:46:02.393000
@@ -284705,7 +284711,7 @@ CVE-2025-20258,0,0,587485bc224e7800bf99678fb698cd6c8d3d28eeeb847ba45799c39e0a8ca
CVE-2025-20259,0,0,2b6c28972e4d4c813f43be486ba2790654f4b624edfb74676837346be40ee996,2025-06-05T20:12:23.777000
CVE-2025-20260,0,0,9226ca48b92e45380c6214530240c76c3fb395160abf195de5b0390b25ddf3b6,2025-06-23T20:16:59.783000
CVE-2025-20261,0,0,cc4f4ebcc501f9646a2caa18052811251321f685cdbad4bbf81f06b9a1734a58,2025-06-05T20:12:23.777000
-CVE-2025-20264,0,1,e21814dcd04e7975f4fcefb296edb28f9bcc1ede0f08f72b8726958db8174112,2025-07-08T14:53:22.550000
+CVE-2025-20264,0,0,e21814dcd04e7975f4fcefb296edb28f9bcc1ede0f08f72b8726958db8174112,2025-07-08T14:53:22.550000
CVE-2025-20267,0,0,9f1a8869becd21960978de51d3d70c583f40a6a9b638c69857e8709afa0ac105,2025-05-21T20:24:58.133000
CVE-2025-2027,0,0,f4e787944fa975229e7ea27488af4d7a233e07940cd5bde5046deccbe6a0e23d,2025-03-28T18:11:40.180000
CVE-2025-20271,0,0,041d554cd9531899ccde50e1767895c0866fbdeefe230e358c4aa41b7baed66d,2025-06-23T20:16:59.783000
@@ -284722,20 +284728,20 @@ CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c3
CVE-2025-20297,0,0,fd036aef2926b86f71d7b735e8eace20d04567625f017b30a40eab31b1a018ed,2025-06-04T14:54:53.980000
CVE-2025-20298,0,0,5ef123b99aecda479eda59b2805a60f94ea649d648ececceda6a02d8cab7316c,2025-06-04T14:54:53.980000
CVE-2025-2030,0,0,0e82bd47c24dfd47a0763661b2667fde4902819acb4b011b12553acdfd131e3f,2025-03-10T07:15:36.400000
-CVE-2025-20300,0,0,9c9de2601b270657a6af97927b331f04782e977b344838a46a03de6f05923372,2025-07-07T18:15:25.660000
+CVE-2025-20300,0,1,752745500d003de2d3e3f097702903245f99e3a561f12e18b404712631616246,2025-07-08T16:18:34.923000
CVE-2025-20307,0,0,c47df8322043b50a5ea22167c3b057cdb81a8847e0951940c5fe4aebc3e37b29,2025-07-03T15:13:53.147000
CVE-2025-20308,0,0,f4037d20edfbc3fae532b8871f27100d4384c76d028655f4f8ccb9f783f6e182,2025-07-03T15:13:53.147000
CVE-2025-20309,0,0,94007e1fb11a791c6ba09a860b1df0ccb261944c8d118491b5a803627f33a93f,2025-07-03T15:23:28.870000
CVE-2025-2031,0,0,f0e6a81edfa1417e63c121f9ecf488da08992c1c9a6c102e64ae87468bb47def,2025-05-12T20:56:38.933000
CVE-2025-20310,0,0,ecff3dd677283899194911f7b4401feff49c537f670936a5a03c1400a237e149,2025-07-03T15:13:53.147000
-CVE-2025-20319,0,0,addfa2467585912b2abb9189e61e7796542e23bc7cc8fcfaf1fed2840e1dc4f7,2025-07-07T18:15:25.830000
+CVE-2025-20319,0,1,403f23fcbf4671a8ab626111a14f395ec0f2ea25626fa4107c1df1a3c7898be5,2025-07-08T16:18:34.923000
CVE-2025-2032,0,0,322fbe54e0e9f8c1f8fc80a5a1dbfb0b1da1a60c079e30b220dbe7508c728edb,2025-05-12T20:43:29.347000
-CVE-2025-20320,0,0,23955929d6277fb2bc25e711d6738e98887b0e7c81b3b6244bc1767b7bc014ba,2025-07-07T18:15:25.987000
-CVE-2025-20321,0,0,5d84f149a3a7c04dd0e3bf9dd415a3fe66e9d57e77b952bedf0ce3060ccf03df,2025-07-07T18:15:26.143000
-CVE-2025-20322,0,0,fe1a8a75b064a0d31f6a07aab93ebfbbcfeeec4dead900673ed9b8fac94edf73,2025-07-07T18:15:26.307000
-CVE-2025-20323,0,0,9c5b4e021a7184f1dc997598b32ff542b39916c54364206ee2e36d1a734bb3cc,2025-07-07T18:15:26.470000
-CVE-2025-20324,0,0,aaa27c0ad47d2416114403b6a7c7fa3365178a32c9cde9b77a95331ead3f8e9e,2025-07-07T18:15:26.633000
-CVE-2025-20325,0,0,50a70457dba8a1cbb1205ae0a888c0582a79e8d6faa322478a2cc58e84b4fece,2025-07-07T18:15:26.793000
+CVE-2025-20320,0,1,8a43cfa23fd2c22d8516875602cdff74e543cb4a36ed71663ea194ede8d289f8,2025-07-08T16:18:34.923000
+CVE-2025-20321,0,1,2c5e5f8b0ffa6cd50fe9a08a936c814837e2e536905f34f763424f6c15af6616,2025-07-08T16:18:34.923000
+CVE-2025-20322,0,1,5fd141dbf638586508014e0103c3941b999893ecd219d0bbc9172fe123848661,2025-07-08T16:18:34.923000
+CVE-2025-20323,0,1,67be3a702bcb12fe36376953ec531a4b9cca99ee087a1bca977abddd1e3d416c,2025-07-08T16:18:34.923000
+CVE-2025-20324,0,1,ae1de7fda6b169b2f7a8b88cd582f4daaa9367527cb3a53285792bbefb1b37d8,2025-07-08T16:18:34.923000
+CVE-2025-20325,0,1,923bbb4bbf39d66f263be2945aba70aab88d3eb8a001b1d8dcd2d96e88172fdc,2025-07-08T16:18:34.923000
CVE-2025-2033,0,0,a9925f74a4090ac521f925c7b018b5a07f14be6b2b87ade4d28cf6d0a23ae832,2025-05-13T20:58:31.063000
CVE-2025-2034,0,0,9e830a4999b3576cdbb62e9cefe7813f27fce81a8d727c11ea9e59c824a777d9,2025-05-07T16:39:30.977000
CVE-2025-2035,0,0,101822e5ae94f6693d3cf82de7577eafe2ea6f98954e58ec48c943cdd52831da,2025-03-06T18:15:43.457000
@@ -284832,23 +284838,23 @@ CVE-2025-20676,0,0,6ffa62b39c924bd91e9970f05d2047c0093e00eff6344a8042d1538b148b1
CVE-2025-20677,0,0,361a457eff90f26ccd673ab8175f2254dd335c177659182e175423ee667fba79,2025-06-03T18:15:24.633000
CVE-2025-20678,0,0,4eba7220663cf1a323051976c87005046899f50b2e0b9319a8560eb4c82ecc09,2025-06-02T17:32:17.397000
CVE-2025-2068,0,0,caea7b6972516a21e1fb4cb2f8db6e455533cd0aab201f39e697eeb619aa0bfd,2025-04-29T13:52:28.490000
-CVE-2025-20680,0,1,b96b8e9ff56a708c40646ce280474cfd2d6bc6f38e0aa2117747fc3d4664c54c,2025-07-08T14:15:24.853000
-CVE-2025-20681,0,1,13ec17d77c9a2520103e27a041d16843b49392e0b62350f1c2ae5e29b1e7eead,2025-07-08T14:15:25.033000
-CVE-2025-20682,0,1,a3c505fa19ecea67583599f3043509e02926976778ac67b657cf267dbfbd1401,2025-07-08T14:15:25.190000
-CVE-2025-20683,0,1,a13f7e6bd73644da2bafae79ac1fb8ceb2f8fc818c0d3b73a35c61565dea6a7e,2025-07-08T14:15:25.357000
-CVE-2025-20684,0,1,796b6dcb9b4559d66bd2980a172c4753ad0d65001bccba49477059cd97867978,2025-07-08T14:15:25.517000
-CVE-2025-20685,0,1,d1b28eaa9f946fe3b49ef55578299876a10a0e3a348132573b50f9f1a29be70c,2025-07-08T14:15:25.683000
-CVE-2025-20686,0,1,dc41c2117045334983bfe036b635a70501e1a2994a9633aec7efdf3626270622,2025-07-08T14:15:25.843000
-CVE-2025-20687,0,1,a42520ffb375f8eedf258d797525b0f217d5a17c751b946d3432c0174508bfa0,2025-07-08T14:15:26.030000
-CVE-2025-20688,0,1,07be4399312fb2892c0885b7c7966182d3bf79f832412545f11cbf9a78f73464,2025-07-08T15:15:24.217000
-CVE-2025-20689,0,1,32f4489cdd40e2c8edb4738b3ce658df276ff47abaa30ace725ac9ad8f2cc733,2025-07-08T15:15:24.447000
+CVE-2025-20680,0,1,20eaf2870facc78274a2d63d1407cd27f8e93350009ec49341221a0f12ae73bb,2025-07-08T16:18:14.207000
+CVE-2025-20681,0,1,2a9db5f4ac521a1b375f1fde6049e27c5a4611522ef228da6032c8369a90efdb,2025-07-08T16:18:14.207000
+CVE-2025-20682,0,1,984e5865cc4a4d06b8368834985784a7e4da3321392a23ad9b50ceea8fb6ee3f,2025-07-08T16:18:14.207000
+CVE-2025-20683,0,1,663a7ea03d8ad4342748256447b51426c785dc2a54a167bb841c2e7e8417d842,2025-07-08T16:18:14.207000
+CVE-2025-20684,0,1,4106ca309f9493134aa845722956ea37d26675548d48b2a7e85041bd017d42b6,2025-07-08T16:18:14.207000
+CVE-2025-20685,0,1,9cad1576eb77dc7cc96c9a01de943ac7d8665973b2cda94083b6e515f33ae6fb,2025-07-08T16:18:14.207000
+CVE-2025-20686,0,1,c0bfedfdef713b91aa1c7db9a0766511a24c9c4b11d6b6973cea7d4379e1c604,2025-07-08T16:18:14.207000
+CVE-2025-20687,0,1,0510ac57e553eef8ea46adc16e3efaa42b63e00b0d4b09129b0f25a5da28b5ba,2025-07-08T16:18:14.207000
+CVE-2025-20688,0,1,d1b8505ff0086c2e9a5480a341fe8489186c53b2915e1a21f2109bcd50d1d819,2025-07-08T16:18:14.207000
+CVE-2025-20689,0,1,e9cc75c1b2985c8940ee5d0a1431de5f04788c941bc8141f122a4ab87b2ff63a,2025-07-08T16:18:14.207000
CVE-2025-2069,0,0,3be67bf54f8ec61314fa1aeec7cad10107ab60b66fe6d57dfc7b2068092e5954,2025-04-29T13:52:28.490000
-CVE-2025-20690,0,1,4df257ab8692b598a4005ca014d663f722537fdb9f92ca943636ff557c4a83f5,2025-07-08T15:15:24.643000
-CVE-2025-20691,0,1,0f4dcf79f64b97177c1ddd96b52d2c1cfbd621dd1a5e8e117bc170a568c995e9,2025-07-08T15:15:24.843000
-CVE-2025-20692,0,1,c88a7ffb6a5ce2bca739c060343fcbff54dbe5b5f9397a8977fd4b956c50a630,2025-07-08T15:15:25.050000
-CVE-2025-20693,0,1,dbd8ed37a12ec62725a8e0195520a82a43795f441ee110ce00c89cd496a1bf23,2025-07-08T15:15:25.233000
-CVE-2025-20694,0,1,b094002391ff592dbe0e3b882b21116d260947cc732e79c82522400559bcdce2,2025-07-08T15:15:25.393000
-CVE-2025-20695,0,1,9fa783cdba29ef4a2916462374cd45ceb7fb4c2682e461764a02659dc37cc785,2025-07-08T14:15:26.193000
+CVE-2025-20690,0,1,4fccfce3c1b05ec6374c2aa96fd8564bbf5900a8959d2d562bc75cee2c727257,2025-07-08T16:18:14.207000
+CVE-2025-20691,0,1,c001c27c7405605a8190b2c4b25420ea02ce0f726881f82b4febb1f1f25a4f14,2025-07-08T16:18:14.207000
+CVE-2025-20692,0,1,47f865c58efc44ea7ff95275c365555065b154fd9448fd2e4b4acfe80470faf2,2025-07-08T16:18:14.207000
+CVE-2025-20693,0,1,21392d5517872913b874d7821e675c0e20dbdd3a0fca3c3c099740c16501a240,2025-07-08T16:18:14.207000
+CVE-2025-20694,0,1,28efdab5171aed79a4d236a9f0ec298052fb2d1ddb4683808b438be727f8113a,2025-07-08T16:18:14.207000
+CVE-2025-20695,0,1,aa11fe8e827d0e4813d44528e2a823b52c82e1cfec87e705fca248b0fc1c2808,2025-07-08T16:18:14.207000
CVE-2025-2070,0,0,aa6c57d00653559715f3617271164e399083db51bc42952895ad83bcf08a7d15,2025-04-29T13:52:28.490000
CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000
CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000
@@ -284979,8 +284985,8 @@ CVE-2025-20979,0,0,231f64c3e176775ba854746f023aa81bf6b40a4874e615d2c4610802ac3d0
CVE-2025-2098,0,0,339294206fd4d5be14c5ec0cfdf9d0429803ca53d006fc61729cc0a81c0f19c1,2025-03-27T16:45:27.850000
CVE-2025-20980,0,0,7fdd5a1f3346b410ae9e2acd7c3f47424f0d1437083753fdf0525f723ce42b13,2025-05-07T14:13:20.483000
CVE-2025-20981,0,0,3cd666e2f6ca8dbe42267b7ba7f17b10b23a6b03f2fc8612f5f137dbde34d2f6,2025-06-04T14:54:33.783000
-CVE-2025-20982,0,0,24ee05660d228aaf1d0eb67163a948364b3e1f7c8f0f9b38fd16fc4994a1b86a,2025-07-08T11:15:24.733000
-CVE-2025-20983,0,0,623a1a4238fe5601043b1a52fd41f2f9acb47eff33405ba1b440ebd6c26fa81a,2025-07-08T11:15:24.873000
+CVE-2025-20982,0,1,bc95f59035571d2ec8ef6f6ad3f95cd63fec48280f2f2ce4c88c1f30deeab983,2025-07-08T16:18:14.207000
+CVE-2025-20983,0,1,45c50a201e842a6d0b0964f7091cbadaa3365d7395b5c64d130d67ff37ede1bb,2025-07-08T16:18:14.207000
CVE-2025-20984,0,0,e7280baeb13683cb27514b85160ab9b678f39f8df2cf27f792346506ca0946ee,2025-06-04T14:54:33.783000
CVE-2025-20985,0,0,f1546ae707d82e33a5482d68554ce8489a02400f5065ef7262899124d0fa85b0,2025-06-04T14:54:33.783000
CVE-2025-20986,0,0,a8c17dd67caf405f6f23f17b2129a7137468e63456e903401ccdccb0b601a184,2025-06-04T14:54:33.783000
@@ -284994,19 +285000,19 @@ CVE-2025-20993,0,0,2f2e05380962f23c2442bc279bb02edf00e9574fe76d3c8cb0266c25828d2
CVE-2025-20994,0,0,9433fa250a990918bc6b86efd5f43f4cb8ee99e0799546de1201054f6acdb498,2025-06-04T14:54:33.783000
CVE-2025-20995,0,0,b0e261ba12a516e344c63e2844a9aedbf277b62990580f34723653f536b23d63,2025-06-04T14:54:33.783000
CVE-2025-20996,0,0,2997e4a5961993fb94aabc2509dc00cf8844c2ce85f291a3f0f1326b812fee1f,2025-06-04T14:54:33.783000
-CVE-2025-20997,0,0,4c58aace1c446c8632e77dbb9866cad0aeee455f0ae788aa8bb8d412b249f1a6,2025-07-08T11:15:25
-CVE-2025-20998,0,0,1e4f98e146197e2ce7f270513e58cfe699f7a11c95f18a350b3931c14fa0b0af,2025-07-08T11:15:25.137000
-CVE-2025-20999,0,0,4d7183e3ea83e9542f846ba4b4bb9550f2b80f03de8a1a39dae2f407a22fd825,2025-07-08T11:15:25.267000
-CVE-2025-21000,0,0,ba6d11147334c007f877e2bb66d8bf8adbc7af88d9b28fa8037b130cfa211139,2025-07-08T11:15:25.397000
-CVE-2025-21001,0,0,b3ea220c767871b63f0e2d22e358eaa6f57116429352db7b7d319504ebe7ce12,2025-07-08T11:15:25.523000
-CVE-2025-21002,0,0,a3e61dd61d3981c05d6fec980cfe82a27bfd228618868a5fa3b3adf2ee453e43,2025-07-08T11:15:25.660000
-CVE-2025-21003,0,0,d652f08513c64a2eef22f3c9c58611479c8daab84658f0cf36b443f4d41c4372,2025-07-08T11:15:25.793000
-CVE-2025-21004,0,0,78019a154159f714a54e4540cdf79f59b8c81c132422f794818e2a42a19c4464,2025-07-08T11:15:25.923000
-CVE-2025-21005,0,0,aa028eebf906c9021d059e469fd57414afcfdd1bb8538d4b31fe0f048585f6b9,2025-07-08T11:15:26.043000
-CVE-2025-21006,0,0,d7ab8fe801048595e6c27f5dde7019b8d70b47c965bc4e7a920530bdfa78b384,2025-07-08T11:15:26.177000
-CVE-2025-21007,0,0,2a4e898d2fcc5c2c49adec42459dc07ef2cfb16ec731fa7b0987782f1940079e,2025-07-08T11:15:26.300000
-CVE-2025-21008,0,0,4c0745cf078c6b15af97932f27b1f3d2f692bbe0cb82189c8b82c4abfbbdd4ba,2025-07-08T11:15:26.433000
-CVE-2025-21009,0,0,6310e97b028c7f2cacdaa8371ce08bdf75e2f5df1d7cdfb16493261849e67ba8,2025-07-08T11:15:26.557000
+CVE-2025-20997,0,1,7749bee41e6114367ebfcae281064b4c8c2aa1d8738eaf021d41f8e03e7efb67,2025-07-08T16:18:14.207000
+CVE-2025-20998,0,1,96dd704d4817adb47a9553c3e9a582472e044a00f2f43069d4e0a6f12961f6e8,2025-07-08T16:18:14.207000
+CVE-2025-20999,0,1,042cfaa2d8a7d21604edff6a2cd77c19bee11bd4c97678ac431dfeeb84d5ae58,2025-07-08T16:18:14.207000
+CVE-2025-21000,0,1,5bcb80403b64a384502f3a7a352daf5bd10a3706dd4bfcdc62d5e36d55640dd3,2025-07-08T16:18:14.207000
+CVE-2025-21001,0,1,53f4fce51c5ab77bbd688847c5668d9f4f9fbe4c4aa58c6a5c68c934ca7adbc9,2025-07-08T16:18:14.207000
+CVE-2025-21002,0,1,d68ee837951cc262d65ad04aa37e01a8fd222a225ee07518af4aa4b526dbff1c,2025-07-08T16:18:14.207000
+CVE-2025-21003,0,1,8f7d8f3164ec28e9e647cae09c7a1b884719144970b7b103641363b8715bde2c,2025-07-08T16:18:14.207000
+CVE-2025-21004,0,1,618f2bba23608ccbd02b81c31c3fcc630b8e685e70d4b6a9a27e898a4215ccf7,2025-07-08T16:18:14.207000
+CVE-2025-21005,0,1,4f4dee162a86379d59e4e17458ecaaee231204a84070d5c9cbed066f9867d499,2025-07-08T16:18:14.207000
+CVE-2025-21006,0,1,ff506ea333e84fd4ac330a37825d2a70a17c231f426fc13dcc0d01263524a529,2025-07-08T16:18:14.207000
+CVE-2025-21007,0,1,d206ecb2539a4934142467ef2898495b9f7958468d95043b6775aa61baaa5abd,2025-07-08T16:18:14.207000
+CVE-2025-21008,0,1,2d5ce2663834ac43dc17b480330628572717108c25bee63456bc65622c6e48c2,2025-07-08T16:18:14.207000
+CVE-2025-21009,0,1,3e52031dfd94af883d2c2828baf5dab98aefdf5a46e38998f8505cd7aa970de9,2025-07-08T16:18:14.207000
CVE-2025-2101,0,0,e2f134d8ec38a4ef69a8a1b6464b6041847978860b9b377155f00fb727decdb9,2025-04-29T13:52:10.697000
CVE-2025-2102,0,0,1b84a94b9bc783c0eba8b42961ff5295a1d593e71ba7b75effdb8c35c2b35fb6,2025-05-21T20:24:58.133000
CVE-2025-2103,0,0,8165c0b352513de64cda0403ba5ccccfa989e53bace8ba5cf69fd4b2ec66dc6b,2025-03-21T15:06:58.433000
@@ -285076,13 +285082,18 @@ CVE-2025-21160,0,0,6b334a84c69a9855c12112c928af4a4c4a440b166815806ff2e80c46e58c3
CVE-2025-21161,0,0,5000c6664e8559b4ee841730ccf5dbfb1e778e583a5b1ce1d480b9e4862bea7b,2025-03-03T15:23:28.213000
CVE-2025-21162,0,0,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e9b2,2025-02-11T18:15:28.567000
CVE-2025-21163,0,0,20b2c3143306a8345eb967634be1acfbad088c1be68181ebcf0b2c9944d91eda,2025-03-03T15:27:42.417000
+CVE-2025-21164,1,1,8543045eb799a5be547943c697bc6a13327e26b9c97559ffda5181615a54d619,2025-07-08T17:15:31.990000
+CVE-2025-21165,1,1,0a94781a9e993d789414db7ede2db918514f15c37ef472adee1c0d9b7a7c2211,2025-07-08T17:15:32.210000
+CVE-2025-21166,1,1,db70839c77ffb62f656303a3549b629bc30f25d13059c81112b3d05a22a1f318,2025-07-08T17:15:32.417000
+CVE-2025-21167,1,1,beb6d30d73e032e835b094e3efdac9566e40c086e0bf0f6a28a65edb0a958e96,2025-07-08T17:15:32.630000
+CVE-2025-21168,1,1,4dd581a79a0ac1ac51dfd56e6d4b554832c2fc5449ea6c3a01a1e00c2f8fa309,2025-07-08T17:15:32.837000
CVE-2025-21169,0,0,fd8996c3b78a40a44e64518a7009e0663a18d19ab6204206eb5335e690a3e759,2025-04-28T17:09:02.117000
CVE-2025-2117,0,0,1059047bb2180240c8be76ee1d3c7badf3b4027738ccdb1fd77f3462c3418c6a,2025-03-09T08:15:10.533000
CVE-2025-21170,0,0,3d95261ab68d7ca4b90895fa50ac07c7f00d9a9b51631435ed38025c386bd8f6,2025-04-14T15:10:23.137000
CVE-2025-21171,0,0,5039d30bbad3c7a9ef0d4706f8bc1f73414fca568f5dd18586207d2df517e5d5,2025-02-05T20:07:01.797000
CVE-2025-21172,0,0,a2fea46f46d00be0056e7425a2551aef8eb674c6c3af3dbeaef1d826a8a03fa6,2025-05-06T14:15:36.170000
CVE-2025-21173,0,0,5cac426dfedf8f97ed31065d197ed17044e77303fe22487c6189f3049a877ed3,2025-05-06T15:16:00.833000
-CVE-2025-21174,0,0,a4efa78dfe0ba470f6413c8e1f8131168947cbe84adf32b70a802d73bb5b10a6,2025-04-09T20:03:01.577000
+CVE-2025-21174,0,1,109da62af610a07e997d04f707f3f5be52292397ce73c1ca86c09f2b460e600a,2025-07-08T16:12:07.337000
CVE-2025-21176,0,0,4a0a0c77fadffe1274ba6af3ae889c04516989033a6c33bfd002aa347c4b11f2,2025-05-06T15:16:00.953000
CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000
CVE-2025-21178,0,0,2e136374627162253d0167ff97a286c63e9372c61326ec5a052e546f8d476b27,2025-01-27T18:42:39.560000
@@ -285102,7 +285113,8 @@ CVE-2025-2119,0,0,ab29849c56f7541fdf0c3005b1d9da81bd8ddf06649c2a19b32dc3b60d91d4
CVE-2025-21190,0,0,819752cd3115f7af5207de865076f72a020a9a152494989bb3b0abf4b1c0761e,2025-02-28T16:48:20.103000
CVE-2025-21191,0,0,da78e227131c9155508b3a05474b7a0d83c314d74f5569be4b60196a2a755b6c,2025-07-07T18:57:42.343000
CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000
-CVE-2025-21194,0,1,82b71be0fde0e16d0b56a758170a7a2344fe1c0a09890e1ccae891de09967708,2025-07-08T14:14:50.187000
+CVE-2025-21194,0,0,82b71be0fde0e16d0b56a758170a7a2344fe1c0a09890e1ccae891de09967708,2025-07-08T14:14:50.187000
+CVE-2025-21195,1,1,6c31b9ec32e43073d1259cb7aecb4a8b055088d435095e7b40451f32c343106d,2025-07-08T17:15:33.037000
CVE-2025-21197,0,0,66b102defae9de16cf9ea6a44738bc561191b669b49be1710d12bc03001daa76,2025-04-09T20:03:01.577000
CVE-2025-21198,0,0,53f4f6f369d20143c35bfb3b5b8897af38e7b533edcc49e38792fe973cc138bb,2025-02-28T16:55:17.600000
CVE-2025-21199,0,0,32be12392657f1fce64554a663444e39b92ad4719ecdf86cbcea16756590db73,2025-07-07T17:18:36.070000
@@ -285305,7 +285317,7 @@ CVE-2025-21380,0,0,e643fd8c94c7b45625a0b2a2c6180cbad608f386b8797cac9a8273096b1f6
CVE-2025-21381,0,0,d6ee12cf738838749b79f75200f1ec2298b7f753215bfa00b9907fbbb66114f0,2025-07-01T16:59:50.610000
CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000
CVE-2025-21383,0,0,c42e66ee995bbd43488b43d88f3d1706fc7d92471ae4550076725dce02721873,2025-07-01T16:59:03.380000
-CVE-2025-21384,0,0,ff7734085a1f4837021b407daac4e9f540b913c6fdc66d3d3633495cf1ddcc1c,2025-04-01T20:26:11.547000
+CVE-2025-21384,0,1,c93f41b8c33941a566e4520bbf8d1feb7f82bee58f562a0cd843324ab6f58ccd,2025-07-08T17:15:46.383000
CVE-2025-21385,0,0,c5dfb6dedf6618efbe72c00af6d209776cac2aba423a27baae612ef93bb0373a,2025-02-05T19:32:55.867000
CVE-2025-21386,0,0,1e853b5a91b7962194c39eea234afbfc3c7add079bde87ed3f9c44fceeeb03f7,2025-07-01T16:58:46.240000
CVE-2025-21387,0,0,ec600b352c818ed69bdf97d0dfbece692e7513f06423b5b37517feb14c584a42,2025-07-01T16:57:50.043000
@@ -285341,18 +285353,18 @@ CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d
CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000
CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000
CVE-2025-21421,0,0,f15bf249b08721bdbad98ddd0135517b6ad56087f845d4d9619503a691f86d18,2025-04-07T14:17:50.220000
-CVE-2025-21422,0,0,a5b6290f9622a5e2f090ee29ba8a4ac9b13f93dfce2f450bfb82bad86ce5e438,2025-07-08T13:15:29.193000
+CVE-2025-21422,0,1,1085f9ec79c66afe4ec22142761e4ed36320bc9b0a9fd4ec9fcd4f6096878a9f,2025-07-08T16:18:14.207000
CVE-2025-21423,0,0,0e328d405ecfbb8fe86632fa5a763291326842f944399e5e60b0b14a8178f014,2025-04-07T14:17:50.220000
CVE-2025-21424,0,0,3a83225b8d2edd7b934464a21b7f49bd35353b067d8247c64049e806cfc35f96,2025-03-07T14:12:17.933000
CVE-2025-21425,0,0,2973138d7d9b6e35e7d945a94baa50b4f2fca4c64a4564e5551f5d2248e34508,2025-04-07T14:17:50.220000
-CVE-2025-21426,0,0,c271ec0ec4e3caa988d42b569314c463596e8b5ec16d6e40b8f32eb8ab129434,2025-07-08T13:15:29.380000
-CVE-2025-21427,0,0,bfa0f8be04541fee83b0ffe5be6d4f16aaf662ff51b0c1905923fe8045c54dc3,2025-07-08T13:15:29.533000
+CVE-2025-21426,0,1,19930d5028b2b296758c87da93f0a79da86b28cb7cf684e6b1239cfac30d5e1c,2025-07-08T16:18:14.207000
+CVE-2025-21427,0,1,bccab2fbd768ce3c7eed33b8004e04f3626a2d02abaea4edf8dd6fabad29e17a,2025-07-08T16:18:14.207000
CVE-2025-21428,0,0,69b7442476ea6fd4758477152b60b52350e6c0f429301f169d66bd9991f80aef,2025-04-07T14:17:50.220000
CVE-2025-21429,0,0,870d21a2653678c9bcc5dba6b9c6c70a3d313f6766692e0010768363d71bb739,2025-04-07T14:17:50.220000
CVE-2025-21430,0,0,b58800afdeb82d2fa1166c7a812e6cb300a5e0ba757e90c33913521b0810a404,2025-04-07T14:17:50.220000
CVE-2025-21431,0,0,0747d8dea6587a9b7f15f86751be6678f61e3a1c0761e2401a2264a2bfc8a59a,2025-04-07T14:17:50.220000
-CVE-2025-21432,0,0,781edce87182cfad3f9a8dc52ac9b86f71bbeb95b27a49caec2c7483a25ba52b,2025-07-08T13:15:29.703000
-CVE-2025-21433,0,0,209434476d246bd6939fa34753f749a71c5422fe5d78d8730bdad12ecc83f621,2025-07-08T13:15:29.890000
+CVE-2025-21432,0,1,98060d49546b041e283499f0e10942fd17c4f56bc75f7fd336954178ad6ca13a,2025-07-08T16:18:14.207000
+CVE-2025-21433,0,1,1a30b5b6489e1a65f38af91b2f421b1ce178edd68acc1f290ff599ebd27d6d39,2025-07-08T16:18:14.207000
CVE-2025-21434,0,0,e97b8c7db7b59840aab9791601fe67bf15763c97aa47c7325190ba36366f1b64,2025-04-07T14:17:50.220000
CVE-2025-21435,0,0,5ee5afa3d171e3c1b3b86828f8cca5087faa3199de081dd271b08927f77c403f,2025-04-07T14:17:50.220000
CVE-2025-21436,0,0,521a5912af5bbce349dcd7dfc43a4fbaa2b25357df3d302375c63b4105e5794b,2025-04-07T14:17:50.220000
@@ -285363,21 +285375,21 @@ CVE-2025-21440,0,0,beead78335a07e923a7e0e2f3c4cea3393d64f4794a92e98798fb031a740c
CVE-2025-21441,0,0,6767c9feebb7b2b01446d669a9d5908e7e079326445739929c36a44179f4e96a,2025-04-07T14:17:50.220000
CVE-2025-21442,0,0,e3b357683ad4065cccd1ed602ad51647e904baebd6f01fc1649f64566424937a,2025-04-07T14:17:50.220000
CVE-2025-21443,0,0,62996cb6f060941b6ecddbc544a73b97b0f46a7a491c3db31b968a3a02fa92ab,2025-04-07T14:17:50.220000
-CVE-2025-21444,0,0,2d304894e509773b0d48f2a06f92ba2429f295c6977a718874fa7e424d7a6031,2025-07-08T13:15:30.073000
-CVE-2025-21445,0,0,041188d04d4c604169489b4e6040433684b7f9856cd83899c1ead8cdba976050,2025-07-08T13:15:30.227000
-CVE-2025-21446,0,0,308edbbbe6e259bb59fccf6570981bea47f490ed97351971976ec989ca9f2021,2025-07-08T13:15:30.387000
+CVE-2025-21444,0,1,efe387aa2480eb27863d1e0d40ff1cb418912329046cfbc267af4f9ba83df0a5,2025-07-08T16:18:14.207000
+CVE-2025-21445,0,1,714cdb84dd9121d0acb86cbae8521db9c5a1d8d03323213cc66a3f441888e351,2025-07-08T16:18:14.207000
+CVE-2025-21446,0,1,fea44168347806ee64287b8f6873bb8a7e940dd535ccbc6e78d7cd419fb1137b,2025-07-08T16:18:14.207000
CVE-2025-21447,0,0,426315f42c42f42a5481406e4be3e161d98a87e5838d319262f923ee65bfacbf,2025-04-07T14:17:50.220000
CVE-2025-21448,0,0,7ebc4e443c7ecb4c31b427e79060d2d52e541e1fd347aab91892496c29efee53,2025-04-07T14:17:50.220000
-CVE-2025-21449,0,0,0823272789e9767d141593954f3872a0424201d303416616a0c7ae9bafed09ce,2025-07-08T13:15:30.567000
-CVE-2025-21450,0,0,74f64183a49a2de023dc2e9713d044fd30f1126ad0e7d1e23863ad491f9596ba,2025-07-08T13:15:30.740000
+CVE-2025-21449,0,1,50ebe00ce276adffb73d58c6363dca998b86072daffe572d1919f6bc43590ae4,2025-07-08T16:18:14.207000
+CVE-2025-21450,0,1,4fa30f9ab1f4e9d98254a40b32b42c23dc5204f2f448ceb6fa06c8d416a86644,2025-07-08T16:18:14.207000
CVE-2025-21453,0,0,a6792c38b141416584424c30fdb9e75757be44c603a39ac6c3466999938a3409,2025-05-09T19:10:06.443000
-CVE-2025-21454,0,0,5ffe92c2519657b2a43cbd22b1af43a4902f5a2cfe29af8ce074971bcb647092,2025-07-08T13:15:30.907000
+CVE-2025-21454,0,1,5fe01dcd931fa4ebf71233f73a1c1ff85baa633db24801583ca3bcddcb30fbdc,2025-07-08T16:18:14.207000
CVE-2025-21459,0,0,5c386ebea9ff578717babb7aa51aad849d73bca7cd137939105262b1d5b65dd6,2025-05-09T19:09:53.410000
CVE-2025-2146,0,0,f9f0ee70a1a39eb0556adf9eb68f745a3064e4c76eb406a896b9039c6428fac4,2025-06-03T15:49:50.793000
CVE-2025-21460,0,0,389cc7be8fa099528db069375678ba8c4a64d44cb4ba042b2379ea417e3aa0f3,2025-05-09T19:09:33.447000
CVE-2025-21462,0,0,472fd520000393ead0a178585c5420674292d66900bca0ccacb3268944c15d7e,2025-05-09T19:09:19.660000
CVE-2025-21463,0,0,593907bcf873c565a7c581e265b97d32aba720c27ffcf57b3226463b4c2d25ca,2025-06-04T14:54:33.783000
-CVE-2025-21466,0,0,161c3b15ebd9fb5f69e2bffad973794bc9dff2c7d96cfd663c12dcaa8f63305c,2025-07-08T13:15:31.080000
+CVE-2025-21466,0,1,9140520b2ebecd13dff13abb74aa680b3709208eb0c976a685a50ffa04add9fe,2025-07-08T16:18:14.207000
CVE-2025-21467,0,0,ee6894e4cbe2827de5e9551f2468fe4483ae3970632b17da0270579a63a0e452,2025-05-09T19:09:11.167000
CVE-2025-21468,0,0,657db3e9e3b08d3a920f7b517225c72105a802e2c6d292c94318fca052f3a5a0,2025-05-09T19:09:01.703000
CVE-2025-21469,0,0,44a98d2c7da1387889249fd5539f1241bba1748830f946c1d60c946e176d6446,2025-05-09T19:08:51.337000
@@ -285991,7 +286003,7 @@ CVE-2025-22046,0,0,22f6ec4b9be5239b136d8adf3142e46110d762ea6536f333de4ce32457cd9
CVE-2025-22047,0,0,9f194017449a0805819fbca5254c963003a009d8d7689f1ac4e85ba4e7166d8d,2025-04-17T20:22:16.240000
CVE-2025-22048,0,0,d783c79840ea31703c48b86cdf7fa937ae9910f9389ce19442b71530a0de1532,2025-04-17T20:22:16.240000
CVE-2025-22049,0,0,e05d60cc57e605d0ddbe4838bc32d7511585a31f866eedc4e7b84a015847bf1c,2025-04-17T20:22:16.240000
-CVE-2025-2205,0,1,6b735d532aaaa5b315f49697f0576545e12a376b45cdea294c01cbd16f8b00ce,2025-07-08T15:38:59.900000
+CVE-2025-2205,0,0,6b735d532aaaa5b315f49697f0576545e12a376b45cdea294c01cbd16f8b00ce,2025-07-08T15:38:59.900000
CVE-2025-22050,0,0,0ac53cf887d279edd9ed33a8ba0a3d9970469b715b8c7760676d19fded46449b,2025-04-17T20:22:16.240000
CVE-2025-22051,0,0,0afe55602ed8f0dd7d1f64cb4acb2c603e18b9bebd7166684752fa8e6a8314c3,2025-04-29T19:03:46.900000
CVE-2025-22052,0,0,b5a5dbe2bfeabcee901d6ac286a30cddf20c92f84878ba38e9cb5cfbe1041760,2025-04-29T18:50:16.490000
@@ -286297,7 +286309,7 @@ CVE-2025-2239,0,0,9d2e9828cc688e239d6efe000df62673f2e02977b1a02588fbeac8a08d0d24
CVE-2025-22390,0,0,c7012298c39a27e3208e165d682d9b1d0b98a4354f10c6692b4ac4c555e3528a,2025-05-20T20:10:40.360000
CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000
CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000
-CVE-2025-22398,0,0,d5808c469faeef2a1e50d4493a18a7c44c9f093692e902eb0df6d2e147a052a0,2025-03-28T18:11:40.180000
+CVE-2025-22398,0,1,b38d776b48b82d447f85e42bdc71af6a4c13387782f567fa3ae834ee38addd8e,2025-07-08T16:33:14.673000
CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000
CVE-2025-2240,0,0,e7060787442d697899dd4c4b2b07189996ee739b6e23b81fa927633b82f35fac,2025-05-21T20:15:31.340000
CVE-2025-22402,0,0,6f8fff7283a94f5896b11ef84f302b0565ff570b2cada8e73fd3faea43645321,2025-03-04T16:24:09.313000
@@ -286523,7 +286535,7 @@ CVE-2025-22655,0,0,a32fb36309c5e8e7fbfa6732e9e15d49e855680cb5e76722b7b2b64e5020a
CVE-2025-22656,0,0,ad37e68103bde51d08c5db387780e1b721fcccf1a0761aa29f30889aabd90e9b,2025-02-18T20:15:27.037000
CVE-2025-22657,0,0,df4be7d8b190b0d420249b9a05b34c5cbc047e57208d54d7b91afd066e81706c,2025-02-18T20:15:27.190000
CVE-2025-22658,0,0,9dfb3a54bee9230fd14a9a19f7d7d5326e8f45c7bc64398130b3eac9128245b1,2025-03-27T16:45:12.210000
-CVE-2025-22659,0,0,e2ee8a7095352ee7a33c8969281613732aafb35dd8ed4be4e8157c5fdb669801,2025-03-27T16:45:12.210000
+CVE-2025-22659,0,1,fae95629a67d4aa6f63bad46ed7301cd20f7a90e69546c380f30543e63f0579f,2025-07-08T17:33:37.550000
CVE-2025-2266,0,0,74192156a60a81f3d28ceb45808dd6d5a6db00b763ad96fae77f447613db9547,2025-04-01T20:26:30.593000
CVE-2025-22660,0,0,24e205bb3567c198cd88fd813d729099459a10db23d39998d8a2345c61726c7c,2025-03-27T16:45:12.210000
CVE-2025-22661,0,0,5209e5b0f9c7939e902aaa866620e423d90372564b55d2924e42e42f27d6a81e,2025-01-21T18:15:15.707000
@@ -287057,8 +287069,8 @@ CVE-2025-2336,0,0,e04e263f577ee94994be76c7f45e2a366ef0c6a3a1e415c7a4e9e5f507e178
CVE-2025-23360,0,0,44ec4858c221e4e9b3ef85a446da660e97979bf1d4ef5b7d7efaafadb38d1c40,2025-03-11T20:15:16.633000
CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000
CVE-2025-23363,0,0,35c6147ff63b42be8a96d41b6675b8a23b828204268fd2d9be277916193444c2,2025-06-10T16:15:35.990000
-CVE-2025-23364,0,0,0802d20064c77c6c2665c3aa4972bf47f72305d94be4dc6f3ac141fc9d24394e,2025-07-08T11:15:26.683000
-CVE-2025-23365,0,0,174e01e36091bcb966b234ddfa050d8646b724961f456d1784b2152213f87e96,2025-07-08T11:15:26.860000
+CVE-2025-23364,0,1,10eaf843481354f20c8957a1a511ecdd6296c976860c68b00751f56b544a6886,2025-07-08T16:18:14.207000
+CVE-2025-23365,0,1,895235af9b42757688dd493840683dd9d584f98cde8e7952da0fa9cbbf69a442,2025-07-08T16:18:14.207000
CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000
CVE-2025-23367,0,0,dc098e4899b3f306817e6d6c34a4bd055f0e4dc6c153870c1142849722c7141a,2025-05-06T20:15:25.910000
CVE-2025-23368,0,0,420fb00642e39b5577b4518ecebd554328cd6cece3e6b7323ad06772dda6199f,2025-05-31T19:15:20.510000
@@ -287072,7 +287084,7 @@ CVE-2025-23378,0,0,7d1f583ba2fbd4a87629a0c6e9b1a82753dab9032ddd798f8461f250af5dc
CVE-2025-23379,0,0,7749fc619a0ca1a83826b68ccdda9775a96575f0ba6f126f69f8dca24ed7ea29,2025-05-13T20:18:55.637000
CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000
CVE-2025-23382,0,0,c1dd1633142a74a81d62ba27c883a8ae5bfec31bed607980b97708c64899b9cc,2025-05-20T18:01:47.223000
-CVE-2025-23383,0,0,d1c3a17d942c6d64a3ee69d53222a9b28d391e05933c2067234fce4a24ef08cd,2025-03-28T18:11:40.180000
+CVE-2025-23383,0,1,a24a852c521bb2a9d8677d75588f2bef41ae7772ad03e48aeba2f647b1c11130,2025-07-08T16:32:55.733000
CVE-2025-23384,0,0,d7685224b7a10743fe5eae6a1ebefcafcac773ad88bd00cac8b6407ed3adf454,2025-03-11T10:15:16.330000
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
CVE-2025-23386,0,0,2d9e4c331be95cbb38684666dfcc9a4310ff0991551faae39127a4296c6bc7e3,2025-04-11T15:39:52.920000
@@ -287700,12 +287712,12 @@ CVE-2025-23964,0,0,5329b05c42aea8add2b00e40cec17b27a1ae63702685a3839a52b5da9454e
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000
CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000
-CVE-2025-23968,0,0,53c78b686cd251ef8305ce0b503ba1535e0fa3f23326f24f994ae5539203ed5b,2025-07-07T09:15:24.970000
+CVE-2025-23968,0,1,beeeb5e83a1f7d99385d9bfb28be61ce05bf76dabf4ffe964fff319a010b252d,2025-07-08T16:19:11.700000
CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000
CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000
-CVE-2025-23970,0,0,59a2f93282d0ee816872cd9efa0e07ec38c23a282c2850aeeef1bedd7bc6d785,2025-07-04T12:15:25.697000
+CVE-2025-23970,0,1,27d9976b92c9b57a4b842c9f9c136b31b8fabd5d23afde7ec1fe05d0623f23fb,2025-07-08T16:18:53.607000
CVE-2025-23971,0,0,b92b26502e7bf23962c464265b1f8680f1f27660b2e187da01a8acb71a6d5407,2025-06-06T14:06:58.193000
-CVE-2025-23972,0,0,97173f2c292c96ee31f16125ba85e7e9a9a145dc929ebfbc56972bffcd1e461f,2025-07-04T09:15:25.540000
+CVE-2025-23972,0,1,a6f62c128f54bcc22693612e68629240007291100ac11c911b7830c272d7c5c7,2025-07-08T16:18:53.607000
CVE-2025-23973,0,0,b03f07955cb4b8a1b76e7d2c342eec64764547fed2e7c9db7f01a8a71cd682f4,2025-06-30T18:38:48.477000
CVE-2025-23974,0,0,a5334512eb7b36e0cdd2f467f3cfd98d4a8e5f19afdeefafc45f76677608bc17,2025-06-12T16:06:47.857000
CVE-2025-23975,0,0,e8001c46a9ccc486b1a86f3be17fa5f6b3ce26422e7bdcae0080fc4ebd4b6ef7,2025-02-16T23:15:10.477000
@@ -287735,11 +287747,11 @@ CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e
CVE-2025-23999,0,0,6773c8075c9b8de00cd5861aa000dd53f139f15abccc02c1eda29f01b0f6520d,2025-06-18T13:46:52.973000
CVE-2025-2400,0,0,cb277ee1e8117318fb6e147a1b2b1e1371201876775172b424ebe4df769d43b5,2025-04-16T23:15:45.697000
CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
-CVE-2025-24002,0,0,15aac000b0d428b75ebb582d6006f7687fe513fe0516bb4d44fd269134cb74c6,2025-07-08T07:15:23.473000
-CVE-2025-24003,0,0,d1361e05810740e53f399053f5de75f59c9f114085a954c18f785468ea275610,2025-07-08T07:15:23.943000
-CVE-2025-24004,0,0,8d39856b18b85f09953db2880f38f84666c06fa5a6403cc97ad51f8df13b2819,2025-07-08T07:15:24.127000
-CVE-2025-24005,0,0,e1e41317ec2a0fe348149afe13e283248dfdec7551dfb0ad136eeb114ce550f2,2025-07-08T07:15:24.303000
-CVE-2025-24006,0,0,6366573bf2c6b95aae82dd74beaa4f7a51fade3baf09538d19a428cb2818dd7d,2025-07-08T07:15:24.493000
+CVE-2025-24002,0,1,8ae6d34087c1f4350dc8f15fc9a594e80c1d716a8b68cccca5708b41b1a1d4dc,2025-07-08T16:18:14.207000
+CVE-2025-24003,0,1,cf0d5f168d87244b601f71478f60a5a2aa9c87dce46f72dbf300784100c9a0f4,2025-07-08T16:18:14.207000
+CVE-2025-24004,0,1,c7edcf0c96d01b91bdc038b33a6e166277191e60ed15934cdc5965e16675ab8d,2025-07-08T16:18:14.207000
+CVE-2025-24005,0,1,0623d105469787d0c183dddcdd6598406e8612b504dd5b1c4b11bb40f4ea3acf,2025-07-08T16:18:14.207000
+CVE-2025-24006,0,1,e14ab4802a5086785200c71f38b8ba381874f1b12995026fa6ab0f3324d8c864,2025-07-08T16:18:14.207000
CVE-2025-24007,0,0,d5a322aca38d9b339464f589901eb52f11882e233cfd426d01e2c3406881418b,2025-05-13T19:35:18.080000
CVE-2025-24008,0,0,423d669a6e34997d57f8b36c43ed7c867ae9c55ff7a78d413bfcbfe389a548e8,2025-05-13T19:35:18.080000
CVE-2025-24009,0,0,5a2d9976bbebbb07139b8168b51112b7611feaf8b8f7fa0e7e6d15e54ec901e7,2025-05-13T19:35:18.080000
@@ -287795,10 +287807,10 @@ CVE-2025-24061,0,0,83984d4afb9511a09ca58ec921f5206335923a7239a0d4e584d11fc9739b8
CVE-2025-24062,0,0,3c1a8c3531bf7b078f59e99105e89fb25382d3d7f97731a7989d1b2cb9e52a03,2025-07-03T13:07:14.593000
CVE-2025-24063,0,0,fec2a9feb349eff190a599709c0adf8e2e813f7b6a6047359eeb483ba241f53d,2025-05-19T18:23:57.450000
CVE-2025-24064,0,0,6dcd7316da816f3e196970c900f3891a9af97c3ea3685a184c692391f6f101fd,2025-07-02T15:08:54.147000
-CVE-2025-24065,0,0,2083ecf1a51af949c0536c9499d4c1a895d4ae491fad60eee6de07c01100bb4b,2025-06-12T16:06:39.330000
+CVE-2025-24065,0,1,e4aeb9d16242f5549d73ca5da12fe135d1b51ce04ff5bdb990c65934f31771c2,2025-07-08T16:11:46.830000
CVE-2025-24066,0,0,5af2b3e2d53f1491e51bfce64394ece1158965cc5153432e0512ca8f1b77aba0,2025-07-02T15:05:31.930000
CVE-2025-24067,0,0,913ab191fd25bfc944b9474fd23c3122ac6f8df454eb2aee21edaaf525db4dd4,2025-07-03T15:03:54.050000
-CVE-2025-24068,0,0,7a721e7a212031e78a2f6b3db4609e6d2977cc64d8d3e08218f8a08452f26adf,2025-06-12T16:06:39.330000
+CVE-2025-24068,0,1,cf662e25ed08642c66eed86dc23610ebb40b736fc969eb1f3062ac7428867b67,2025-07-08T16:11:50.247000
CVE-2025-24069,0,0,19556b6c7b436792770b31c579890806fce0d6ca59ec7f01c5bcdd49024bec01,2025-06-12T16:06:39.330000
CVE-2025-2407,0,0,21e602e5f9293dc5b926b2bcd858886585bd73dfbdfdae3fd03d8f092b288eaa,2025-05-28T15:01:30.720000
CVE-2025-24070,0,0,3b2438db3d9bde03550b15f66ef9bbbeb06b8fdb0fc50c9b8ad59ce96b3ba31a,2025-07-02T14:25:46.603000
@@ -288071,15 +288083,15 @@ CVE-2025-24373,0,0,828a96e86ff08b742aa150355f229fc88d281347208da05d776aed1971972
CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000
CVE-2025-24375,0,0,5ca3bd1e3bfa2431518df1b0b7c0fd06f22038a7c9bea86d0e35b64aee6db821,2025-04-11T15:40:10.277000
CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000
-CVE-2025-24377,0,0,60e4ce2e56434b3296605212889b3e81c040e4e5ed8d0211488cfd264eefd654,2025-03-28T18:11:40.180000
-CVE-2025-24378,0,0,050465f24e507a346117ecf91ab8b2f87cb7513a13b90a54a886bae6c7b03377,2025-03-28T18:11:40.180000
-CVE-2025-24379,0,0,92c11050d01e556d80d9a50e0ec958e82659e77278e73dcfbeeb2e3c44618e26,2025-03-28T18:11:40.180000
-CVE-2025-24380,0,0,831fdd127739c7fe46709916e61697631d8f77c5e7bd1092433d27993fdde1ea,2025-03-28T18:11:40.180000
-CVE-2025-24381,0,0,098e8368aca62b566ab152a1ac8a91a4fb02d12cbb94741795672290ff91f8d3,2025-03-28T18:11:40.180000
-CVE-2025-24382,0,0,b9b899dbb432fcf707a12ce552fa974839f5c7e3535c8e5e85505b60813ae34a,2025-03-28T18:11:40.180000
-CVE-2025-24383,0,0,8a00be3f6ae35f4f4679d41ab0f505713ccc45cdd937542a531090e4371ea947,2025-03-28T18:11:40.180000
-CVE-2025-24385,0,0,930e89287bc45199246df8a8a043cd3eee589dd78f62d42845187d0b0b9690f1,2025-03-28T18:11:40.180000
-CVE-2025-24386,0,0,58408b073a8e5c10ec25f524139cf62fc0a38dbc113290666798c38651f8adf4,2025-03-28T18:11:40.180000
+CVE-2025-24377,0,1,61d1558f71d6a581f3656f06b3726e002e94d846cee6db0ec08557f6c34e1a34,2025-07-08T16:32:51.783000
+CVE-2025-24378,0,1,d9f49e97c34948b5b1e07367d9956cbd2a5da94fb4e5fe23ab1ab291c9e9c30d,2025-07-08T16:32:45.970000
+CVE-2025-24379,0,1,f0d8ce8586330f667534c8063f1a18f1cb42606f948b22c94302c5dce63f2879,2025-07-08T16:32:40.003000
+CVE-2025-24380,0,1,155ba2392096c917d7eabe8a994c3ba4c809a4b56210c13efdbc179737f4bbe1,2025-07-08T16:32:33.037000
+CVE-2025-24381,0,1,77457815c352092c9ddd1905f93bfbe7557478a725a600688820ba2c7caae88d,2025-07-08T16:32:28.740000
+CVE-2025-24382,0,1,b3010755c9912d61b6467a2c1f5a129a01134f8a45f99463971c696c1d257c87,2025-07-08T16:33:10.570000
+CVE-2025-24383,0,1,25696f88505e688e8bdad6b7e2a0af47ed1c4352695a86846e97ddb003904a5b,2025-07-08T16:33:05.830000
+CVE-2025-24385,0,1,3164d9763e0e9a03dbd7b58854291d34bbcece887bc504b93d46d67ddb761e7a,2025-07-08T16:32:24.280000
+CVE-2025-24386,0,1,4fa0c4a6301859768db6ec3245f2ce3d7a5f87aaa3c832e58acc5cee7912e11b,2025-07-08T16:32:16.767000
CVE-2025-24387,0,0,a1fdb446384ec34d7bd22f11041c6c4796cab0ef1e55e8ba9e452979dedd7e7f,2025-03-24T14:11:20.387000
CVE-2025-24388,0,0,0a9544a5960b19233f129fd9be7867c19c4b13c267f0c52b7b38f71629b57ccf,2025-06-16T12:32:18.840000
CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000
@@ -288152,7 +288164,7 @@ CVE-2025-24470,0,0,b97a6fef4b5505dee945d637a8774d8a3a426e3a9c38ffd15f57405368d61
CVE-2025-24471,0,0,f128a26c47d27d34468557e033e3c21911a9906bdfdb8a3bdb553419ef5b8add,2025-06-12T16:06:39.330000
CVE-2025-24472,0,0,573046e6e59a9878d2f5071b0132cdfc67ff241095b627fd46340e7e712c33a7,2025-03-19T20:21:38.197000
CVE-2025-24473,0,0,3ae93405aff32059fba30d19017fffdbad02a02f70e176e1cb2c599c6cc09d61,2025-06-04T15:38:01.880000
-CVE-2025-24474,1,1,e72c1ac2fa3d3af92b5789216ef85f5f0fe25deb4d0069bfd93cecc38bb75dd1,2025-07-08T15:15:26.220000
+CVE-2025-24474,0,1,531619ccdf52c272fd16f19538eac8490f822b4757efca6afd3d035c3970916f,2025-07-08T16:18:14.207000
CVE-2025-24478,0,0,0083a83ce8a7467bd79ed623e875ec78bf3adca87990be9aea0e893fa7d8e9bc,2025-01-28T19:15:14.777000
CVE-2025-24479,0,0,d732ba51a4f6efc84c8321c89024e480fd7d3b488cb555f37500d77679d00e07,2025-01-28T19:15:14.910000
CVE-2025-24480,0,0,8c69070e4602e3e045b6de7421f305082c0b32c33d67076e7034c529b969d532,2025-01-28T19:15:15.033000
@@ -288176,7 +288188,7 @@ CVE-2025-24504,0,0,ef6de3b3dbf1242190b08aac9e33b32e05b2dd27e51e53bc5474f7cffa0c6
CVE-2025-24505,0,0,7974460272478c3512102c93107009cbcaf39c532939b93286f6169dc2322ea0,2025-02-05T06:15:31.587000
CVE-2025-24506,0,0,6d0f2b92aeb54c0239442b80d645c7de8b9983e714f18d96e40f89a3734ac9c7,2025-02-05T06:15:31.737000
CVE-2025-24507,0,0,422b270ad7f0d60cc805efaa577ee203a8a40781b3fc9ddd5b1e3464f7401c91,2025-02-05T06:15:31.860000
-CVE-2025-24508,0,0,ccae1487c26a60f2c2ddcabe8652fd8514a517e542c68b92f80976c86bdaf055,2025-07-07T18:15:26.950000
+CVE-2025-24508,0,1,be7fc742299934c7fe35e465eb888f93ba8b66bf94cf28d9c1bcb662bcc1d912,2025-07-08T16:18:34.923000
CVE-2025-24510,0,0,f4346618569231171deeb91837ea19c4a3ebf78d3ab4044ab040e0d8c41ae8cc,2025-05-13T19:35:18.080000
CVE-2025-24513,0,0,5c5908095b7b8f59692c97894f2bc39950e9c619c5cca524158b823c48174aeb,2025-03-27T16:45:46.410000
CVE-2025-24514,0,0,1a64291b9861e3b81420eacf402909141500e0f7a383b259826850512f786e18,2025-03-27T16:45:46.410000
@@ -288395,7 +288407,7 @@ CVE-2025-24731,0,0,49b9d87fe50843eb1bd58d4e2d6c6d09038a230901783130e84ac391da7f3
CVE-2025-24732,0,0,c415d1fd5de8703d180e448901772f07d2bcadd6548313af1a4bf127cb6f5bdc,2025-01-24T18:15:47.530000
CVE-2025-24733,0,0,19623b8cddec9bd678ab21a0a6434a55dd6a2c946e1fd89b1c0ab50c79e730db,2025-06-09T18:56:58.550000
CVE-2025-24734,0,0,d7ca2e9810757851f82f80aff63b50dafd3642d61fd1c2dc810bbf398284d5d2,2025-01-27T15:15:16.390000
-CVE-2025-24735,0,0,cbb3ed657a525b127a8a399272228e7bcb5cc1d28814adf066a86620a8f6947e,2025-07-04T09:15:26.210000
+CVE-2025-24735,0,1,41887a4acb1a97953cbb132d19c6e890b8edc4df44e3f498fff2b31b91984e31,2025-07-08T16:18:53.607000
CVE-2025-24736,0,0,1e8a96652fc2162e5783360265a8d95c57b803a595f82f3425468a4e8170b686,2025-06-09T19:00:07.100000
CVE-2025-24737,0,0,9483d129977b5a55aa4e0fc4b6924a76dadd8b2c82251145da31eab6c37c7862,2025-04-17T20:21:48.243000
CVE-2025-24738,0,0,ff824e93f081ca47b8768807ed6baf0479ca4ae475620ff9b3eabc39fddae9c1,2025-01-24T18:15:48.017000
@@ -288409,7 +288421,7 @@ CVE-2025-24744,0,0,bc8bbe894f88fed69b4bb24f69d681e27c01e6147c3768ca6f1adf789040a
CVE-2025-24745,0,0,96360b19bb6d9efc61374d5ed9ad7e685cab245a4cf3d9cd634354575d9b39df,2025-04-17T20:21:48.243000
CVE-2025-24746,0,0,e640d68193c997efe97249e6f1cee0e9ce9f97ddc69dd52467ca15646a5683b0,2025-03-28T19:15:14.553000
CVE-2025-24747,0,0,d8d5879f141d02ac440b19c8b796e44b06e3fcae6bfd445bce644f72bd561c9d,2025-01-27T15:15:17.253000
-CVE-2025-24748,0,0,150aea02d4f8596114f9cb060ea52d61657585df20b6bb8b04065a74c2af5de9,2025-07-04T09:15:26.970000
+CVE-2025-24748,0,1,4c4617fa31e758420dff3f63ef5a443e8b03c3b9f68d73ad125ad1defb0afe50,2025-07-08T16:18:53.607000
CVE-2025-24749,0,0,7e56b04f2f502be4c647ffa52a0c1f2e91f2bc25e979a1ff629db670a4b544fb,2025-01-31T09:15:11.760000
CVE-2025-2475,0,0,c0a0336fb403efb898458fa5072cfe904fb815c7e89b5030a20878b1fe124799,2025-04-15T18:39:27.967000
CVE-2025-24750,0,0,6398f7b1e29d3519e65e0864494e38f2a68b8317a82c560542e0c4814ca79359,2025-01-24T18:15:48.663000
@@ -288419,28 +288431,28 @@ CVE-2025-24753,0,0,a2c1331499f1ee93474d032a5492134141c22dfbef3d88782211f0652176f
CVE-2025-24754,0,0,df5b30a971ad3afa753fa5100ea4ce4a8eeffe0cded00f62df24aa224b1825d8,2025-01-27T14:15:29.477000
CVE-2025-24755,0,0,817a6f4676c47a1165c3ef71cf774d5099a4b3fffe7ab21f2fd661b2cbf35fed,2025-01-24T18:15:49.160000
CVE-2025-24756,0,0,00090c21b036cb18f500635475c1d0d07432c00656603d0706e690db1dac0d4c,2025-01-24T18:15:49.307000
-CVE-2025-24757,0,0,f3e3004a1d061dbe67a3ae2f554bfb6332a37d532bd4db49d06e1d4a6b11161e,2025-07-04T09:15:27.197000
+CVE-2025-24757,0,1,7f0f6cf4add9b9241fe250bca94712dc8161887040f0914cab8f90b9035fa93e,2025-07-08T16:18:53.607000
CVE-2025-24758,0,0,32f18f9fde7b9c98057db303ccb0ef7fae2b4bd1295433bfb8994fab92023627,2025-03-03T14:15:49.300000
CVE-2025-2476,0,0,cb20178503f5107240f603d37b12152fa4cba62b4b4f5e2e6646619a7113db65,2025-04-01T20:37:56.963000
CVE-2025-24760,0,0,4f7029ae86dd7b9516532a3040ecf94ac1644b5cc9f3d543e67b3757fddeda98,2025-06-30T18:38:48.477000
CVE-2025-24761,0,0,14be9a3091bb296c1ad7a511c45dd0dd3f080ef93dc13404bd0682b9fe7df7e0,2025-06-17T20:50:23.507000
CVE-2025-24762,0,0,894e659a1a178aa9d531cd7df56fa726ae70cf96ed97a3663ab30f3dfab73a43,2025-06-06T14:06:58.193000
CVE-2025-24763,0,0,79f7b62e2c27806e3f9461410effa35fd2516a997202c5333c9106a47a7186ce,2025-06-06T14:06:58.193000
-CVE-2025-24764,0,0,d878c4608edda080849df70dfdfa6d109d2a1dc6c9828ec6c85bd3ffea0a4bca,2025-07-04T09:15:27.870000
+CVE-2025-24764,0,1,84f15bc6ed4b7aef9817dfa13828e4ec420feac87e0b479cf2dcc84cf196239d,2025-07-08T16:18:53.607000
CVE-2025-24765,0,0,2c464ba99c0db5b9ed9e3455db336fd30cfe6a1835271dc633e71b22ff07151d,2025-06-30T18:38:48.477000
CVE-2025-24767,0,0,1c214db83a47e8769c514849bbcc4d5986d7655cf1c36824fb9639640f04fe8e,2025-06-12T16:06:47.857000
CVE-2025-24768,0,0,9189c2bd9d601f25f78d69a9ed75ee394b9e6a5a348dad3498cc8567cf03accd,2025-06-12T16:06:47.857000
CVE-2025-24769,0,0,0f0fa0d60cf6c9c4c0c230cdf830a34c536e6201ae02e40d3e4e2d57e844d855,2025-06-30T18:38:48.477000
CVE-2025-2477,0,0,3686d026975337c8b88c9fe51616f10734ea4310f92df921905ea60f68804787,2025-03-22T07:15:24.780000
CVE-2025-24770,0,0,fdf52f6ec826aca9cec8dc178d0c6ac549801c2a9257299df2336712d666c437,2025-06-12T16:06:47.857000
-CVE-2025-24771,0,0,2178434632344a0dfbf1153604eb1f570747a536200c910c821033b4f5abaa07,2025-07-04T12:15:26.320000
+CVE-2025-24771,0,1,7ad7bd35fc033c1ff48ea52f6408027defe0dee8aeee75daacad19b9f66ac31a,2025-07-08T16:18:53.607000
CVE-2025-24772,0,0,547afdd5349c8fcce2c64d6c10c715e5d3569a1830eade75c5bf4072200b32a0,2025-06-06T14:06:58.193000
CVE-2025-24773,0,0,18aac50f7a3c4cfc33aa6395eceea0763b4b73e56e6641393a3babe09aaa0795,2025-06-17T20:50:23.507000
CVE-2025-24774,0,0,ed8ed015edd881dc0d20b6cd243fbd5f243c70baa478f754d8e8dfb85effe02d,2025-06-30T18:38:48.477000
CVE-2025-24776,0,0,c9ddd5a50b6ab340b7f808209038fd5f4594e33d9ce5f72a4815066c12e3c3b8,2025-06-06T14:06:58.193000
CVE-2025-24778,0,0,882f4200212085da2b27c56d01fef020fd88d760c8f828c4b6e08199c67ae033,2025-06-06T14:06:58.193000
CVE-2025-2478,0,0,1f250b1c3a01cc2aeb8f8a30a3c88313a7c6df2af4f8c1676f1452abfadd344c,2025-03-22T07:15:24.963000
-CVE-2025-24780,0,0,ebe3598a5946fdd4e080c78a1b70d45ee262abdb1c994d9eac190306a81112ee,2025-07-04T12:15:26.500000
+CVE-2025-24780,0,1,fc5faefcc49016e7407d5daed133444fc0a576056356faa013dc17d328450540,2025-07-08T16:18:53.607000
CVE-2025-24781,0,0,ea0dd1f1efc338a8190531ba4028569aeff4169f4687c401bac25279a2c35633,2025-02-03T15:15:30.410000
CVE-2025-24782,0,0,8c372ce8320f821beaf5305dedc64260459e1c67813cc3a8d8e478a94bd72f81,2025-03-10T18:30:35.687000
CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000
@@ -288839,11 +288851,11 @@ CVE-2025-25264,0,0,43b7a7b4f74d7bd8e5beb6dff5447491dc0a5b518feb8ee2b544a985ed5dd
CVE-2025-25265,0,0,66d572d3448f0be5065a29097f1c5cd567b87dd64e2b2d83a72ad748c925a812,2025-06-16T12:32:18.840000
CVE-2025-25266,0,0,14fc4214833d5ffeb8f363743939de320f9169af46798b63b6da510cc3dfff47,2025-03-11T10:15:17.850000
CVE-2025-25267,0,0,327b2100edff4cbf9fdcfe1321dc00713a82279b4ead6a7ccdc62b6f97970ac6,2025-03-11T10:15:18.030000
-CVE-2025-25268,0,0,d8cd8cb1ff13667f1839ed0d77baab19964acf2c7c3498fc623dffcbd54118b5,2025-07-08T07:15:24.693000
-CVE-2025-25269,0,0,1a61666a3de5652a8a57d8aa918c2e37894655c4d6e7d07620abe651eb427e9e,2025-07-08T07:15:24.890000
+CVE-2025-25268,0,1,dffc93be6501c2730d50e9d2e9663841da07503c793bf10e27090922b1b3f2ef,2025-07-08T16:18:14.207000
+CVE-2025-25269,0,1,37ed56134f6a1b04ef02f01b4c58ecdc4f0b9995eee56a405062002c43dec91c,2025-07-08T16:18:14.207000
CVE-2025-2527,0,0,7eee1c306ec3796fb3e2b284b23cda1a7bd91e67491cf652c8d7df0439106c96,2025-05-16T14:43:26.160000
-CVE-2025-25270,0,0,ba5d45858c7fc1c2d456eba350a104138f3920078104475f3ffac32854469b3e,2025-07-08T07:15:25.080000
-CVE-2025-25271,0,0,1f41fa06863111a47c79cad08152f2ba1356f230f1a15de432df9756ecf5d91a,2025-07-08T07:15:25.270000
+CVE-2025-25270,0,1,78f15d73ca3af21f6c624b2410b28c481f97a9164dda9aa6d56e80417f48f89b,2025-07-08T16:18:14.207000
+CVE-2025-25271,0,1,34f6c0989517fd0b20862aa09f017664b5450fd4ecc39985e38a1ea792717ba6,2025-07-08T16:18:14.207000
CVE-2025-25274,0,0,90de1f80f28c13ac592acae9058f17aeba0fd544a5c1ea5aa19b39d1d3157bb2,2025-03-27T15:01:59.897000
CVE-2025-25276,0,0,bf4dced8fe6ecf840461d20f447f79fe43fd41e2cf95e1d16b25b820c49b6b08,2025-04-16T13:25:37.340000
CVE-2025-25279,0,0,042549a55fc10922a139cd28848b848f448630efd12168ac54dc544f129afb38,2025-02-24T08:15:10.607000
@@ -289464,7 +289476,7 @@ CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440
CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000
CVE-2025-2659,0,0,fbf6b7428f5a2f31e77711a0c7541da7a333822ab93a6dd7f8fe575092acea75,2025-03-23T19:15:14.570000
CVE-2025-26590,0,0,69dd689006c8d139480f0d2fd99f2d72ce2fbb4e8fd019cab6563b501809f90a,2025-06-06T14:06:58.193000
-CVE-2025-26591,0,0,b35a3ed5d12c4320fb67311b8daa887019e21af7d2ef97aca42c9d2aaa71d03d,2025-07-04T09:15:28.517000
+CVE-2025-26591,0,1,9d7992a4562b103daca25bfecea96aa1fec5770c829761a3369af2c2c269bda6,2025-07-08T16:18:53.607000
CVE-2025-26592,0,0,1d78fdd090f1632b4ac4877f1ba3074af999e759435239a029d6b26bcc5060e7,2025-06-12T16:06:47.857000
CVE-2025-26593,0,0,f00c14abd006c9bae0f9bfa6b117ba98ac52839993ee2e7665ea503409204f77,2025-06-06T14:06:58.193000
CVE-2025-26594,0,0,22b96a2f1606784ee6fa3dff98a3dcda4cc907d5203050d8c08fb783b91d57b4,2025-05-13T20:15:26.200000
@@ -289510,6 +289522,7 @@ CVE-2025-26631,0,0,c91ae06bd2b89663e17ca69ccdf55a144c20078b7d8674eabababb282aa94
CVE-2025-26633,0,0,f4fbb84f465c1b0e951baaa78ae863528d201e071a3830aebe9457a9de1e838d,2025-04-17T18:29:29.283000
CVE-2025-26634,0,0,608f69d0431263b63adba8173de716809476cac0cec8a4cd99c955b505b94c2a,2025-07-03T15:55:30.563000
CVE-2025-26635,0,0,33816bd7e0fa13543b0349e255a8a88015ad8892d885ba88a4a1f65125e9ea6f,2025-07-03T13:00:05.107000
+CVE-2025-26636,1,1,84c56deaebb16520ce134c7ebca4a660ecfa23bfa69ead8947c6ab2eda330499,2025-07-08T17:15:33.793000
CVE-2025-26637,0,0,99e41170116e1f2746fd437fd212973171e7fda09083183b218f876996c16b90,2025-07-03T13:03:14.377000
CVE-2025-26639,0,0,71f35ca4441fe1279986f77456f7b0154238284043dc5dcb7be6b6a0c1a03964,2025-07-03T12:49:59.027000
CVE-2025-2664,0,0,7dd3532ba78c5ad5d0e6ad7993e1592577cd1539408ceb32db3e6a76007c157c,2025-05-13T20:10:57.580000
@@ -289636,7 +289649,7 @@ CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f
CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000
CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000
CVE-2025-2678,0,0,21e043de7d99133c751a03cd3480d87cab1f4c4859861a7ef4f888b9aa8448ca,2025-06-04T15:46:43.063000
-CVE-2025-26780,0,0,e987fadfdc06199ec82ae54d5222c3e9d82f5acf79b752ad3fe9051427717ec3,2025-07-07T16:15:22.683000
+CVE-2025-26780,0,1,a5b794c35348ae760a734f37f9b140f37a8c7e38a5b282225d23c1a9b3efdb55,2025-07-08T16:18:34.923000
CVE-2025-26783,0,0,092d46adf9a3a495bb9ae7bdea70708dc9e2b75c7e54b98486f2b7ae1421fc36,2025-07-01T15:00:29.100000
CVE-2025-26784,0,0,9b368b7303cb1dc1907afca1674220ceea8abfeed8648e6f0fe6b5f36f8681c4,2025-06-25T15:11:34.180000
CVE-2025-26785,0,0,a61358611e46e9acebc43670ee1699ab15072aa55a4b4f607bd41948bbd8c933,2025-06-25T15:08:42.323000
@@ -289666,7 +289679,7 @@ CVE-2025-26846,0,0,2164767227730b28c4b4868da96f4f5c7bb49b369c35864b07c2710ae6186
CVE-2025-26847,0,0,3d233c816c39dc38d8668bdd12825abe7f5cae8144b9287d9334a3289625d929,2025-05-16T15:39:00.600000
CVE-2025-26849,0,0,ecc346d978cf4b125c7c26c7d65273d07cfdd28ca98500cd78e9dc11fd5abff9,2025-07-07T18:27:52.807000
CVE-2025-2685,0,0,e47390d79e6358f0707017a49a80b868500d2e61df885503f5f07ed00adc5d2f,2025-03-27T16:45:27.850000
-CVE-2025-26850,0,0,01a03d0b12a942aa835d04a5d8dbdf01ed542e65767299680a56d58e3097c5d5,2025-07-05T00:15:22.670000
+CVE-2025-26850,0,1,ea27eb1b3b2850c5e2f3f852b88f446f462bb76fba327729294191852414dd2a,2025-07-08T16:18:53.607000
CVE-2025-26852,0,0,d2fbc16260605a1399a1a51f29d4909881f6e74e5303f79849970f70fec18739,2025-04-23T18:59:47.253000
CVE-2025-26853,0,0,b4d501221b958b69b8680b27722da7876f60455a590dcd68bb308199eb3f564e,2025-04-23T19:13:36.757000
CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000
@@ -289841,21 +289854,21 @@ CVE-2025-2703,0,0,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6
CVE-2025-27031,0,0,9fa4d5238e55dfabc5a9becc0748532469d6008767dbc00fd4050a94f50be84d,2025-06-04T14:54:33.783000
CVE-2025-27038,0,0,fe0578cb45b48dbd7571220d905a674d9df1e67d36609a2b08ca2656fb74b6b8,2025-06-04T17:23:58.387000
CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000
-CVE-2025-27042,0,0,10421b6864c3c3281a51ad95067c91bd6a253945d7e3a777ec49a686aaeb077d,2025-07-08T13:15:31.240000
-CVE-2025-27043,0,0,236bfaeb2182bec1661987839629836d62ac202e6c48543f6c3a4e55c5313c05,2025-07-08T13:15:31.430000
-CVE-2025-27044,0,0,6fd54216d90407fd55120b5a80cb6a8d1bec2f8779fabe79d9ca227bcbe2945a,2025-07-08T13:15:31.603000
-CVE-2025-27046,0,0,661e0a5448046d945e0282e829fb516f66227ee36cc4090123785e732cbe3bc7,2025-07-08T13:15:31.760000
-CVE-2025-27047,0,0,f85c296e4f61d374592917af2cddad0998fc9bbefe63d26014953ca5f7971133,2025-07-08T13:15:31.913000
+CVE-2025-27042,0,1,08a6c769b4e8e09cb815b04b02aaec9dcc8028b61338b897c66d68bbb3f91e95,2025-07-08T16:18:14.207000
+CVE-2025-27043,0,1,cfcd1f49ccddb6481666b2c428180bdfe3fbdfd09673ee8ad7723eee3fc4d1e2,2025-07-08T16:18:14.207000
+CVE-2025-27044,0,1,c47d7b1bfd39b03ff70f7bddc1d66e7b059946580f8c95b6fd18301689ac52e3,2025-07-08T16:18:14.207000
+CVE-2025-27046,0,1,c28efc15e6da4088ad38db5ffa823f72e4893546ed54583c89b3829a4fb59078,2025-07-08T16:18:14.207000
+CVE-2025-27047,0,1,ae1f77a59b0a84bb642f1aeeb21a69bfa800bc4ec020a4d46e777e11ef76ec83,2025-07-08T16:18:14.207000
CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000
-CVE-2025-27050,0,0,31723284a322a57d4025a2a8b617707887c0e4c7e6443ce93e4fbc23b7312aa3,2025-07-08T13:15:32.070000
-CVE-2025-27051,0,0,0b99479588315b965d6f57ce723bbf4454e193f44595dfee7c78b62ffa352235,2025-07-08T13:15:32.233000
-CVE-2025-27052,0,0,93afa7ed89c72fc1753659f7c5c1436ee066f7a62633e0771277cb34288d0dc2,2025-07-08T13:15:32.397000
-CVE-2025-27055,0,0,7986171a005c47eeb4b7b86c0bea7f141785a4df341c6b7298d47b233d9e81ba,2025-07-08T13:15:32.570000
-CVE-2025-27056,0,0,9aa8654c6001c67f7cd167eb4895e41f34ae91ad00fea4fd3158698b8119e31e,2025-07-08T13:15:32.730000
-CVE-2025-27057,0,0,47ee6f16402dd266f02a41fe9467d777af03b81e4c1127590f55511a5063e5ae,2025-07-08T13:15:32.910000
-CVE-2025-27058,0,0,9a80f785e29cd6627784970e852f8c53a0da5d247df71898ba841ac6c3e5333c,2025-07-08T13:15:33.153000
+CVE-2025-27050,0,1,27ebe80638f98ea8bdc7c99ccab00b94567815017e458fbc8d60d2fa141e5617,2025-07-08T16:18:14.207000
+CVE-2025-27051,0,1,8fb60d5af5f6ec2d22a35efdd8b3e55e684b7d03276fd168854a1d91683e866d,2025-07-08T16:18:14.207000
+CVE-2025-27052,0,1,1e4eac977f1aa3693595b351ee2171a3e0cc11e94414b92d818b3243e3230e6b,2025-07-08T16:18:14.207000
+CVE-2025-27055,0,1,e3e36604937dabdf1839e5756d39f26b560d1f969a81562acfee2cb28dad2dea,2025-07-08T16:18:14.207000
+CVE-2025-27056,0,1,0314452122672bf52014b83be5be13074d57da9f3661ba2b3b39badf1016f0b7,2025-07-08T16:18:14.207000
+CVE-2025-27057,0,1,f9698c244dd87b353100a28b325ef4536dad1266aad495583718f748c4f31db7,2025-07-08T16:18:14.207000
+CVE-2025-27058,0,1,dcf02459f9af7c84bbae6081fa4915c9cc24dc1ea9c87a7db856364afba98c78,2025-07-08T16:18:14.207000
CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000
-CVE-2025-27061,0,0,e9c0f18437d4dc3cae209b31b6cc01441dbec2ae377ac4864057ecaa9651fc3c,2025-07-08T13:15:33.447000
+CVE-2025-27061,0,1,72641bc5706ddcc7f6087506d7cde05bdba1896c532df6248f7a92bcecc00806,2025-07-08T16:18:14.207000
CVE-2025-2707,0,0,69090f335640f6d7fd104233cf0819e1bcd7db7e6b1707e48e0f43beec6b95ee,2025-03-27T16:45:46.410000
CVE-2025-27078,0,0,d965af916f92d2db1a98213768345ac86ccaa481e270cc65e36339f5a02ca0fe,2025-04-08T18:13:53.347000
CVE-2025-27079,0,0,2e6807eb9db0ff0cab73307a945a3f280ecd9d2483ae144485c2a82083b449a4,2025-04-08T18:13:53.347000
@@ -289897,9 +289910,9 @@ CVE-2025-27111,0,0,a8db734f919007cb50cb1902fbb4102eb8dcaaff069aa0ece6c61372ee7c3
CVE-2025-27112,0,0,8750eafe79b9906895ef1a1c17b5f7972ae9a0f6916d156cfca0a444751c0bd2,2025-02-27T20:24:21.910000
CVE-2025-27113,0,0,3f927ac99bedded3f15625d404f90be5185a2dbbeb1f3658f62dd072e77cf603,2025-03-07T01:15:12.823000
CVE-2025-2712,0,0,5b607158b37961f61c6154e4f3efff3b2ccb5f8d5bf2f3995341498b4ba2aa89,2025-03-27T16:45:46.410000
-CVE-2025-27127,0,0,b8c1ecdc3e069d27c718406fd5e0e227eb463370435b497d2627d0c08f2d24f1,2025-07-08T11:15:27.070000
+CVE-2025-27127,0,1,aa92ecdec22446eb887153af5887b6cb1c8eab8a9fe3105643eee658d265e874,2025-07-08T16:18:14.207000
CVE-2025-2713,0,0,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000
-CVE-2025-27130,0,0,a424518fe58cf3693b2d27c1fa1013a0db02f6fc2b32ae8122f4d597cfd847e5,2025-04-01T20:26:11.547000
+CVE-2025-27130,0,1,c40a18d9abfe5d71738f05d240ff807c1b6a6cc630d5ec60a83b043385497b44,2025-07-08T17:09:54.687000
CVE-2025-27131,0,0,071d8576367ac4bcd57ae780dc39fb5ba7d654b804cb1f5932df1fbd3dc6ce84,2025-06-09T19:06:16.757000
CVE-2025-27132,0,0,b1a8a12d0148537a02c0d96ce9420181e0484ee5a2e7e39fdd1e47ef3d526ac3,2025-05-09T19:14:30.360000
CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000
@@ -290071,7 +290084,7 @@ CVE-2025-27322,0,0,db12c06a727330268000c00c2bbfad285b50b188e497a32257bdc6bd9bd31
CVE-2025-27323,0,0,6b3c8bfca9a52e8e86879d19ce880fdf9f7a54b902cbc68d3d2a6df3d91b39a9,2025-02-24T15:15:17.887000
CVE-2025-27324,0,0,9fa25b81329be966f05fcc8a182a319715337d9882a4c6aa33c0a191fba7880d,2025-04-17T20:21:05.203000
CVE-2025-27325,0,0,2feca2633771fc2778abc5f38ebcc551352c349ceee670498f95fc6c1e87006f,2025-02-24T15:15:18.033000
-CVE-2025-27326,0,0,170962f8c181334dc45071f28a50686b9cdf2833bb1217ac9d1cbf90a69195bf,2025-07-04T09:15:28.727000
+CVE-2025-27326,0,1,9a909b942c81554809279aedc487416662ec89fb0795a48e6a0dbcded3e7a1f7,2025-07-08T16:18:53.607000
CVE-2025-27327,0,0,73e4ff5d75ca094725c80bbb276cee17166e5d6bda85688614f42774de023689,2025-02-24T15:15:18.180000
CVE-2025-27328,0,0,9ac63c0efda7e823e787a6bf7f7ca2b667f253a4b196d2b6272f78f509f1a1e3,2025-02-24T15:15:18.337000
CVE-2025-27329,0,0,51db9506be60f1f1c2fbcc8e8f746a383d6521e8d2aaa63590ca71230efadc21,2025-02-24T15:15:18.493000
@@ -290106,7 +290119,7 @@ CVE-2025-27354,0,0,1ce044a1079e0d294750814be6f1c0954b6a5514512ac17e37801e1c88cfd
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,906169a569eb5a8ab170c576da5f537f983e8f3b76fbc6f0db581847c8ddd5b6,2025-02-24T15:15:21.233000
-CVE-2025-27358,0,0,3ac040af36b755118d90ba7ed16b171c1f279c10a3fe88c82bac61e2493f2192,2025-07-07T09:15:25.140000
+CVE-2025-27358,0,1,5295a78ef530a9509a6a6e82fe024fae8a6a54c6202827fbb097332fd0abb76b,2025-07-08T16:18:53.607000
CVE-2025-27359,0,0,bc075bb86fca4f63cce935506a3dbbf1e76155fbe5cec01080355e7b3cf26a58,2025-06-06T14:06:58.193000
CVE-2025-2736,0,0,33c3006167b33de591f1a27264763826544e0569703dfd7d13e6e1e623d6c471,2025-05-15T19:29:57.387000
CVE-2025-27360,0,0,fc7c10146447c977dacf60af6e89aa6249adc1ba87fdcfe0e5e9aa04faaa557f,2025-06-06T14:06:58.193000
@@ -290180,7 +290193,7 @@ CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501
CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000
CVE-2025-27444,0,0,4a47feecb17e273ada092c286d134005100fd80febdd86293ecde589498b8bab,2025-06-09T15:04:33.780000
CVE-2025-27445,0,0,b3f5f26acd9b1eeb391c632e6a4f22f7ea880cf9f07dc106f61ff101a1eb24d4,2025-06-17T20:15:31.250000
-CVE-2025-27446,0,0,03c93c94815d89288446c29712e946a24628661ec89b7a5440b385df169bdcaf,2025-07-06T06:15:21.587000
+CVE-2025-27446,0,1,306223d39f4a3827bbc84aa2f26adcf59ede3ff05d8ad19beae49621b5fb459f,2025-07-08T16:18:53.607000
CVE-2025-27447,0,0,ce4ed780b04d23d0b37375dc5564770df1e43bef795462a910832c4a8be33070,2025-07-03T15:13:53.147000
CVE-2025-27448,0,0,f5ba7ace9d667bdbf65684150773cbbb69ec990406c133785b5b5234e0e68e7b,2025-07-03T15:13:53.147000
CVE-2025-27449,0,0,338c5660364661bf96c6ab3e44992ed998c75364f3c7528d1f424a54c6f530fe,2025-07-03T15:13:53.147000
@@ -290218,15 +290231,15 @@ CVE-2025-27481,0,0,bc3b0700f954a9a5e3a7c78a36a5e0edfb57572a34e24af87530e12d6a716
CVE-2025-27482,0,0,c25176508a39ea023407a320db5dc6e97bf37a6defa0f438b503485aa633b946,2025-04-09T20:03:01.577000
CVE-2025-27483,0,0,38d8b7ba94e2305b9d31b74bfb96bd0313f773765939b4c4521a4601b1648aee,2025-04-09T20:03:01.577000
CVE-2025-27484,0,0,da47c8568b1cd347f0b7a18cb801fd4d36f78728cca56b3687166e934ef30a8c,2025-04-09T20:03:01.577000
-CVE-2025-27485,0,0,7a8e9311fcf9f9be765fc942637599f68f6a67717f2004cb5905b74abf22dbf7,2025-04-09T20:03:01.577000
-CVE-2025-27486,0,0,8a38d3203257243e767c2672c253d83b61c50c9bc6bc76d2f9ecc3caae8e56e0,2025-04-09T20:03:01.577000
+CVE-2025-27485,0,1,0e2f19ec9f4977db1e145c21d35d5f222ede18b212eea6a3f68a8ca928701c4a,2025-07-08T17:14:04.910000
+CVE-2025-27486,0,1,ad8b07d21ac715bed034b80f6b6f2d22dcf42066be8d771027652c523c75b294,2025-07-08T17:14:17.177000
CVE-2025-27487,0,0,80f394c771052098212bf1348a29d97e607cfc5ddd2bb68bbd21da07e4eaff93,2025-07-07T18:25:39.683000
CVE-2025-27488,0,0,ebe1c05b9f92b76713304e6b66e645bed8c5e20f9555c240b0af59e123ba4ff2,2025-05-19T18:21:27.673000
CVE-2025-27489,0,0,21315daa75e937ec68a85fb8c619f8f9d9bd783b83c880b52651bfcfc98a0ab0,2025-04-09T20:03:01.577000
CVE-2025-2749,0,0,d5c23d9cde9d80aa1fbed3bbb517b5bdbcccd79985234132ec9559d4ffa36ca1,2025-03-27T16:45:46.410000
-CVE-2025-27490,0,0,8a746511c3476835b959fb95814eb1c64447a5aea7c6969a1fe604be98d835ff,2025-04-09T20:03:01.577000
-CVE-2025-27491,0,0,a170b2cfe00c7bfcd59af3c0c10c94695614acfe093d8954cdb444816d1edc38,2025-04-09T20:03:01.577000
-CVE-2025-27492,0,0,498576c22f82fd3b14ca5a98b09681c57370dca69bb9d91f90acbdca25efd17d,2025-04-09T20:03:01.577000
+CVE-2025-27490,0,1,17f33162195c2a6e1a0d6f888acf018823057d958d779b9d531dd48d35d649f3,2025-07-08T17:15:27.283000
+CVE-2025-27491,0,1,9568d96d7e84e1d8d3c16e0e36e0bf12c76081198f179a2c2bf481505c291bc4,2025-07-08T17:16:00.837000
+CVE-2025-27492,0,1,0a6803b6cb090d4d186dbc422f72aca475ab47e2fc18a332c5a864357b956f0c,2025-07-08T17:16:11.407000
CVE-2025-27493,0,0,5ed706f73f968eaed2a73fc0af7fc79cff24d7e3704ee418b1a94e6ee4caf2fe,2025-03-11T10:15:19.577000
CVE-2025-27494,0,0,629ff8926515d0723828ad76be68973f23d7843531167cb70ca06bf9d4ea120e,2025-03-11T10:15:19.783000
CVE-2025-27495,0,0,0576f2d28374419a6b7074f28df77009e0985e6c72ec4dc09942c29e9a6f6273,2025-04-17T20:22:16.240000
@@ -290413,13 +290426,13 @@ CVE-2025-2772,0,0,a9c3d51911c68d54005768d8d7cc8c73d0e59d32499f2ac518b1038e6a094c
CVE-2025-27720,0,0,7a20a194ccb6121b1696e09244424ce12cb46102db4a7f6939cbf6f0f518ae75,2025-05-12T17:32:52.810000
CVE-2025-27722,0,0,f6643ccc8a22899781482acbc064cbbf83bedfd8a0b28b0db307e860db0ae57e,2025-04-09T20:02:41.860000
CVE-2025-27726,0,0,38a1ac46d0efea1df2b1e49f61f22cd8b30134b3fdb6141c216328e096cf40e0,2025-03-28T18:11:40.180000
-CVE-2025-27727,0,0,766f66f029846a8cca3b4fc584682cd70592a39b0fa5a1ea1de6f5ca9bbb7917,2025-04-09T20:03:01.577000
-CVE-2025-27728,0,0,bda800a0a45ccb5a68510d9b2d0ba1064b7a091a8e8f53b4d9560775ced61669,2025-04-09T20:03:01.577000
-CVE-2025-27729,0,0,2b3b42ed14647008e15f4b81929f83dc2717eb6bd88155aae597aaf7558a1966,2025-04-09T20:03:01.577000
+CVE-2025-27727,0,1,22f89252c2d7ec6c7c3065f42712cf82fe7fadd7d6be9e8b4ea5f29254d80e96,2025-07-08T16:28:26.697000
+CVE-2025-27728,0,1,85f32943decafaa532987da8c64de5ec23c42d4ee9e4eb992472a746533a809c,2025-07-08T16:29:09.757000
+CVE-2025-27729,0,1,02668167d0c840a9e7fecfeb067bbf009fc25483c2c3cf2dd73bd23c5828d0a8,2025-07-08T16:30:00.247000
CVE-2025-2773,0,0,9f28fd03aef73597d293b1523070370800a7d6913fd342bd33f2a65795234576,2025-04-29T13:52:47.470000
-CVE-2025-27730,0,0,0f8b91d64fe2d09255d65a1453bb97cfd8f366ce835d605d8c8b8ca440c62387,2025-04-09T20:03:01.577000
-CVE-2025-27731,0,0,5abf7d1d684fe3d7dbb89ddcaf233d6b4174f0c7311b85e535d1bc5bc43406dc,2025-04-09T20:03:01.577000
-CVE-2025-27732,0,0,3d030c7a1fba172e04ad3bd092c6ae523ac5d3223848fbe5ef3ceadd583004e7,2025-04-09T20:03:01.577000
+CVE-2025-27730,0,1,d84eb9844695258fd922acb392dc07fbd88acc0e773fb3c4be00cb64ecce4563,2025-07-08T16:57:21.603000
+CVE-2025-27731,0,1,31a9571f012dea8a3ad6296a37f6771293c8f588ec29eed40f04c24f5c388ad3,2025-07-08T17:09:36.627000
+CVE-2025-27732,0,1,d872610a8b5a8bbe8930b6a6d921e3a88def13e6a41307a265f4cd9bf837d19f,2025-07-08T17:10:00.610000
CVE-2025-27733,0,0,192c2841bb3233972a91ec68d7e2d75b464696c4baea7e1f2ce3e5b040e7b31c,2025-04-09T20:03:01.577000
CVE-2025-27735,0,0,939620393a1c22c242f01915cf876392c16c3747763b61bbcc7bfd5d72efbe44,2025-04-09T20:03:01.577000
CVE-2025-27736,0,0,a6605ce63a69f5a1a21956db1436fcf213365e927b4f0e0c0498317b49f4c983,2025-04-09T20:03:01.577000
@@ -290536,7 +290549,7 @@ CVE-2025-27925,0,0,20d248e60598e5f95d1fae0ce2e564e286fc723b6dc1ad95ef277e933ed7c
CVE-2025-27926,0,0,55eb57ada8c72239b09d3012ac06f54ef846ef608760d35a348131200e00a4d9,2025-03-10T23:15:35.670000
CVE-2025-27927,0,0,bf2dbe703ec635d634e96d2beb7695c7f8896c464dab8b24ddd962dfd38a667b,2025-04-16T13:25:37.340000
CVE-2025-27929,0,0,405d4ba285dc2d56a2a609d37007a99aabba6336d29b9f347d71d44d90f1dc2b,2025-04-16T13:25:37.340000
-CVE-2025-2793,1,1,0615d21ccbd9259be744efa7276ba4c2bf2e3ae51187bb4e64277eae7bdd6c0b,2025-07-08T15:15:27.023000
+CVE-2025-2793,0,1,1aece46dae430d16a855b875f80c60f55a0c99c36a29ac4b5600a5df0e8343c7,2025-07-08T16:18:14.207000
CVE-2025-27932,0,0,e89ea3f7bc1f24dc892df481b28cf611425fca497d4d9ab9fafb911d848cbe47,2025-03-28T18:11:40.180000
CVE-2025-27933,0,0,93368137a33aa362057a4035ec036f1aedaefb3c8486745a8d93918e46a37c4e,2025-03-27T14:55:25.660000
CVE-2025-27934,0,0,95b3d1b020dd3defb4f0c3dbb03f408c8cd96475518f9b12ef782500b5b25703,2025-04-09T20:02:41.860000
@@ -290663,7 +290676,7 @@ CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
CVE-2025-2826,0,0,73d45c19b2e4c3bc4d80772bd5509ff4acb0a98a2510975df320963b1c203a94,2025-05-28T15:01:30.720000
-CVE-2025-2827,1,1,bbc2fe45c6654cd27580f76c908570d860cf52ea5976c329ef4cb4197ac8eb6b,2025-07-08T15:15:27.190000
+CVE-2025-2827,0,1,41dafc89cdcd0a20cf5f9d10d728f1f0242c9591342f63d839549553d35e90a5,2025-07-08T16:18:14.207000
CVE-2025-2828,0,0,7a1e0b9fa1d49b88ef9c091c576dad9127c3b06f0c12c9b72668f212f8f56a4b,2025-06-26T18:58:14.280000
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
CVE-2025-2830,0,0,44fbd6035d3d2cc03539fdc4859074e0483d9335c2d68a4a16795d3b39b2fa35,2025-06-18T13:37:00.120000
@@ -290850,30 +290863,30 @@ CVE-2025-28947,0,0,6d0d6ab5ae15515974f9a464af832e86c3273828eb252445a9e56524ceae6
CVE-2025-28948,0,0,4d297b75c70e34b4f1f934c39f9e9a15f431eb4dd554bce73695cd2e9278acd1,2025-06-06T14:06:58.193000
CVE-2025-2895,0,0,966a179e9ff5a3757c1d59699813f165ca0b60eb4aee6eacf6b5b6ed077d316e,2025-06-30T18:38:23.493000
CVE-2025-28950,0,0,95165f9c1a939415b93ab4b82b6c9d0ac3c413eca61b0efe3dd2ef6e35397ed6,2025-06-06T14:06:58.193000
-CVE-2025-28951,0,0,04da235c787aab2ab0dda90ac6ffd4b31b9fbdc7305762ca418032cbe38c6315,2025-07-04T09:15:29.500000
+CVE-2025-28951,0,1,75162b7766e45056e363b46751a222af796c3509972f2b653ef295b9bb8ff637,2025-07-08T16:18:53.607000
CVE-2025-28952,0,0,36a2d7e90e0ea02d7a032d500231cfdd2aabec1fc4b51f58a9dcb0a5dc7dfaf2,2025-06-06T14:06:58.193000
CVE-2025-28954,0,0,5e1648f3e4f3b4c2a3d29f98809dccb3c28ca26ee065ae7467a201e3a5a261fd,2025-06-06T14:06:58.193000
CVE-2025-28956,0,0,c65daa2f3b934be4b73db85bd78ce38beea4797c7b3913097ef918a694d7e252,2025-06-30T18:38:48.477000
-CVE-2025-28957,0,0,010270a792dc64c2b7121edbbfdb9882ad005acccb5f7bf19c476e2b2e04bb74,2025-07-04T09:15:30.007000
+CVE-2025-28957,0,1,d34a3d2b6f7195efe00dcc2883e572991f39aa508f03a9ca927a2480d9d5b803,2025-07-08T16:18:53.607000
CVE-2025-28958,0,0,d9eebea06aebd4f4602b4099a0e69e3b14141e06d1b195456acb942884339933,2025-06-06T14:06:58.193000
CVE-2025-2896,0,0,4558970bb5260d917e5a373371764eb8c9ff16148bd2cda59741f4495076314c,2025-06-09T18:08:36.257000
CVE-2025-28960,0,0,b650c6fd48bfb07947d0ccd4bb08b75f2fe53ec909e6194ffcc5d1a95f2f82e0,2025-06-30T18:38:48.477000
-CVE-2025-28963,0,0,6b30c5e2d6120cf1c2aef9b76341e85f94d4e746a8ad9dfe4313283244804395,2025-07-04T09:15:30.260000
+CVE-2025-28963,0,1,ab7306b4688b091c62ba81dbb51e6b201f2a60e2bd754431a124f79474bef56e,2025-07-08T16:18:53.607000
CVE-2025-28964,0,0,5941c6471c783811f736b1cd6a2de0d6e846c0f5ab5d7f88d39ac0e5c46376df,2025-06-06T14:06:58.193000
CVE-2025-28966,0,0,a9a888da79337c47e1f2f230b623b8e1e6b96aab7deecf98c76f3f9f345b2049,2025-06-06T14:06:58.193000
-CVE-2025-28967,0,0,090cae4601dea300040beb729d05c71419aba3e7d938d6932e6fe7899d8b2ab8,2025-07-04T09:15:30.760000
-CVE-2025-28968,0,0,fd76809ab4dcb3e9bc05d6ff19e038c7eca60e1a5650d3cf1775d09ef79f8195,2025-07-04T12:15:26.693000
-CVE-2025-28969,0,0,b728a1f790a9d7e8b47c3b4151341dbb8c565cc32a8c5fb6977aceaf0dfc42f5,2025-07-04T09:15:31.183000
+CVE-2025-28967,0,1,6034c6998ff2c7778018f7bfdb80c91d103d5161133aade59d99d846b66dc811,2025-07-08T16:18:53.607000
+CVE-2025-28968,0,1,18db324ec5d7e6a8b0b6d0d6403639ed224c034e19b4d36205758ac5f63f2093,2025-07-08T16:18:53.607000
+CVE-2025-28969,0,1,18b6ec31b6e6d529d5358dfc1656ca5dc1005293aba020fe72827120d1ff69ec,2025-07-08T16:18:53.607000
CVE-2025-28970,0,0,92881b56e6fe23586d7f4f080215a9212037d5cb3eec1d1c40819fe922f76f18,2025-06-30T18:38:48.477000
-CVE-2025-28971,0,0,1adcff7a859c50e3005418b1a0161517474eed348c80a5acdba833a9063b89b0,2025-07-04T09:15:31.507000
+CVE-2025-28971,0,1,cd9f350d1f7fc7b702d9b07caf848072028e38eaf82c953a0cf46378389a195f,2025-07-08T16:18:53.607000
CVE-2025-28972,0,0,3dd42a48294deab7934b4e1b7b617f2bca8d5c9775f53e8965c8cbc6973f3443,2025-06-17T20:50:23.507000
CVE-2025-28974,0,0,e17e6dc9b84000fcffa09ada9585e56145630617cef399b7f12d810b2629175f,2025-06-06T14:06:58.193000
-CVE-2025-28976,0,0,22e7dbe143e737814b2e460fcae43f33870f7644bbbdb9bffcd5ef93b708e320,2025-07-04T12:15:26.877000
-CVE-2025-28978,0,0,8e5294569f562f5d0eddc4883ca6df9d51a17e7844261283486cce162feef8df,2025-07-04T12:15:27.053000
+CVE-2025-28976,0,1,c95f04779e300ed70599446f84f615bd0c641d098b26303813873acab7662b52,2025-07-08T16:18:53.607000
+CVE-2025-28978,0,1,5f850a54db4e5d977b1048184ec5feefc4b3964c540c0c6fffac9a8096603824,2025-07-08T16:18:53.607000
CVE-2025-2898,0,0,47f67442cb55ba411e4669d13ef4529f1239e4e6ba72061becfb6f7e592e31cd,2025-05-16T20:02:07.950000
-CVE-2025-28980,0,0,fde1f61614e6028537af6e46d192741322aaba45c13bf42a32a7537f008c3a9d,2025-07-04T12:15:27.233000
+CVE-2025-28980,0,1,42ec5b4a5d4d369b3bbe1dac7ab211b1cf7113af966f5eadac1fef14db191c40,2025-07-08T16:18:53.607000
CVE-2025-28981,0,0,bb036b80f7f84e8c41aa9257be84aaa70ba5720599d544c5ddd5af62806b9e7e,2025-06-06T14:06:58.193000
-CVE-2025-28983,0,0,03c3e13191b5cb31d374bf8938f40593b5ab3d4d1343d8b276771adc3a5ba2a8,2025-07-04T12:15:27.437000
+CVE-2025-28983,0,1,ce28ace129f7d4fbb0f0cb80bb5ccf9228527cf01bdd000e3b09292203080487,2025-07-08T16:18:53.607000
CVE-2025-28984,0,0,9ef7f986d96117439d40b90e2fda225b43bc8fa4b7f4173f4395b7739bf2f93b,2025-06-06T14:06:58.193000
CVE-2025-28985,0,0,9bc036525a100347f01ae377d4a458e90eef123681201c669ca0c05249f59f10,2025-06-06T14:06:58.193000
CVE-2025-28986,0,0,1361618036e60c533ef72231d02393dbc213b1b36c2bad113d5bda9efbecbc7b,2025-06-06T14:06:58.193000
@@ -290889,17 +290902,17 @@ CVE-2025-28996,0,0,a3c81f0844ae31cf1718dfeab90e32c3f1e46bce363be53a0629b3286d456
CVE-2025-28997,0,0,201cbfd0ddb9fce280a7e07e55636b02e759e63e03e9f9c18fe553768df5e39d,2025-06-06T14:06:58.193000
CVE-2025-28998,0,0,dafd274ccd6b46521982d913f4adaad5cdb06f7ba5ffb020e958fbe2ae03dadd,2025-06-30T18:38:48.477000
CVE-2025-2900,0,0,7fae831f047ecd7346a160d93b21af917548a04e8f5cc7bcbad0aaded0bb8d22,2025-05-16T14:43:56.797000
-CVE-2025-29001,0,0,9a3b7d8c6cb2920e5a07cd84ed4f5452b398bc038e6e6ec6ff259a994103b791,2025-07-04T09:15:32.110000
+CVE-2025-29001,0,1,07dede145bd84a0693ae8418087add1984a73e320c3ca5f6b3fca8d9457c39a3,2025-07-08T16:18:53.607000
CVE-2025-29002,0,0,4ad8b380296eefe4ffd0149e4d0caec935c4e891151749f3fd7d9d7858b9f01c,2025-06-17T20:50:23.507000
CVE-2025-29003,0,0,ac4e6c10cc78a574f687bbb129b00b12f05050f35ac2c9c265488283397963d9,2025-06-06T14:06:58.193000
CVE-2025-29005,0,0,c9f8dbfedc641b5548bf37c246299e6accbd08e55b091ed72183877cf47bcc48,2025-06-06T14:06:58.193000
CVE-2025-29006,0,0,4d1d38cd7a0c468226e8aca886cb106ca62c5b00f9e00f7f812545f9eaf5dd09,2025-06-06T14:06:58.193000
-CVE-2025-29007,0,0,65d3fe758ffe775931e0747c3a1b5fe053e1fc684049943602b7216615162062,2025-07-04T09:15:32.653000
+CVE-2025-29007,0,1,f4231f0de477e899a4aa713f67d53b9e45746c3c592e1f4025549e37332bb8a9,2025-07-08T16:18:53.607000
CVE-2025-29008,0,0,3b3ab06273da56c69a0fb2483c56df3fa9f5064413b83eea18a740c113bcd8c7,2025-06-06T14:06:58.193000
CVE-2025-2901,0,0,692b7d4a80d8571564de4afe3e8a8fdc6532e8e3f67037d3bd7472bf570ebf4c,2025-06-20T12:15:21.010000
CVE-2025-29010,0,0,2e9f5293886bf5addf72b3ca5c7cabe4b8562b76040594b809db668966e61926,2025-06-06T14:06:58.193000
CVE-2025-29011,0,0,aba5b1495d441572d1adfbb50603eeeadd62a30cda9cc6bdfe85d38ffce67aa1,2025-06-06T14:06:58.193000
-CVE-2025-29012,0,0,a8b9741d4086a92ddd66b79a8979de732925286a359edab1978fec34693ad74a,2025-07-04T09:15:32.900000
+CVE-2025-29012,0,1,a56ac23533f623672c5ef5ca32cc5cb12b50083c97bb27c74f13ddb0ef7efdeb,2025-07-08T16:18:53.607000
CVE-2025-29013,0,0,8f57011cf53e8e7ea010a2914057553d82b531c5316817362a5957e50cd4e927,2025-06-06T14:06:58.193000
CVE-2025-29015,0,0,2c89624cc8d923634cb63c498a89bf9957e35c30cdd388a3e6553d139f4ea18c,2025-04-21T18:30:44.360000
CVE-2025-29017,0,0,89557f97009e1a426e4e78f346a03a71796c3409077c7515d19e8a31f7fd2d62,2025-04-30T16:40:09.547000
@@ -290982,7 +290995,7 @@ CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c
CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000
CVE-2025-2926,0,0,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000
CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000
-CVE-2025-29267,1,1,39a027a095ce6d2ee95ea85e220d49d9dd5fdc2ebadee9c58626af48e1079834,2025-07-08T15:15:26.827000
+CVE-2025-29267,0,1,cce991a10929a94ff331562f4bbcb7024fcae01d91733e59119c638db9881007,2025-07-08T16:18:14.207000
CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000
CVE-2025-29280,0,0,e7078c1a79e321c5221787040b502a3130fd227c8ba1ab7d76f6b02d2b9646b4,2025-06-24T15:19:45.883000
CVE-2025-29281,0,0,2c8d5f95d208357f48baeea9b566a4a0d55fc700bf49c9e1592597f8c42930b8,2025-06-24T15:17:53.360000
@@ -291202,15 +291215,15 @@ CVE-2025-29813,0,0,ff7cceae00ea82d02ec4c7df7b209cfeda763adb5aeda67accda8c21df72e
CVE-2025-29814,0,0,c7cab832fa767977cba0872c6f65e1512130af9c65ef61d8209da0b017adc816,2025-07-03T14:46:32.637000
CVE-2025-29815,0,0,9f7c28e7148318f8c11281c52db2c4e62b2d1c3d1ab4ed5744c30ceacb614c31,2025-04-07T14:18:34.453000
CVE-2025-29816,0,0,6d826714b1a076a8bbd359f8e92afbdc964a74fc49e30856bf675827ebb35951,2025-04-09T20:03:01.577000
-CVE-2025-29817,0,0,49cbd81b5ba3dceca4c2ba46c690e0912e315528416eba6103e343d51b376177,2025-04-15T18:39:27.967000
+CVE-2025-29817,0,1,43a5f242c0842a022c8b074bda50a9586e5d7b311e5fe0d6844166dbe67de2cc,2025-07-08T16:26:03.653000
CVE-2025-29819,0,0,4a700c0fce786ad892d47ad617d1e510ffe9842e2c48e6d250cc0a7f0adfe64a,2025-04-09T20:03:01.577000
CVE-2025-2982,0,0,2c2ebcac608fe0d1adcb1e6d3ea075ad059f2f0c1d50f6b5761a2ce38a606d84,2025-04-01T20:26:30.593000
-CVE-2025-29820,0,0,223f69cb7aa416e618f5ad7c866eb63bda40ec0c9cf9ceddeafa5e17926d634d,2025-04-09T20:03:01.577000
+CVE-2025-29820,0,1,fab0e0446e9dc0314d35b3dac27e2b5ba8aa0f2f8a15bf60fa622e6b0939af3c,2025-07-08T17:11:44.570000
CVE-2025-29821,0,0,57290d71b86115397faca996957f3a29fa63d3c86cf935b4eb0d6a787a869fac,2025-04-09T20:03:01.577000
-CVE-2025-29822,0,0,973881625f86d77ad7b53a903cab21ed1eb3049653ac5263e9d528e9fb666c55,2025-04-09T20:03:01.577000
-CVE-2025-29823,0,0,7020e8f361c2e1051ff80b6673ee2bc8c14b1552e575c216beb796659e5526c1,2025-04-09T20:03:01.577000
+CVE-2025-29822,0,1,56994e4e3e31ad2922394a034cedf87bcaf83222b5c3b963b4b7d4b761b8dc51,2025-07-08T17:12:21.260000
+CVE-2025-29823,0,1,f25bc2ba39e44a2aa3949a3f1f942d13b839d1d5d61eb72f70c5f6b63de701eb,2025-07-08T17:12:36.883000
CVE-2025-29824,0,0,9b68de2f887d726a15573443eb9f7c45e42b83e06251b9f017efb40ea9c20525,2025-05-14T21:11:09.447000
-CVE-2025-29825,0,0,604130cf95a2384ccc9598b84d4398e8d3d0acabfa9301765f2a231a00f7dcca,2025-05-02T13:52:51.693000
+CVE-2025-29825,0,1,3abbc6b91b3cd9ecc7ee9be0f5d905307db6b15f8decdb079a7f48591e22c032,2025-07-08T16:24:46.700000
CVE-2025-29826,0,0,b8b94b05537d00da563215a535284715880e4d6d272cc123bddc185b2bec878a,2025-05-19T18:21:12.547000
CVE-2025-29827,0,0,2e8e92f657a5b96bee5028926fee125ed4ce7d6916088606badc567f96de2634,2025-06-05T14:28:24.673000
CVE-2025-29828,0,0,2eb82095461e300ab8aceed13231b14030b2188af0228f3d802cacca2ec26c44,2025-06-12T16:06:39.330000
@@ -291220,7 +291233,7 @@ CVE-2025-29830,0,0,cb46bd440f8728e7f046be292a6f910ad48c59f67a504a098c9b8b355250f
CVE-2025-29831,0,0,bb21b9368c7dbc11c04a70ed54d339ed79c6aa9a57497e020d58ef5c0999dd7e,2025-05-19T18:20:14.783000
CVE-2025-29832,0,0,5dd58b0f3651cc5b0e8931c63aea80a834fe124cfda2dc4e16c7a90c9d546954,2025-05-19T18:19:40.910000
CVE-2025-29833,0,0,9b2f2a6015398e4e2096aab48ee1fa7eaa32a854ebef173b878c772cdcd51da1,2025-05-19T18:19:31.203000
-CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fdb40,2025-04-15T18:39:43.697000
+CVE-2025-29834,0,1,f125b27f3389f1fcd3515ba3304455318f21782a7ecc6848a652e22b06c2909b,2025-07-08T16:24:30.860000
CVE-2025-29835,0,0,06d6ceb0c3a08eb53c0a50af52c2cde38a3322572ac854ec43834e1c602c5c22,2025-05-19T18:19:02.897000
CVE-2025-29836,0,0,15efa27b34c40733e3ab5afaf7c5347c0da80e650cfd3be7780f44b02763b170,2025-05-19T18:18:44.573000
CVE-2025-29837,0,0,74bf66f2834d780cf4440e8ffbc480ce6aeeb858607962d3ca0c82adf238ce02,2025-05-19T18:18:32.513000
@@ -291634,7 +291647,7 @@ CVE-2025-30436,0,0,157aafbe97a61fabf3b83b6046cff85de7b0e0356b70ebd32bc3b0b912532
CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000
CVE-2025-30438,0,0,74656afde9b35f2b81392e23e2548ae49f2fb93278be9270035970969d725c46,2025-04-07T13:33:38.493000
CVE-2025-30439,0,0,da2ca7ddbba55c6600a20f55dae4819460d11b882f4097a091f5482180051fe6,2025-04-07T13:33:28.633000
-CVE-2025-3044,0,0,054e2df9116165d2a7770e1ab93e182a77dbb721890f8b65253aa2476717166a,2025-07-07T16:15:23.013000
+CVE-2025-3044,0,1,ac431137248276fb1983c03205ec38ad0df287f70dda91f29d6e9c1fa693e276,2025-07-08T16:18:34.923000
CVE-2025-30440,0,0,aa17715c0e9c198507565f90d517e1bf0a74ce622e9572e90458cb436f7c3146,2025-05-27T21:30:02.733000
CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000
CVE-2025-30442,0,0,94b2fd018b3727c786e128b7d801c1ec933a7c10df3f3083321d38dbb3c0aa34,2025-05-27T13:58:18.607000
@@ -291655,7 +291668,7 @@ CVE-2025-30455,0,0,654cb21164007decaef072b7e27df68e3e39b483c4e2d8a2b7a776151d092
CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000
CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000
CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000
-CVE-2025-3046,0,0,2ee9fe3ccbca9e41626f3c0886e0dfe649a4a2f4b2076f41c25cb5b68d3890f6,2025-07-07T14:15:24.130000
+CVE-2025-3046,0,1,3b66d074078d7ec8a078eaea9ddc48598a5ab3b1f908822550d72717da74fd75,2025-07-08T16:18:34.923000
CVE-2025-30460,0,0,d80e5d42755983a665f916c748c78211e6afa7b0e15e1ebb79456909187cd900,2025-04-04T18:12:36.290000
CVE-2025-30461,0,0,902c186691796d41fb6442de848f3f6d1e6de072cdbd4e5592409d68df7c6d6d,2025-04-04T18:12:32.693000
CVE-2025-30462,0,0,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f76e3,2025-04-04T18:12:28.400000
@@ -292093,11 +292106,11 @@ CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa
CVE-2025-30926,0,0,b661a84f99652a2821e7ff3d11c13e4069bdece4b97608c23c3ec387d8764f48,2025-04-01T20:26:11.547000
CVE-2025-30927,0,0,85246bcc22eea831eb2cabc1fa58fdf25aaaf04360b5f835cd7b0130652f5f28,2025-06-06T14:06:58.193000
CVE-2025-30928,0,0,6fc8019320e88e92e60f8d9ded425ef8244dae75b933caefa05d6b876de0d4fb,2025-06-06T14:06:58.193000
-CVE-2025-30929,0,0,7cdbbc79a77ca8d7b48f8029520cff1efdcd4f2d59c94b89d562fe6c61b63f75,2025-07-04T09:15:33.450000
+CVE-2025-30929,0,1,22873b71536ba9be9c0bd8af4467e375eb1494db1464863d4f8bac6ab47344da,2025-07-08T16:18:53.607000
CVE-2025-30930,0,0,9bf542b9de63233fd9f5d85ed07f76a70f9c52a5e16db28223227969773c9c4a,2025-06-06T14:06:58.193000
CVE-2025-30931,0,0,b875c8d500ba8afd6309c2581a84310affe8927efa1570fe516c4e65530e3e61,2025-06-06T14:06:58.193000
CVE-2025-30932,0,0,bd2f98f1d0e502b0ec1e90cccecfa714cd49fae8e66f1ef0acebbfeeed36e7dd,2025-06-06T14:06:58.193000
-CVE-2025-30933,0,0,b8102a08bceb254e9e86735e9879c7000378bb4947b03abb30a0f6ee840c7ad8,2025-07-04T12:15:27.607000
+CVE-2025-30933,0,1,213ba6c870344d228d36e73999d510d17e198ed0f8054058cfbf7397c6c91b15,2025-07-08T16:18:53.607000
CVE-2025-30934,0,0,bd66b04ba09878dacf97f7932735e787201c499a30fbfa68898a4b22f0dd9db1,2025-06-06T14:06:58.193000
CVE-2025-30935,0,0,ca186eaa73e189cf659341c581c52f39f9d6173e5f6605fee0e7c4491aea4555,2025-06-06T14:06:58.193000
CVE-2025-30937,0,0,c800cece02855df665103857cea1e01b14dbddbab68399fc5858bde566e29ad2,2025-06-06T14:06:58.193000
@@ -292107,10 +292120,10 @@ CVE-2025-3094,0,0,e679a8b52f24355a81d65b6f240f5180f46863ed4476ede0a0ecbc013840ee
CVE-2025-30940,0,0,42cc8020b187c2f949cd6ca6d60c91abf4e2645d02b7d6662331d5fba5cd1b31,2025-06-06T14:06:58.193000
CVE-2025-30941,0,0,1c2966e356bddf3fcb845bb906443c5988ec06a31097f9dedb5132243f5cfd10,2025-06-06T14:06:58.193000
CVE-2025-30942,0,0,dde98355d7ce6340be6dc8c110c67875471abfc9f14a5688f6740ac71c8ecf81,2025-06-06T14:06:58.193000
-CVE-2025-30943,0,0,34cf1e1b4846112a102f6c1a1dff5b933e8567bdfef2b91fc601dd709f2f9df5,2025-07-04T09:15:33.673000
+CVE-2025-30943,0,1,7a3e5d44ce9ff25c324e0ef225cce0c149f1bf7e75e66014f1c06d249dd3129b,2025-07-08T16:18:53.607000
CVE-2025-30945,0,0,ebf61fa52f5c4ae178ace28182f9812657771e01a723955d70da59b3eae4def5,2025-06-06T14:06:58.193000
CVE-2025-30946,0,0,2d6503706b8d5d9272b6eacd8d3449f9294370663691a3eb20d6635679bda2c5,2025-06-06T14:06:58.193000
-CVE-2025-30947,0,0,48a9a67e48d7173dae485be4d26dce2b0b367193aa459baa3d6b725612e2208b,2025-07-04T09:15:34.167000
+CVE-2025-30947,0,1,4b7658923d1bf549cb6214315f82164f8390baa1ce30b2c47ded4545f3f0c16b,2025-07-08T16:18:53.607000
CVE-2025-30948,0,0,81b46d446fe61fdd74ecee95046d8905435dfd26a3a66c51a475db70caec0f7b,2025-06-06T14:06:58.193000
CVE-2025-30950,0,0,ce142b199bd53944d0b37149265fe63a8d5ef324387b60d9be5434545c561251,2025-06-06T14:06:58.193000
CVE-2025-30951,0,0,b3804ceb08862f1e40a4b90d8854b4650d322cc0add1802a4921cd98124a21b7,2025-06-06T14:06:58.193000
@@ -292130,7 +292143,7 @@ CVE-2025-30965,0,0,31f9d1c6c6f596ab0f9465779010e3a4ab6304c7d82005590ba9afd9a3d02
CVE-2025-30966,0,0,ac009a6da52419c0270aa04ca81abc4fa5f318078fe3f9441908971cf101d5af,2025-04-16T13:25:37.340000
CVE-2025-30967,0,0,0c0b96e53b9cde9ad2bb3f71987232b57aa50bd6a24c6758752eb95376072a25,2025-04-16T13:25:37.340000
CVE-2025-30968,0,0,4942f6133733c0ddce430f0d6dc938c90008237c0010d8b395295fc1dc006a90,2025-06-06T14:06:58.193000
-CVE-2025-30969,0,0,6ae00f7d43553ca81981d1fa9709199473a5088cae26a23b9cfa82c55a9696ec,2025-07-04T09:15:34.417000
+CVE-2025-30969,0,1,d9b91f068610ced7e5d8c23681bd7d23573d9ebcd97a0215cb0ba809da468377,2025-07-08T16:18:53.607000
CVE-2025-3097,0,0,a56f46f6ab586feb1d3c504e3ae22e548d2acd2889f7f29233e79a32e7240220,2025-04-02T14:58:07.527000
CVE-2025-30970,0,0,0383c09158983a94697a54299bf3565b5884c0a46522c56908d558692c246209,2025-04-16T13:25:37.340000
CVE-2025-30971,0,0,bdaa81d5f90f891b35dfd2da44198cf771c61350682b9305a17f8bc2d53e966d,2025-04-01T20:26:11.547000
@@ -292139,12 +292152,12 @@ CVE-2025-30974,0,0,270ff5ae321eaf381312745d2453ca8ba421e2c52150d2c2759071c771de9
CVE-2025-30976,0,0,e305772f271bf5b9639627a467b70709bf0677558a54adb084f239e6182fb20a,2025-06-06T14:06:58.193000
CVE-2025-30977,0,0,0f384b592ea7d49d38cf172ba61071dd2f79b1646bf53550bc464c43bf7983b5,2025-06-06T14:06:58.193000
CVE-2025-30978,0,0,c549c9fd3c57f8b610c3f00ba61db1906f3d727e04f6668a2badb8b7cd0f0ae8,2025-06-06T14:06:58.193000
-CVE-2025-30979,0,0,829fcec27c238b87fdb0e4c31d6de14d5cbe12f8dd63fab2491e3e503cd13e67,2025-07-04T09:15:34.877000
+CVE-2025-30979,0,1,32df8dbeb1aa63fb7d34e7283710788cefd4efe36c636bba0f43390e9a843de3,2025-07-08T16:18:53.607000
CVE-2025-3098,0,0,64e3da7989169613fb4eaf552a0f5621059a5a42e666f32ff39d3d155f26ca41,2025-04-02T14:58:07.527000
CVE-2025-30980,0,0,de5f7bb0442449cfdb874d155c049b50d5ea7272b9dddf2b5e48dfed15312b78,2025-06-06T14:06:58.193000
CVE-2025-30981,0,0,f589aa7b19dfdf2f14d19fb642cecac61c4148f50d56de2d3b14c9f8038dda7b,2025-06-06T14:06:58.193000
CVE-2025-30982,0,0,59b15597be0361f08e3ea3f80591cb7c60a45abff0964752a18bb3c57220d42d,2025-04-16T13:25:37.340000
-CVE-2025-30983,0,0,8aafe90531349f7b77b315b23b7ca609c06e38a951a02bbb7905356cf6f53fe2,2025-07-04T09:15:35.120000
+CVE-2025-30983,0,1,098611fc46bd4c8aa7797a3942e60ffef16921832a18b731216d8291ce627dbb,2025-07-08T16:18:53.607000
CVE-2025-30984,0,0,034a74e0caa7bd14ced17a5c80bc778777c5654b7ca69176fb0d7f7ebaf75688,2025-04-16T13:25:37.340000
CVE-2025-30985,0,0,ca9a8afa18a1db635c78d3851e268c038dfdb21f929339aade64c19290b707f9,2025-04-15T18:39:27.967000
CVE-2025-30986,0,0,89cc7ea8131810f7d73ab3e657854dd73f775377299662852ec1f5270e30b06e,2025-06-06T14:06:58.193000
@@ -292197,7 +292210,7 @@ CVE-2025-31033,0,0,840a89b6a6fca121cfba44c8138c52066a8fe2d84b54cf8217e967669e52c
CVE-2025-31034,0,0,00045c692d736174347a15996f2644c271311b493b2650b7c9934fd5c24aaef7,2025-04-09T20:02:41.860000
CVE-2025-31035,0,0,5c760e02fcbaee44a22a24ae8d34d9e90e3913b6f5837b6cb83b1fc705e4819e,2025-04-09T20:02:41.860000
CVE-2025-31036,0,0,62cc9af3a9e12c32332fdab0e5c5a83ab6b53958493b4efe680877f6a1c84c8b,2025-04-09T20:02:41.860000
-CVE-2025-31037,0,0,7963ad0be448052df9d3d81b17be197e12c5d3d1b4487b35c8312e5772961c7f,2025-07-04T12:15:27.790000
+CVE-2025-31037,0,1,edeca662dd1ad233cff45d23219d5762118799764be85919690ec2d44113d609,2025-07-08T16:18:53.607000
CVE-2025-31038,0,0,7b5afc8e5d375ec9301ab6b724560141888b47309d5f5f2d9937b8782c078587,2025-04-09T20:02:41.860000
CVE-2025-31039,0,0,3e71e4693b497f566796572ee06eac544c71385131a6aad7b4db8dd95cd81f04,2025-06-12T16:06:47.857000
CVE-2025-3104,0,0,7baf3ae0deb4ba68c845a43b1ae9db1bf794c9bf7b07685fd4c21f525945dae6,2025-04-16T13:25:37.340000
@@ -292235,7 +292248,7 @@ CVE-2025-31076,0,0,828c30720e4eb2dc7f3fc59dc8be6a648b0486905b7a6815532dde47f9d44
CVE-2025-31077,0,0,c356ffd0b74d6893071ca7c0e85e191b532bf96b73b865b26ad16386706925d2,2025-03-28T18:11:40.180000
CVE-2025-31078,0,0,8ce8050616cfd8b7e1e7456f4899c4ba2c4c91fd5c0b1cde5e6134be185d9883,2025-04-02T14:58:07.527000
CVE-2025-31079,0,0,46b384ef015521e190bca84bd2527302238a3f0c98173efde811ff4de494bc17,2025-03-28T18:11:40.180000
-CVE-2025-3108,0,0,952f64506d46490adc89d99247bc125004285006ddff55f6753383d4023e0c37,2025-07-06T23:15:21.777000
+CVE-2025-3108,0,1,4ff91937c9cc99c9ac9d86de97e2774dd69f6a8e119130ee3c4277305c38a2ef,2025-07-08T16:18:34.923000
CVE-2025-31080,0,0,f5765755a2ce91b8863099fd7e2de278f04b94c4cc661b8dde775f3360a45794,2025-04-02T14:58:07.527000
CVE-2025-31081,0,0,861fe5a7a8dc08a1e4e9012abea6bfec5e3e656c0b9e13bee20af2af16ce0cfc,2025-04-02T14:58:07.527000
CVE-2025-31082,0,0,9f3db0c988533e5eb16a5d8011e1280a136ca6ff92f3fbb911ddb5a75bbfbb72,2025-04-02T14:58:07.527000
@@ -292410,7 +292423,7 @@ CVE-2025-3130,0,0,3331839c90977481f0952c53c01c561e7ce3f9a4b6241dc2a679ea92329653
CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000
CVE-2025-31324,0,0,f022551eb03f972b51d5adf3fa8b8bd88e48c383f69788d6260b2cb6e8237e8d,2025-05-06T20:59:33.773000
CVE-2025-31325,0,0,550c7b1d47a5a5766f5606913daeeb0e6f07a070553574431b9e6eac29d0e505,2025-06-12T16:06:39.330000
-CVE-2025-31326,0,0,97747191f9d7ecb4e551a0c0d26b8a5797d5787be7e35a1195ff20aa4c1d858d,2025-07-08T01:15:21.810000
+CVE-2025-31326,0,1,bfdec2bda5ca37dce66e982b278f02fee0545d6f0dabcba5569ebbc689739580,2025-07-08T16:18:14.207000
CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000
CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000
CVE-2025-31329,0,0,1fc101be6dd06c49bba529860427b1b9723c1206bb0b29e1d558e09c6f01e194,2025-05-13T19:35:25.503000
@@ -292883,7 +292896,7 @@ CVE-2025-31824,0,0,96e51898389d13f86e8c4b0cea38aeb29f30d022701a164154b572e9b2f67
CVE-2025-31825,0,0,16787d8215ca624aa5b60a68b898f851c0ebe1141b0a85c694174b94413289e8,2025-04-07T14:18:34.453000
CVE-2025-31826,0,0,92cb877e2f47e3269630047239793a9ae7b3842d5a44a53ebe254b8162e5113c,2025-04-01T20:26:01.990000
CVE-2025-31827,0,0,ebcd02ffb546863b75e8fada9013048347d5ee958e0c25302ae3866720cfec17,2025-04-07T14:18:34.453000
-CVE-2025-31828,0,0,9fee7b7158cdde7935cbc13773ff01e47993e74955611d316cf4e05efd0c276a,2025-04-01T20:26:01.990000
+CVE-2025-31828,0,1,d663e6ae7654716c504c636377a34d99ab1e7bfac340bd44a5364a8299c824d8,2025-07-08T16:49:53.200000
CVE-2025-31829,0,0,3bae247e220b234227ffb98516d715ad943da55df969b05e4c05a5c22fa7ebc2,2025-04-01T20:26:01.990000
CVE-2025-3183,0,0,a64cc343f36e4336817ce87e3474cc5281c840f215f41b54a718b7a59a86aed7,2025-04-15T12:30:35.003000
CVE-2025-31830,0,0,f4005e0df03f5b0098410454de12d4db7f27adab38ff501fb628b8fa4644f0c2,2025-04-01T20:26:01.990000
@@ -293026,7 +293039,7 @@ CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a
CVE-2025-32020,0,0,5b7d2613617c9ad4e941ba7e2b1cf1f147b7a3d7b6c82162fb86d6a3786c79d3,2025-04-08T18:13:53.347000
CVE-2025-32021,0,0,0e513bd1b52450f87228fc57cfca619da18fd53df0487a3d95000bd0dba6af44,2025-04-30T16:11:00.570000
CVE-2025-32022,0,0,2c4734d48bfcdb759fe8a332626cd5271dee9ff06dae75a69e5b82053e427691,2025-05-07T14:13:20.483000
-CVE-2025-32023,0,0,da3206793ef9e200f462773e3d40f38a3bc94dd75489d0dff1e0aa49b773dcdf,2025-07-07T16:15:22.830000
+CVE-2025-32023,0,1,816b5390da503365b2b008c7587edff080aeaf89e80fc8f89e730f048a7beda1,2025-07-08T16:18:34.923000
CVE-2025-32024,0,0,aaff324cba06ca8f03c4a4173bee9b2afa9dec13a6b5d5f449993fc4b6eea500,2025-04-08T18:13:53.347000
CVE-2025-32025,0,0,5b101f2fdaeb4bea12aa8eb2f822059db81531c623e382758e69fd88182cc8e2,2025-04-08T18:13:53.347000
CVE-2025-32026,0,0,a3f057cbd474338c495f1d95a560978a772ad4f2f87d9883afb826980afa64ff,2025-04-08T18:13:53.347000
@@ -293183,7 +293196,7 @@ CVE-2025-32206,0,0,44d1b73d9ff87b5a8fc03b2b53b3a372e551f62febe469fc10f50ce148efa
CVE-2025-32207,0,0,eb72e016d55b2976a29a6912bfeda1ec133bcea7c0b3d85d9579f149b9503d17,2025-04-07T14:18:15.560000
CVE-2025-32208,0,0,74f5bb61f4badcb3838dc80e5a4de29a24815b82dd6915e693a853b66c764b1d,2025-04-11T15:39:52.920000
CVE-2025-32209,0,0,1603135c9f53e36672a2ecef5661757da06cf7fd037cfe0a5c5773e8ba3447eb,2025-04-11T15:39:52.920000
-CVE-2025-3221,0,1,623efca91455a9a6369a87a07b4a5308fbcee8b3088c0a8c242c58491a53b10d,2025-07-08T14:26:53.390000
+CVE-2025-3221,0,0,623efca91455a9a6369a87a07b4a5308fbcee8b3088c0a8c242c58491a53b10d,2025-07-08T14:26:53.390000
CVE-2025-32210,0,0,0aa80c08dbeed0bc267b2a2253de1fd195755c49a910f167ea6c73944bcc0957,2025-04-11T15:39:52.920000
CVE-2025-32211,0,0,6bdc795ecc956ed82519c7a7f09aa44b466e95a997d47ca56b16a7040e169471,2025-04-08T18:13:53.347000
CVE-2025-32212,0,0,eb12d63e8a0a0e6749e0d2b8363cb81f92f2abb0e8486b3076c409d31db2137b,2025-04-11T15:39:52.920000
@@ -293224,7 +293237,7 @@ CVE-2025-32246,0,0,d856ec5e5b1b873352a68bef14e07ea076ee5b077a5931df46c2d77e7e8d2
CVE-2025-32247,0,0,0d56fee34759037d409571994dd91158b660749bcd59705bc8f944a1d5ba10d2,2025-04-07T14:18:15.560000
CVE-2025-32248,0,0,6b2b5e8625a101ef23ee5c68f566a106fd34e4e4c0a4a3f89d00a14514aa0d58,2025-04-07T14:18:15.560000
CVE-2025-32249,0,0,a74f78058e495c5c8058610d8e1d8eb92dda755f2cd6faf0c496fef809b79cf4,2025-04-07T14:18:15.560000
-CVE-2025-3225,0,0,69f11a04828ad7be3915ff17d8cfee8f4f9a6237935a1987ce33087a09db17e1,2025-07-07T10:15:27.047000
+CVE-2025-3225,0,1,ff7aafdb8351f401aed66ab3a83bce7e6a9e61e43159b1ab2b7940d5516774e6,2025-07-08T16:18:34.923000
CVE-2025-32250,0,0,5b65026d5b7900354f67df291c93dfbcf40a31e291957b7b2b193e0f08a73d18,2025-04-07T14:18:15.560000
CVE-2025-32251,0,0,db9e83682192d1c9ea6c6eb3ac5a5992ef43dadbd98f75e240c797354c7129f6,2025-04-07T14:18:15.560000
CVE-2025-32252,0,0,00dd1f6e7f173ba4ff86679e2c6bc51fcd619cdfd9d0c4d1e5a69ec083c8b123,2025-04-07T14:18:15.560000
@@ -293245,7 +293258,7 @@ CVE-2025-32266,0,0,b0a66bdd9023edc54869c1a7cfd44f792bfb978e961fd4af5dc5d3402cf0d
CVE-2025-32267,0,0,31c6bb7c27985d54cd85ce8a8639e08df3f44243cbe3aac55c655525f31b59ef,2025-04-07T14:17:50.220000
CVE-2025-32268,0,0,7b5c810a22559d49497cc7525019e14dfd2649ac7edc9ecfe4101ed378cb7061,2025-04-07T14:17:50.220000
CVE-2025-32269,0,0,ba9c0b72f7c04efa1d1bebcbd0cf52cc66d9304b2b328fd01d6e0ce4d232383c,2025-04-07T14:17:50.220000
-CVE-2025-3227,0,1,cd553eb5f8b5ff199cca916b21023eea1559b6406351d01542fa97c180294c18,2025-07-08T14:31:06.530000
+CVE-2025-3227,0,0,cd553eb5f8b5ff199cca916b21023eea1559b6406351d01542fa97c180294c18,2025-07-08T14:31:06.530000
CVE-2025-32270,0,0,814dcf7d7d2c3018db6f68b1868a737c3d9cb4acdbe6b4255b266d16cb1cf472,2025-04-07T14:17:50.220000
CVE-2025-32271,0,0,9fbd8c287d18a7fdcbecec1f68bf28db33e450ae2930193d3112f73e124b1f8a,2025-04-07T14:17:50.220000
CVE-2025-32272,0,0,94cc9160174845bb5d667fcb1fbdea45ff406fc4e1b26142be412d9fc8572fa0,2025-04-07T14:17:50.220000
@@ -293256,7 +293269,7 @@ CVE-2025-32276,0,0,2d58307e46b7067efedf11f095121f96b501a153603912c43d4654278d1c5
CVE-2025-32277,0,0,4c5beb804b84b7552a54d4404f6c409936619f520f5ab7f2060d18f52aa242ee,2025-04-07T14:17:50.220000
CVE-2025-32278,0,0,211d6ed6ada58eb335634d812d6f25038c2a3c7f1bf1fde12b2879747a714849,2025-04-07T14:17:50.220000
CVE-2025-32279,0,0,c8621d6c038bd552e5f86ac94833c9e696ca47f07d059658ea9fd536b7f0199a,2025-04-08T18:13:53.347000
-CVE-2025-3228,0,1,1105b6b65e5beb93c1d1364d657c02d418564bf3d5e4ecf880e9d5d6165bdd23,2025-07-08T14:30:48.667000
+CVE-2025-3228,0,0,1105b6b65e5beb93c1d1364d657c02d418564bf3d5e4ecf880e9d5d6165bdd23,2025-07-08T14:30:48.667000
CVE-2025-32280,0,0,51a846a5a42c043aab0e6fac915214336a31c77ee73a0ba45d8879819031b4bd,2025-04-09T16:24:47.373000
CVE-2025-32281,0,0,4e20111bb98613c549deb41ae88197a2cdb1de05ece054d260b974988fda3df0,2025-06-30T18:38:48.477000
CVE-2025-32282,0,0,4c53220555eedeae13ce6f318e3c3f0db70bd45e8d4e3f3e7970ecccd4879e13,2025-04-11T15:39:52.920000
@@ -293273,7 +293286,7 @@ CVE-2025-32293,0,0,9a78105b18f8a0c6c5de1f8fe7dabe6d94082dabce45b1c06d974558f6494
CVE-2025-32294,0,0,9398a189e417d8f1d02011e09df57d4ffe10a67d2827545633f1e29d8a0f8f0c,2025-05-23T15:54:42.643000
CVE-2025-32295,0,0,53c433306ea7dc97c36184a382b23df1b7d58def930436bb6fff2c7acee5a45e,2025-05-19T13:35:50.497000
CVE-2025-32296,0,0,55e4b32b240a3fefbe017324691d07e50cbce68d67ba40dfedaf61401ab7943b,2025-05-19T13:35:50.497000
-CVE-2025-32297,0,0,7864874790b44bc86971a82eba0475cfc424132e681c73bfdc11da628e805147,2025-07-04T12:15:27.980000
+CVE-2025-32297,0,1,20410ead10faa5380e0baeeef1090b763142cc14cdc967d2f378eb4f731d71aa,2025-07-08T16:18:53.607000
CVE-2025-32298,0,0,302f959d43cad911fa63ec1c874fdce4574abad03c10b91ff72248209ba9352a,2025-06-30T18:38:48.477000
CVE-2025-32299,0,0,49c4147c6d2449192d55c98739bc9eec8c1be87420b29ae76c69f17ee126a9c1,2025-05-19T13:35:50.497000
CVE-2025-3230,0,0,d3629a3e2161163bd15af1432474f4fcf2513cb10a5452b9803677814dc453de,2025-05-30T16:31:03.107000
@@ -293286,7 +293299,7 @@ CVE-2025-32308,0,0,2b7bec71af2d8aeb794f4d157dfc61ad4810b98ac960b587b7920f453cf78
CVE-2025-32309,0,0,72e524edceb2da5dc017c83bf8ab60e46c6fe45eb184ab0349a1ba415921a900,2025-05-23T15:54:42.643000
CVE-2025-3231,0,0,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b16e,2025-06-05T05:15:23.977000
CVE-2025-32310,0,0,c3b2568a49d7a011e3cbc9748557e58f0519995b3a6735845f843c0d6b6482d9,2025-05-19T13:35:50.497000
-CVE-2025-32311,0,0,66902e9308b8ff4ed8b5285e97c96281e1ccb8dede092a58a49a65bd3fc68a1a,2025-07-04T12:15:28.163000
+CVE-2025-32311,0,1,b7875ea94a334c74fd23434a3be25c499b3d25fc06873badb45576cf37992c11,2025-07-08T16:18:53.607000
CVE-2025-3234,0,0,70e8f52beb03455c50e84ca367316ec0117a47001407b94db1600acd985ca8fa,2025-06-16T12:32:18.840000
CVE-2025-3235,0,0,bf02e56a9b2acdd9197c016e355d3cdfc496d77110cbd9f5fcadcef4a0003d66,2025-05-16T15:43:09.640000
CVE-2025-32352,0,0,14a2251916c9246fc3d185746736b75fd36a375e4aafcddd19d832e612b92a9a,2025-04-07T17:15:37.147000
@@ -293542,7 +293555,7 @@ CVE-2025-32616,0,0,60896a25617451753658cf2cd6019c47ed9948e1a164f38e18b95e9ff8020
CVE-2025-32617,0,0,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000
CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000
CVE-2025-32619,0,0,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000
-CVE-2025-3262,0,0,4cf37fd67251af5aab958901ff1550a468cf52f9ab5315505a0721318b6e4aaa,2025-07-07T16:15:23.130000
+CVE-2025-3262,0,1,08d2ebc5faf486fb4d4cf1d46aec51a77c98b20c70bd9de092ed054db3760b14,2025-07-08T16:18:34.923000
CVE-2025-32620,0,0,752c95b518c1c86908f8276831e75f69148f83ddf678c09a4b2db5d818e0b6f5,2025-04-17T20:21:05.203000
CVE-2025-32621,0,0,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000
CVE-2025-32622,0,0,bb20d6b1b3e9da9aafe09a3e0f7186f182c77219f6d53914ac058a6b3c0c79cc,2025-04-17T20:21:05.203000
@@ -293553,7 +293566,7 @@ CVE-2025-32626,0,0,3931e7c17dd39d915fe1e5820ff5c97f69ad28fe8246a3ca70e178e524555
CVE-2025-32627,0,0,2ce05adac593c463246ee439e6e044a763c1c4fc0542c6bc6722a701c6ebfac4,2025-04-11T15:39:52.920000
CVE-2025-32628,0,0,4d2c7a01aa94c792f7990d7dd71254f93c942e443dedefba2dd6bb593b4656cc,2025-04-17T20:21:05.203000
CVE-2025-32629,0,0,a92f9907d30b0b6db2afce1e3db24313c9b35b2708ccf75f8c93c0c10a9249d1,2025-04-11T15:39:52.920000
-CVE-2025-3263,0,0,1c203ae688cab0ef8b5c50c483cfe2b6ceb7fc9d6423c4d0a937c2869bc7bf67,2025-07-07T10:15:27.350000
+CVE-2025-3263,0,1,1f5b6dd4d3790c29afb79b7dad1ee72ff7e9ee00d9ec584951c4e91e7154789d,2025-07-08T16:18:34.923000
CVE-2025-32630,0,0,b4cbe301acb68fb7684bb9c2133635edfbcd3e2a04a332d8b0df9750d01d9505,2025-04-17T20:21:05.203000
CVE-2025-32631,0,0,98a4a957df97acffc58c06a08d29807a3e2ddf6d4d4dfbf07dcb3cd84a59cb05,2025-04-11T15:39:52.920000
CVE-2025-32632,0,0,26e39bc54319c3de0a0c10d557b9f9955da9030c6dcde1ffebb8eaee6fe7bfaa,2025-04-11T15:39:52.920000
@@ -293564,7 +293577,7 @@ CVE-2025-32636,0,0,46c5ab1255e66cc2f15290ac98f7ba9ef721abddf5f02afe48be54a35083f
CVE-2025-32637,0,0,1927dfdf1c16211f4bc20ad3d946138aa50dcf26453cc46cfa4f17a2027f010f,2025-04-17T20:21:05.203000
CVE-2025-32638,0,0,d66c5e14690133298e4def8df71f876e4a0182aa854b235d75b391a9d2cb2037,2025-04-17T20:21:05.203000
CVE-2025-32639,0,0,8e4f9b910ec2cbe7d93f4a3d8fdcdcebf05317deb0404fe24a83cc58d9c07d91,2025-04-17T20:21:05.203000
-CVE-2025-3264,0,0,da651e1c37ffe7ea0205968e82a4db6bbdec76969cd78a61b48a85cff4533b2c,2025-07-07T10:15:27.500000
+CVE-2025-3264,0,1,99c11bcd85570d95f0b0b7a297a8092045b783dff39d866f5eb52ea330140ee5,2025-07-08T16:18:34.923000
CVE-2025-32640,0,0,cf49f8ad76a904999cf27486d117c795b1de02a1d0b705263cab94cab97b30be,2025-04-09T20:02:41.860000
CVE-2025-32641,0,0,d04a6f9084570cae3bdbe21b3d3e6cbeacbb39d50f117e6bae39942bd0102f2b,2025-04-09T20:02:41.860000
CVE-2025-32642,0,0,aa532dd331e1bd53f2e3ad431d5751486f9683adee9f60d6fbaabda798c828d0,2025-04-09T20:02:41.860000
@@ -293645,14 +293658,14 @@ CVE-2025-32715,0,0,d3bb82570cfd99f6000d98e5821e69e0b0e182ee8729f896626bf66824fdc
CVE-2025-32716,0,0,91c9640e2d7e8d9358387ecda29da45af9428878abc1beb58e68bec29725a7ab,2025-06-12T16:06:39.330000
CVE-2025-32717,0,0,447fb24f04fe230fb82199dcdcca736c79ca8bbbea88578d9df2777ee180e48f,2025-06-12T16:06:20.180000
CVE-2025-32718,0,0,94f30c6a9dccffb0ca6be7f590a8c89f73388b98ddffac8ad23eb1be54bbcb44,2025-06-12T16:06:39.330000
-CVE-2025-32719,0,0,47c190891b0b673ae4d409884794851b0cb8ad60af8c43d5a5bcd3cab58238a3,2025-06-12T16:06:39.330000
+CVE-2025-32719,0,1,bc34cd1e14a931ed2c758c2af5afa6c291a6ea5edf2ac3d05802dfbf2a8d511f,2025-07-08T16:19:14.697000
CVE-2025-3272,0,0,c60fd5482e862c50b349cbd37632283d483289fdec77619757f54ad2125c58ec,2025-05-08T14:39:09.683000
-CVE-2025-32720,0,0,19a07e5802bf295bb24996da5dfd9fa4fa42114198fb32a1509a3a6559d73bc7,2025-06-12T16:06:39.330000
+CVE-2025-32720,0,1,35971b3501be6349232202d5ce4b34f35ed7de00f86f4a0df38eba0bbc51c6cc,2025-07-08T16:21:38.380000
CVE-2025-32721,0,0,c26fe93681cd52cce0cf4ff979a7c2cffec52cc5943328679ef734f55f275b9c,2025-06-12T16:06:39.330000
CVE-2025-32722,0,0,ddd8b755f43982f36ace92cac1c353ac43b393fa4dcea25aa52c1a70020ff44e,2025-06-12T16:06:39.330000
CVE-2025-32724,0,0,5c1db1e7eda7d970bc69903e9607b22429ec0fcccde7a2fe7ce01c3e16ab69d4,2025-06-12T16:06:39.330000
CVE-2025-32725,0,0,4dbe0412c03d3c3ff612f289ae17c8ca830cd492937aea46b873db4e66aaf2de,2025-06-12T16:06:39.330000
-CVE-2025-32726,0,0,91136782c0c58a96138194cd454d47b71b0e86e3f0a06431e8d3ca26e00cb323,2025-04-15T18:39:43.697000
+CVE-2025-32726,0,1,1b878ab7aa620fd80dbc0cc7d7c12091c57b07913d559ef424a18607b46d567f,2025-07-08T17:12:50.770000
CVE-2025-32728,0,0,5aee560e966fe76dd9048a3df7563795abff4e2cd132941a1a731b81d94d6a0e,2025-05-22T16:51:54.890000
CVE-2025-32730,0,0,44cce1a9327b117b4904f0c237377c22ba67547a2108fe2d846b0c147958e156,2025-04-29T13:52:47.470000
CVE-2025-32738,0,0,1e4b18eb00c7b6445b0a47ae38d1453a38fd33cbb9f422cc0f1548fbc1beb4ae,2025-05-16T14:43:26.160000
@@ -293783,12 +293796,12 @@ CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b8
CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000
CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000
CVE-2025-32875,0,0,ef16cc45f9d463b891fcccd40892c4fbe4ce3dc0b696a29a1045a30b036ebb7c,2025-06-23T20:16:40.143000
-CVE-2025-32876,0,1,51a557f02b984a90375753b331d311d94db74188c5a37e3dba0dcd92a86bcdff,2025-07-08T14:32:59.510000
-CVE-2025-32877,0,1,f7ed6ea9f03b3e4d855ada167a9c3d650e8323c3bdd90194852a614223a3c5d6,2025-07-08T14:32:52.860000
-CVE-2025-32878,0,1,08e3dbed0d369f312206c55f4f8a85746f2206a8b6d01d4e3dd555745dcb82cb,2025-07-08T14:32:47.210000
-CVE-2025-32879,0,1,e69ca40c0bd129c7872aa050ad4171e4e3fd5733b7e28ee1dd90160dd8c46ec3,2025-07-08T14:32:41.563000
+CVE-2025-32876,0,0,51a557f02b984a90375753b331d311d94db74188c5a37e3dba0dcd92a86bcdff,2025-07-08T14:32:59.510000
+CVE-2025-32877,0,0,f7ed6ea9f03b3e4d855ada167a9c3d650e8323c3bdd90194852a614223a3c5d6,2025-07-08T14:32:52.860000
+CVE-2025-32878,0,0,08e3dbed0d369f312206c55f4f8a85746f2206a8b6d01d4e3dd555745dcb82cb,2025-07-08T14:32:47.210000
+CVE-2025-32879,0,0,e69ca40c0bd129c7872aa050ad4171e4e3fd5733b7e28ee1dd90160dd8c46ec3,2025-07-08T14:32:41.563000
CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000
-CVE-2025-32880,0,1,fe02420945a6a4f1a7851a26bd8aa8a0f2a47ea576ae8fd26bf77b476cced280,2025-07-08T14:32:32.310000
+CVE-2025-32880,0,0,fe02420945a6a4f1a7851a26bd8aa8a0f2a47ea576ae8fd26bf77b476cced280,2025-07-08T14:32:32.310000
CVE-2025-32881,0,0,2e6693087c6469e2e3ed7d14a7bafcb787b21e7f52bc589483e80625632ed3de,2025-06-20T16:53:44.603000
CVE-2025-32882,0,0,6fa7eb0c13b8f4a6b7486f15fe9d347233fb9b2bc042b7db395a0246e398835d,2025-06-20T16:52:25.717000
CVE-2025-32883,0,0,703e46cfcb95ec9166eee4a0c23a7770d00fa65b25e990917ccbe5c8d1ce5357,2025-05-09T20:15:39.003000
@@ -293801,7 +293814,7 @@ CVE-2025-32889,0,0,1758151af4b145b593cac5bce0174518afb9f62175456015713f13270f9e4
CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000
CVE-2025-32890,0,0,f2c41c451f0f9806b1ea692a8d179705ea340cd405232ede792930108ac7f581,2025-06-20T16:28:33.357000
CVE-2025-32896,0,0,87730d1e109c37783e2d275153cb9b2689aced8423374d3a79b510b3130c20db,2025-07-08T13:05:21.833000
-CVE-2025-32897,0,1,3ccaa24fd685a0aa7a9d5b6c75cfdbe9763664838d3924a0e8ff4e0956839546,2025-07-08T14:44:38.643000
+CVE-2025-32897,0,0,3ccaa24fd685a0aa7a9d5b6c75cfdbe9763664838d3924a0e8ff4e0956839546,2025-07-08T14:44:38.643000
CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000
CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000
CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000
@@ -293813,7 +293826,7 @@ CVE-2025-32913,0,0,e1927d0860bc1d6760527c56e49e831eec072989d1ced890c45db58ff9e96
CVE-2025-32914,0,0,3af3067d70bd81f91455998b87224657ddcf7d162a47d749db58a95e606833a2,2025-06-17T12:15:25.657000
CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000
CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000
-CVE-2025-32918,0,0,7753f0e8e528075df55f85e614fb2540b5e07e6813105f1ed6d1186ac11a0de1,2025-07-04T08:15:25.520000
+CVE-2025-32918,0,1,6fd595c92d95f19cda725ce2363e0c48caa34121f666935f92293e3e5bcdf8bf,2025-07-08T16:18:53.607000
CVE-2025-3292,0,0,42fc5558c26f98bdc7e16d1f016ef92e4bef0e69bf8d6bdf23188c17e6508682,2025-04-15T18:39:27.967000
CVE-2025-32920,0,0,7e212ccae54e7de68d6b49d615b9e74e6cf3cb23588850cf6230b262d708bae7,2025-06-17T10:15:22.177000
CVE-2025-32921,0,0,7c798e84a120c09e79aa61f0d66dd4a5e84ea134e24a6f6fea02a374ca1d5b0e,2025-04-29T13:52:47.470000
@@ -293908,25 +293921,26 @@ CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d4
CVE-2025-33050,0,0,e156cb367be4771501f8d46050ac0ab3c4178892926d8dc8a607e2c1f3f8c45c,2025-06-12T16:06:39.330000
CVE-2025-33052,0,0,79d6261dc5415dedb0ab47eb4499fcc0a99e2b5ae668d773ee1583b99bbd94c8,2025-06-12T16:06:39.330000
CVE-2025-33053,0,0,c8f7aa155e822eb767b601df7cbedde06e3361554120cfbcbc24f730a7152846,2025-06-21T01:00:02.137000
-CVE-2025-33055,0,0,2a92055aba8ed205096c58d7212065a236a7d2bb1a94578c68d5117adf2877b3,2025-06-12T16:06:39.330000
+CVE-2025-33054,1,1,49c0a216b06152a49263153ee80fd21c5b146cde9b870681b28d8c68108d1ff5,2025-07-08T17:15:34.063000
+CVE-2025-33055,0,1,d6dfaf0978cf24abec063a5d8c7b3f06fb151dfdef9a86912015b6b37ee584d9,2025-07-08T16:21:47.263000
CVE-2025-33056,0,0,6e7cda26b69eb107ce9e61e0b9dd0be48de829fb147f6fa984db0a0c3d628870,2025-06-12T16:06:39.330000
CVE-2025-33057,0,0,11ff4440f3c257c10f8c6be80309710d9a3f21cff0821fca2b3b0f05085ccc24,2025-06-12T16:06:39.330000
-CVE-2025-33058,0,0,9deaefe0a253157ed9bbdb955a090f2eda9bb0186b35e05fdb8fd4a87a6a5f49,2025-06-12T16:06:39.330000
-CVE-2025-33059,0,0,3b58c77eeaf557d1f97fd4d3b2b3dfdd2bb6c465c020c3a03b317a311a93d3b2,2025-06-12T16:06:39.330000
+CVE-2025-33058,0,1,e2093ecc08f345b2570d40b8bb2619d40ad7295830b852501a288fd70868fbba,2025-07-08T16:21:54.080000
+CVE-2025-33059,0,1,1a884804e960b76e506db8494dd2824822820f84064b48c1a9823388d8a19aa3,2025-07-08T16:22:01.010000
CVE-2025-3306,0,0,116c94def1d4a2e814002f4948b93b65daa72c17537f71098e725bdf140a908b,2025-04-08T14:54:03.220000
-CVE-2025-33060,0,0,ed52b1addeb7524c35f3572e1cb4a04d80e7b725b262dcd11ad2876b90e55aee,2025-06-12T16:06:39.330000
-CVE-2025-33061,0,0,02e425ff5866cf317dcf2b804a4ca6f74b86e546bd2b0601ba8cd651350107a4,2025-06-12T16:06:39.330000
-CVE-2025-33062,0,0,ff6421b3622c0ba4f7f464bc2c4f5eb0f9f27d5ab0f210cc260388437eac0a40,2025-06-12T16:06:39.330000
-CVE-2025-33063,0,0,a7db9bd44f0d3da4c6a74a79e5ab6360f749a64e457292240deee44a6f498d9d,2025-06-12T16:06:39.330000
+CVE-2025-33060,0,1,a58066366f241582921ef66266e877df706a40891da4030f363f3fc0132092e3,2025-07-08T16:22:07.860000
+CVE-2025-33061,0,1,027635580e6e927ed348e66de618e6cfaace91ebbf5204303fae42750b3450ac,2025-07-08T16:22:14.333000
+CVE-2025-33062,0,1,ea253ad2dbe0cfe832f08d6a2f5534e2a44fbadc0636df2313d6c803654722d8,2025-07-08T16:22:21.373000
+CVE-2025-33063,0,1,f1135df13cae22405efd4f2f5ee36015e88da3e10d72e41656cb2c73ef5748b3,2025-07-08T16:22:26.790000
CVE-2025-33064,0,0,9804955aa581895796a07736879d21968f1ea7560e982fabafb452a5025ac0a0,2025-06-12T16:06:39.330000
-CVE-2025-33065,0,0,784652372c07c7697665d38e476ecffb20b3edb63f6a83edf2a3af32980259d1,2025-06-12T16:06:39.330000
+CVE-2025-33065,0,1,da08eda0838b1e8684ed66783a52d31d27d0742a82edea8fd57603bab41eceac,2025-07-08T16:22:32.730000
CVE-2025-33066,0,0,c2c2e93fe8bcdc1b3da39f541e25cc663e313c0ac608365834c3768124e52f28,2025-06-12T16:06:39.330000
CVE-2025-33067,0,0,7ede5dc244b07334a59b790397a8e96d344398a63f6b2572dfdaab5529eb8b77,2025-06-12T16:06:39.330000
CVE-2025-33068,0,0,9eeb0cc77e80617531f99cab7cb463d7621252f66b5d76addfff87b6a38f8749,2025-06-12T16:06:39.330000
CVE-2025-33069,0,0,13861e1f0e5a73ef04a6585bf6fdf23b002dd9942f5d77cdb758358e6ecca7aa,2025-06-12T16:06:39.330000
CVE-2025-3307,0,0,764533eb55c36b857743124d26869569dc2e30546eb2b26c9f7f85b2c9a577e7,2025-04-08T14:59:43.193000
-CVE-2025-33070,0,1,df88accf87fb93a62a8dc2d35c886f87b39680027d7bba1f83befaa07ba191ca,2025-07-08T15:04:13.803000
-CVE-2025-33071,0,1,b535c9c120e849ec2f4513ce17a5bbfd468e3d954fcf810aae6b1c919a026f55,2025-07-08T15:03:09.613000
+CVE-2025-33070,0,0,df88accf87fb93a62a8dc2d35c886f87b39680027d7bba1f83befaa07ba191ca,2025-07-08T15:04:13.803000
+CVE-2025-33071,0,0,b535c9c120e849ec2f4513ce17a5bbfd468e3d954fcf810aae6b1c919a026f55,2025-07-08T15:03:09.613000
CVE-2025-33072,0,0,da8dbb3f32bc92a4fea66cbf1913465f4b8680e98b695ceda185e1985ccda963,2025-05-21T14:52:32.977000
CVE-2025-33073,0,0,d3f90b564fd8bec2f6d35d0581ab774b5d7141a4c0222c791dc2ea8fa9532238,2025-06-12T16:06:39.330000
CVE-2025-33074,0,0,18fcd41dcb3c6273c73253eac7fa48f9c3a067330384af16f609b96399dd2bb1,2025-05-12T19:42:26.413000
@@ -294074,7 +294088,7 @@ CVE-2025-34058,0,0,fd1d6135cbcb5a939cf5a00698e2051104b6bd46ef2e608640ce59a67cf5e
CVE-2025-34059,0,0,45a6f5a690de4057ca2d091f2ebd0e7868dff26548a7187ca235baafdf4d8729,2025-07-03T15:14:12.767000
CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000
CVE-2025-34060,0,0,c9e66c79fa3e22979f6d536300a3a69b4248f557ef4ce60fb59bc75630daece1,2025-07-03T15:14:12.767000
-CVE-2025-34061,0,0,4f7006b3efc277cf62d75e1f896b65abf52bb7b31120bc78cfd601d0a0b51139,2025-07-03T20:15:21.570000
+CVE-2025-34061,0,1,d0e9b29f1304b1e5db459ee0806345af89a962a07b717e5de202c73a5968d72d,2025-07-08T16:19:11.700000
CVE-2025-34062,0,0,b716d5649a0b2ab449b7a4e5deda5a7ed68b48d3e9d485331bef321a595836de,2025-07-03T15:14:12.767000
CVE-2025-34063,0,0,fbf50ba1666892a680b7e726cc84b450cde981ed5af9e60f07742062b62bf6a1,2025-07-03T15:14:12.767000
CVE-2025-34064,0,0,eb471144a9811114d1d1834fe8327f3c07a293fa4bbcfab9e78da16542b662d1,2025-07-03T15:14:12.767000
@@ -294095,11 +294109,11 @@ CVE-2025-34079,0,0,e6d733d75639f74da638a863b1673b04916d219d5fe2f30c247d053c7c8a4
CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000
CVE-2025-34080,0,0,7facaa51cd8a6d5555f1a7d11ff6b11423d2fee5e31c80ebe182ad59860e92d0,2025-07-03T15:14:12.767000
CVE-2025-34081,0,0,ad8db7fe69d8caab8acca643e7b73c50072fd91c7954d3079104dc722a9fd721,2025-07-03T15:14:12.767000
-CVE-2025-34082,0,0,1670ba9cfa74676a2283d22c9f7cda9b975de07b237245e06719052dbec6563e,2025-07-03T20:15:22.540000
-CVE-2025-34086,0,0,63705b0c8b4936a2a24a0a561e8e451e50583d97610e9ff17a0b84183a910056,2025-07-03T20:15:22.683000
-CVE-2025-34087,0,0,75d0217902e952c6d57f9cf552da98e96b8205c61532bab6f76e3f952144fc04,2025-07-03T20:15:22.843000
-CVE-2025-34088,0,0,d3d7485a8e6df106033139df049d776dff2827cc47d1643202e17ef8c727474a,2025-07-03T20:15:23.007000
-CVE-2025-34089,0,0,29755bf5a833da4ce28cd7077b8b9466f1215d38a2dccb560eddcfa402b36697,2025-07-03T20:15:23.157000
+CVE-2025-34082,0,1,8e7cdf26e6e4ebac24b58034c5bfe420ca7fb06d0f8699d9db6e67a339390616,2025-07-08T16:19:11.700000
+CVE-2025-34086,0,1,0c0b3cb7a8820f327740a6c325b4e6ca41c271054ec5bc145417360830ed0c7a,2025-07-08T16:19:11.700000
+CVE-2025-34087,0,1,867061decccefb09479870d1f3de9f16db98e82c914dcecfee5a20f6cf1d2aeb,2025-07-08T16:19:11.700000
+CVE-2025-34088,0,1,732aa03615eba0e7d59822a19fe86e19e78666e7be244dc2f0c6a42837bd5a22,2025-07-08T16:19:11.700000
+CVE-2025-34089,0,1,2951ea0a6b1a259ab88aee916e33945abecf9b98e593c40673b95c3b9a723ddc,2025-07-08T16:19:11.700000
CVE-2025-3409,0,0,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000
CVE-2025-34090,0,0,99b025483d49e908b46ca3c0b6df1bcd3eb9785bb16ccf0a289b98bcd9ea5094,2025-07-03T15:13:53.147000
CVE-2025-34091,0,0,80903fb8a73bb14ecdbce066930269d024e03e7b850e9a6f8bfa9891a350a26e,2025-07-03T15:13:53.147000
@@ -294156,8 +294170,8 @@ CVE-2025-3461,0,0,b711842f3138044403b9c62c870e92a946a81dbd27b6e170abe8935ae6232c
CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000
CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000
CVE-2025-3464,0,0,38d4a563f02ab0b6699d61c78e67bf5bbd6f38fb8aef752a88c9119a8e063079,2025-06-17T01:15:22.120000
-CVE-2025-3466,0,0,f9d9c57d7ed9862bb4a0577b8e28a9851a72eb0a03732c310c4cd5ef28e0eac2,2025-07-07T10:15:27.640000
-CVE-2025-3467,0,0,875cfa42033e493d5f366775e6159e85348f40b76af1a31401a252da2c670d12,2025-07-07T10:15:27.793000
+CVE-2025-3466,0,1,fd71134845de5366209c620eb07b549672715bf817cd371674903456205f04df,2025-07-08T16:18:34.923000
+CVE-2025-3467,0,1,5349073db6100cbbc1c3608e70435e01fc4adc130b8797d73e619b0f5fc25e28,2025-07-08T16:18:34.923000
CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
@@ -294295,7 +294309,7 @@ CVE-2025-35995,0,0,a590f4d82a5b6a6ddf49e3e9ff3fcb9f7ad4db6e56f789349ace8583f960e
CVE-2025-35996,0,0,a68f8bf3039aca0fabffa5365ae47dde1016d171f7f66e0132baceb8c4b864b9,2025-05-02T13:52:51.693000
CVE-2025-3600,0,0,47a182aceae637cff18719201ecd7c14c0d0c4582dbca569644569d4f36f4c83,2025-06-25T15:29:14.070000
CVE-2025-36004,0,0,a7606dc7f0db1d2572a7485d0d3bb38993c9f09ef8a130e8809723820465f823,2025-07-03T20:53:35.667000
-CVE-2025-36014,0,0,85b2676a7adfdc4890bc4f824af503ff9f79efc328dff2707d2236582b9ed5d8,2025-07-07T17:15:27.890000
+CVE-2025-36014,0,1,6ec452507c5ba6adc8a7e46beb924a54b1da91a65dd2a0c9e870d8c2d017cf6d,2025-07-08T16:18:34.923000
CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000
CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000
CVE-2025-36026,0,0,af5d1cd39202bd9c522b391511525b9286e9d9645df4651893a8424afeeff6cc,2025-07-01T14:22:26.260000
@@ -294315,7 +294329,7 @@ CVE-2025-3607,0,0,00a61937e6c72150e849325aa06a18ed35736c13546aa89382694e35fbdc72
CVE-2025-3608,0,0,9a5b2a685e23ed54a5b4d9074656a8f2a2ccacace07a3f4ed149936d1bf208f0,2025-05-21T19:48:33.080000
CVE-2025-3609,0,0,70aca4a435588edac6811092b960a9852b2ca7d0874089032dd75bd132c774d9,2025-05-07T14:13:35.980000
CVE-2025-3610,0,0,61c3f9e10cb5c67e4aacd07ec451ffafa8175978740a3ca7853e9c21ac959413,2025-05-07T14:13:35.980000
-CVE-2025-3611,0,0,567723af1d5c57ef8800d4bfb7c5aab7e940a815dadc28bbbf0a01ef5fbf21e7,2025-05-30T16:31:03.107000
+CVE-2025-3611,0,1,af8c03fabc0cb26da4d67c2ffa94c7fe04a3ec72fe85b993092d516946b525af,2025-07-08T17:11:34.797000
CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000
CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000
CVE-2025-3615,0,0,8fdf4606cb6a0284ee0e09827c413ea146851550983dc6357a6b31a17ed36258,2025-04-17T20:21:48.243000
@@ -294328,11 +294342,11 @@ CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac8
CVE-2025-3623,0,0,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000
CVE-2025-3624,0,0,7ed4cd410ce03398fb8e34cfd1d803d6ee7ef277c76293f0adef5df6e973fd9d,2025-05-16T14:42:18.700000
CVE-2025-3625,0,0,4c43dccfb8b4b9a35f3c2ae60e7f1e31e5068a47ae5b8c8372c26fb8bdf705cb,2025-06-24T16:17:15.723000
-CVE-2025-3626,0,0,e6ac371e85d81a280684ada51e305ef917920a139ffe064fa5eb2e1fe5f8e8ed,2025-07-07T10:15:27.967000
+CVE-2025-3626,0,1,38552ea6afacb94b2462064d685cb9d138a62a6f47a800f44f7a9d04926e3b5a,2025-07-08T16:18:34.923000
CVE-2025-3627,0,0,c4ad094052a3d6023e19e3ca7cf702b4f4817bb1e5084b3a895c077f2e88944d,2025-06-24T16:17:23.420000
CVE-2025-3628,0,0,b2ac3aafba07c87de6ae982e897cbd81a37d87151c789a9585a83fdcbb4550a7,2025-06-24T16:19:13.647000
-CVE-2025-3629,0,1,f79acc5ed5af0020df866b165dd88382fefe7614a16d36a604782eb6f874f5b6,2025-07-08T14:26:41.857000
-CVE-2025-3630,1,1,af652ec105fd1ab07ecfdc90e82dde447788912b2b5b8fd7b9195c67c1152761,2025-07-08T15:15:27.560000
+CVE-2025-3629,0,0,f79acc5ed5af0020df866b165dd88382fefe7614a16d36a604782eb6f874f5b6,2025-07-08T14:26:41.857000
+CVE-2025-3630,0,1,82b5a584b29b0075453746beb7bdead5893f7fac4ec947752ea376ff6f046164,2025-07-08T16:18:14.207000
CVE-2025-3632,0,0,f19f1fafda1e9768e733c7ff7f1f2c89c723e8054f7468f6612147b3ffed5f8e,2025-05-12T17:32:32.760000
CVE-2025-3634,0,0,75748b0e88621ecdb18e55787642bdfb70270065b6ddd4c4bed8b733420c2d0f,2025-06-24T16:16:11.150000
CVE-2025-3635,0,0,3f9657a8dfd983e4c7ec83c178e755a2354d10f0d1bb04e131622b8b5e72cd8c,2025-06-24T16:08:36.127000
@@ -294346,6 +294360,7 @@ CVE-2025-3643,0,0,db4a817d5595d43ba13b38bd7e11f9d6c80005bbf9fcf6a2ebaa0c56c29fb2
CVE-2025-3644,0,0,f1d3a2cc0630da2bfe6b911805add87f5ed88ebe821a21e42ba4157464e79869,2025-06-24T15:59:15.037000
CVE-2025-3645,0,0,48c3ac09b5fd5d28e3a4d280d7aad525ec8252d94ae15558d651ddc80792bc56,2025-06-24T15:59:22.560000
CVE-2025-3647,0,0,05feb832de88f59f5d87aaeea08b6a453322dc136553c900a8d76e92e9a2cdb7,2025-06-24T15:59:32.860000
+CVE-2025-3648,1,1,4ba31c3cd166da25886fbfea4019cc1fddc75d40896125b4082e36223b2b1476,2025-07-08T17:15:34.267000
CVE-2025-3649,0,0,df5be861cb9901de2ff346df6053edd181ced31f9d06ef10ebd9788e09b37197,2025-06-05T14:27:28.437000
CVE-2025-36504,0,0,30afeffa7b8ef5e478f29856811f9be90f1ece9e22dbe373c856a36c842492cb,2025-05-08T14:39:09.683000
CVE-2025-36506,0,0,8e1d82c4693df84b708505ea767f870e37a12974d36fbc872c838daf3feb81a6,2025-06-16T12:32:18.840000
@@ -294377,7 +294392,7 @@ CVE-2025-36582,0,0,5f4d0067298c18fcf244c2fe3fe592c01c2b10c9dda1ecf548faf337422b4
CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000
CVE-2025-36593,0,0,57b537520380d08d9dc0bd500d861a81e9059dd73f99ab59be038b060d30e5cc,2025-07-03T15:14:12.767000
CVE-2025-36595,0,0,b7b187e5206ceda5ed8598c137a9a911cd79671eea070c646cfc4cea47d2e09b,2025-06-30T18:38:48.477000
-CVE-2025-36600,1,1,6b933c4166f6c6f367189836251e135c103a0936fe7e1821967bd3b469cdf290,2025-07-08T15:15:27.403000
+CVE-2025-36600,0,1,3975fed32d5a11c055aeec269f403bd7a7d0e1b1ac76b883fa668b24f1c997e1,2025-07-08T16:18:14.207000
CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000
CVE-2025-3662,0,0,3e1dd0745f4aafb27713ee2b3d9daccf1be19770e4b95d3787e2f2ca8d2c3c07,2025-06-05T14:09:58.017000
CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000
@@ -294421,7 +294436,7 @@ CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201
CVE-2025-3699,0,0,d02a1cd04c24f3e630d7aa0838897d4c7fa576fd6ceb0be9ab7fddd90a36396b,2025-06-30T18:38:48.477000
CVE-2025-3702,0,0,6c9d3b4be22efb62cccd37cd7e92146e02fd0e412dcd144b7f19d652d3921939,2025-07-03T15:13:53.147000
CVE-2025-3704,0,0,fa4a3eb7f97cc05cb29111ef6884110e54a213e5cd6aeb5d02530af4ecd14db2,2025-05-28T15:01:30.720000
-CVE-2025-3705,0,0,5d381cd0b2ffbf4873c21c04155361efa046afde7e0ad77cc3c79dfe5f185c39,2025-07-07T10:15:28.133000
+CVE-2025-3705,0,1,f12e50798d4ff5f145c856ecf9ecdbf07366688011acaf939932f5c09169a4d4,2025-07-08T16:18:34.923000
CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000
CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06ec,2025-05-07T16:50:32.967000
CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493c7,2025-05-07T16:50:44.930000
@@ -294525,7 +294540,7 @@ CVE-2025-37766,0,0,7b20a13e8cec563c892476ead16d575857de0070e194be31f8408ede70259
CVE-2025-37767,0,0,6cfb108406975b58d0bfc5e9e409d4b6397489c1f9263746acfbf65636b31444,2025-05-02T13:53:20.943000
CVE-2025-37768,0,0,990673ed1fb392644fd0554511c9e81baf774d1c59dfbb2cc705c8e93fd9a739,2025-05-02T13:53:20.943000
CVE-2025-37769,0,0,31f8816726f0cb7d9fc561749e11f61866264d9740a90f5a23372f1bbcc636d5,2025-05-02T13:53:20.943000
-CVE-2025-3777,0,0,2c4a25b1a83c0297f1f26ece8c7f71039618abf5b7a0fd36686e76e32f4f290a,2025-07-07T10:15:28.297000
+CVE-2025-3777,0,1,52029da4e10629fddfc23d7adf9d9f1985bec0fd7ec757b5a7c90a3cb22e6c40,2025-07-08T16:18:34.923000
CVE-2025-37770,0,0,b7acc6c4d0b48391b6746baae7cdeca2311b8071ac645fb37cfb183ae4243ea0,2025-05-02T13:53:20.943000
CVE-2025-37771,0,0,89ab04b910122c0bcc270e5faf2ad24c0fe4ffc4099557f0d2b18035337bf618,2025-05-02T13:53:20.943000
CVE-2025-37772,0,0,8c5be2ed5cd8d3ea9baceb92b32b128808b5fcd57207f5b56b4515e9be91b7f9,2025-05-02T13:53:20.943000
@@ -294967,76 +294982,76 @@ CVE-2025-38170,0,0,b1c7a8a686598117d579b49c36f9dfc246d7a85968e3d1a72aefa82f6c379
CVE-2025-38171,0,0,f95ca611844b95f0e39fc19384d1f57607907420bdb1ba713608796f09aa12b4,2025-07-03T15:13:53.147000
CVE-2025-38172,0,0,4e4ef42ded411831bccf5529f0771259168b8156cfe0a02454e114ddbe450929,2025-07-03T15:13:53.147000
CVE-2025-38173,0,0,08731523179cb799e2a4113c4ef77bca1b93441f06e50936252e763ad3448f15,2025-07-03T15:13:53.147000
-CVE-2025-38174,0,0,53a3c9dd9ce1ec8953cc61fd4aae35565f1e3a756f2c47cb0e4065d2908e9a78,2025-07-04T11:15:51.283000
-CVE-2025-38175,0,0,5f50123915645cd66f3e27a556e629641b60ee389607f24a58fe01e82d4bc2a4,2025-07-04T11:15:51.420000
-CVE-2025-38176,0,0,1d76865b3abcccf11009f7e60898387d9095aa3651a6c61a1f0472558a222c04,2025-07-04T11:15:51.543000
-CVE-2025-38177,0,0,ce355b67eb26bef076b6442ea21fdee9dec2f5cf3d36e312374ee949d4b76257,2025-07-04T13:15:24.033000
-CVE-2025-38178,0,0,be5499b810171df03cf9a07c4cbd7183911c3b7c6c9e0d76a7d1bcf153c607e9,2025-07-04T14:15:24.233000
-CVE-2025-38179,0,0,e91fc6b85ea6f601d39075c871692cdbfba43b9c5edbc87510dcad1442c425f1,2025-07-04T14:15:24.553000
+CVE-2025-38174,0,1,246a80f4fd0102ed8d515ed83b469f7f9a714fda66b8452989179f812deb3fce,2025-07-08T16:18:53.607000
+CVE-2025-38175,0,1,0c98a2723257fcb0fde0e4e63d21e29a1abea8099954555a843d8921ca25dc95,2025-07-08T16:18:53.607000
+CVE-2025-38176,0,1,bf6ae84f0e33c6c087dab25833a3f8a0044b63dd0dad1bb6bb6ee5518993f484,2025-07-08T16:18:53.607000
+CVE-2025-38177,0,1,324e659abfe98b42afa9f64ef11c237e37de01f5d8fa4c9ba1520bdc6e884fdc,2025-07-08T16:18:53.607000
+CVE-2025-38178,0,1,1fa449799d5dcab84a3b3c2f89f4a07e61b61d54979a6a9350874574bc58c923,2025-07-08T16:18:53.607000
+CVE-2025-38179,0,1,46894433617f9d5ed3b596294ce763abbaaf6b7d662c2d63926d10258d47bacd,2025-07-08T16:18:53.607000
CVE-2025-3818,0,0,3c16ac735bef611f4f7a003d7e8df6e629fdba89dc0e50dd09818ffaf2dc408d,2025-05-29T14:15:36.833000
-CVE-2025-38180,0,0,97264d8d7d4ba8e2d16f12fb41cc5bccd6380cff1253cf06c5c6588456b4a30b,2025-07-04T14:15:24.700000
-CVE-2025-38181,0,0,6e5d98ea7db15121bf63ee0fac0973cfb37fee34d392384fc37ba1e020adaddd,2025-07-04T14:15:24.860000
-CVE-2025-38182,0,0,645dce2b56e79329d9508cc1101b519ea4b0a1319a035763544f88f99dde49d1,2025-07-04T14:15:24.990000
-CVE-2025-38183,0,0,dd70d64a358e8cbf06ba6111ac22d691e6fe5faf4ac64a6d6fec17e38511d2b4,2025-07-04T14:15:25.113000
-CVE-2025-38184,0,0,74d43ff4aeffebc68f080d8c1bcc6fad5985b95f9f104f0ec209f73f927b7a55,2025-07-04T14:15:25.237000
-CVE-2025-38185,0,0,379cded96a7182ec8b6f301fbcbbf036690d54a6d958e2987db368970254de54,2025-07-04T14:15:25.377000
-CVE-2025-38186,0,0,e7f7bb06bde8c3c39bba04fb7d943890284c5dc6fbd8b2e93c2a3282d53beeb3,2025-07-04T14:15:25.520000
-CVE-2025-38187,0,0,5f699f54c3aadc4a96d61a1b3b97a0f876038750bcd748c04d4bd75ab5e0ddb6,2025-07-04T14:15:25.640000
-CVE-2025-38188,0,0,b1ff0967352bc6b75afa90db9ce06254f2ec8251c5fd4cc1a5400d89770c7bdc,2025-07-04T14:15:25.760000
-CVE-2025-38189,0,0,1db4b1c9f42287d13797cb1043d1ab3f1fd82206af0567b8c05387a2febcc4df,2025-07-04T14:15:25.883000
+CVE-2025-38180,0,1,fe634c5f0ecd813b7791afdd16d60865cb5214e67b6ab2e36249fd891569fa56,2025-07-08T16:18:53.607000
+CVE-2025-38181,0,1,293b336da1ecd975e93e4506e937b6d130744fdff93ee9d2076fccb562ca5c6e,2025-07-08T16:18:53.607000
+CVE-2025-38182,0,1,a8337b1d15be0649c36cc50aa3f7d160aec8a334e6d2a584ceb73c805089c84c,2025-07-08T16:18:53.607000
+CVE-2025-38183,0,1,209dec690d1c24d12d783a08dd2b586d79605c3327577cd81894e8809fec3f58,2025-07-08T16:18:53.607000
+CVE-2025-38184,0,1,9486dc91a936451ef9446f6f57787699373a922207ecbbb1ceb4f005cb018e6e,2025-07-08T16:18:53.607000
+CVE-2025-38185,0,1,5ab962693076bb5e71f6c687ebe4f6f2df4b4c487dcdbe699b9a2ade865060a6,2025-07-08T16:18:53.607000
+CVE-2025-38186,0,1,4a75019ec50405c64167f08132e59bca7e0349674b32aa03c7fdb66283f647bd,2025-07-08T16:18:53.607000
+CVE-2025-38187,0,1,197d8c50f26ac2aa9607f457ad93416e24754268ce4c69f25bb9fe1d898be0fb,2025-07-08T16:18:53.607000
+CVE-2025-38188,0,1,d8e6ffb75ad0982fb09a5eae09c33fc20fc2ca56ef448ed9a91b04a7b93b7a3a,2025-07-08T16:18:53.607000
+CVE-2025-38189,0,1,7edb5cec31b1926d592575636e0b5962e378a1784a5cf4ff6d77e3cce18ec456,2025-07-08T16:18:53.607000
CVE-2025-3819,0,0,316fcf62ccd5dbea2c470e70addfcde222849a1bd463811716c3a6eeedb126a1,2025-05-14T13:23:57.713000
-CVE-2025-38190,0,0,bef8b6fbe6a883d68db774c773c26d63eb3f2244166f97e4befcee7da1cb29d0,2025-07-04T14:15:26.017000
-CVE-2025-38191,0,0,e58bbb55f0b3a71c5cb4ed4c62edd220873100a4fbab909266764b840b05a181,2025-07-04T14:15:26.157000
-CVE-2025-38192,0,0,722265ba50c1b743fd6728bd2f1703c2c6d1128a46008de366508ad678002e64,2025-07-04T14:15:26.280000
-CVE-2025-38193,0,0,c67ffcb4e86419b8e2bf850baf78c3511d81644cbf63930238760e9e37a936b6,2025-07-04T14:15:26.403000
-CVE-2025-38194,0,0,e527df85298929753a0c85c707e774e40037b666e9932783550aa16d9543c6f6,2025-07-04T14:15:26.530000
-CVE-2025-38195,0,0,e795b61752b1a3c381805c356fe9af0166f1292e2a0211a5ca107e8d10b6ac9b,2025-07-04T14:15:26.667000
-CVE-2025-38196,0,0,c7b6eaef9ceb13c190ea508c5fe76c1023a684fa25666921939f76f5fe075eee,2025-07-04T14:15:26.787000
-CVE-2025-38197,0,0,b02a4689483128a59c73468472e6e8ae70d23525c19d6b646019be857c621bc1,2025-07-04T14:15:26.913000
-CVE-2025-38198,0,0,9146c4f3d61aa5d5d923ad61379718e2f1768cbc139238828111576e3d001491,2025-07-04T14:15:27.040000
-CVE-2025-38199,0,0,cd6e3edf1524a93e5b3f1d2c0f81cd12c6ef88fc4714a7f06d80e245635767e1,2025-07-04T14:15:27.707000
+CVE-2025-38190,0,1,a1f891892c30a0be68afa1e572b6734f0b60b9e66cbfe5c8b60f6f8fe53cae50,2025-07-08T16:18:53.607000
+CVE-2025-38191,0,1,0f19d7d6130254ba96a36c049509c58754845ac78a321d5020305498ad4273f8,2025-07-08T16:18:53.607000
+CVE-2025-38192,0,1,c5ed72cfb6d3bdf096d071e0e28533f6561742edefb242b102c23df27cef2ad3,2025-07-08T16:18:53.607000
+CVE-2025-38193,0,1,b31253426b6b7d5a9bb693f7b12733a078dd216aeea8c601a5e9e00d85307630,2025-07-08T16:18:53.607000
+CVE-2025-38194,0,1,87ea31550ca9023e7063339d288859ac382e01915ea4cb966ece686798a3e8e7,2025-07-08T16:18:53.607000
+CVE-2025-38195,0,1,4a69053bec24fbc14d8296632da8ad15bcef70ba20615cd5668b50ff43a59404,2025-07-08T16:18:53.607000
+CVE-2025-38196,0,1,caf90d8d2bb363ab095765f9fd6d08e901fa62b07001de6a92a8ec0f6ba3d9a8,2025-07-08T16:18:53.607000
+CVE-2025-38197,0,1,6bf996ac2d59ca60bd2d42992f5ccf68f3c7a3823cbfc736a0482bffc6109de9,2025-07-08T16:18:53.607000
+CVE-2025-38198,0,1,cc055fedd94c2f7c35c4fec224b8526426467e67a3ee84091632e4cf0d2136b7,2025-07-08T16:18:53.607000
+CVE-2025-38199,0,1,119f82522b095365365ba281f9dfd59ea37f501cbea35617543fe0d1477f10ac,2025-07-08T16:18:53.607000
CVE-2025-3820,0,0,34e78ee07c727e4b7e6e73a0185d4c76251684a3fdeed8adc4204415923e2fbd,2025-04-21T14:23:45.950000
-CVE-2025-38200,0,0,1887b6471f5bbc34945f09bcdc69d22a113df8c6aea6a706b0a6cdd524d3397f,2025-07-04T14:15:27.877000
-CVE-2025-38201,0,0,35b6a501a4bf8e7a55552f0bdf7ab923a289e697ab7f390b47eb5ecdd1328518,2025-07-04T14:15:28
-CVE-2025-38202,0,0,22be81bf1dee15e2876171885bcb56452ff813db32fbe51822eecc652860e825,2025-07-04T14:15:28.117000
-CVE-2025-38203,0,0,11b7c6356a70cadd2c736a11cadc02458d3f4fe5e14a5d47ce14685a01256539,2025-07-04T14:15:28.247000
-CVE-2025-38204,0,0,edb76c4a8a61e323e569966e7609a7674fcc868cc33a4c3686eed3832d01614a,2025-07-04T14:15:28.383000
-CVE-2025-38205,0,0,228c6e8ea1a896634b141ad8a5013c5fbde9b5920667a804707d18c947ac0284,2025-07-04T14:15:28.540000
-CVE-2025-38206,0,0,d04c3e2e2ba4dd24197df4037c9aa2f7fbb51cd1acfa0e5ddd01e6c2dba1c34d,2025-07-04T14:15:28.703000
-CVE-2025-38207,0,0,cde6353b96e41d064d0e742eee3a654f014e522cf7963284ceb8e0bb2b39c903,2025-07-04T14:15:28.823000
-CVE-2025-38208,0,0,56445b0b177e92b0822355fccacaefbdbf290cac6a92b931975f01d0a984b6e1,2025-07-04T14:15:28.950000
-CVE-2025-38209,0,0,0087e645fb3be16c85cb3825cd07573131c3c2032f75fc5d4e498d37f67d718c,2025-07-04T14:15:29.080000
+CVE-2025-38200,0,1,c1317c1b3e29433b8481027ffcd49f75eb3555e39a5e0446c1dfe14abcc62ade,2025-07-08T16:18:53.607000
+CVE-2025-38201,0,1,9b6178b1950fa65c8127b8ea481bbeeeecb691a04d792152f816042d6b52d8c6,2025-07-08T16:18:53.607000
+CVE-2025-38202,0,1,e0af089c28eff8ca17edd68410b7524dc7982ff9cf055f18be77b63c66ce0981,2025-07-08T16:18:53.607000
+CVE-2025-38203,0,1,c70e2ae63bcf06c52d9f38e981307bfea97b7352e7978ce5ab6eace66b60cf67,2025-07-08T16:18:53.607000
+CVE-2025-38204,0,1,c21e0530cd40b9c5fbc10f7b135e0dd5bd9664ff01e23dec4bf137600e61722a,2025-07-08T16:18:53.607000
+CVE-2025-38205,0,1,b56f0b94e7feb444d182a7b38fae290063fdf621dea13cf15454e3a3c5a7e1f8,2025-07-08T16:18:53.607000
+CVE-2025-38206,0,1,836461aa5d2cf8c9e67e651c806e9d5c0e778e90304996b49c310027bf89d503,2025-07-08T16:18:53.607000
+CVE-2025-38207,0,1,5f1b51196246cbab369a3a8a54ee233f9ed27949ba87301a6a24359bc81e05e8,2025-07-08T16:18:53.607000
+CVE-2025-38208,0,1,233e88fd63dc88bc7509dd27ac9a0bdbfcb2f10f96132a926ba0b4de8701ca82,2025-07-08T16:18:53.607000
+CVE-2025-38209,0,1,1ae4c6ded80ab4535042459ec31a78119cfb48c08888bcc188e593b767cc5694,2025-07-08T16:18:53.607000
CVE-2025-3821,0,0,3699df16ba4e38d23bcfa11d0ecd5e203afe55655765d9ea2321ebbc5147167b,2025-04-24T15:43:30.220000
-CVE-2025-38210,0,0,40a0e2ecd85b8c02de8a0f89f65a359e8f5d5f0b9c0e0419c98231e298b59b52,2025-07-04T14:15:29.207000
-CVE-2025-38211,0,0,0f62c3e6002d17ba2dc03a63b5e15cbf9f625db1f839db8950af5570627495c0,2025-07-04T14:15:29.337000
-CVE-2025-38212,0,0,54609e55dc2912bd146e01f6c79e915886ab67b5a017b56c6ad8ea8de06fdccd,2025-07-04T14:15:29.473000
-CVE-2025-38213,0,0,df8f353ec5a00156ab9a2fff1ddf4355060d97b15733bf7934acb28f53ce430c,2025-07-04T14:15:29.710000
-CVE-2025-38214,0,0,da7d94bacf49b6f2a242a8d7da5c5e70c9e35c7a13df56cc2dff77c086ae7af9,2025-07-04T14:15:29.843000
-CVE-2025-38215,0,0,0e58ff76b607a9d4ca48bbb6393c7e5336591d44aa6a81531bb7e2a7149ce112,2025-07-06T10:15:23.897000
-CVE-2025-38216,0,0,f13be5f0b2e0003ddeefc8fae8bd67fbf64051d6a0ee007d86f77f0d8212f13c,2025-07-04T14:15:30.103000
-CVE-2025-38217,0,0,e332d143e1bc78df14c9ebc5cffbcb67ed760be175ff68c893ab27ee217f74ba,2025-07-04T14:15:30.227000
-CVE-2025-38218,0,0,14196dcf58cd11b0eda2f115b7eaa6b85a0ae0ea5230988c9e93b2f968cf34f9,2025-07-04T14:15:30.353000
-CVE-2025-38219,0,0,aed5ee7381f26a0130b284c096a67a36e82ef7934250662d564ece39bcc62a9a,2025-07-04T14:15:30.473000
+CVE-2025-38210,0,1,f8e6f76ec95fe84fd4b36797c4507223699bdb02b38002904c7745a4eb605cbc,2025-07-08T16:18:53.607000
+CVE-2025-38211,0,1,2b3bbc9b45abcdaf48852d2eeb083683847484b7a33da22fc7e1b13fea472677,2025-07-08T16:18:53.607000
+CVE-2025-38212,0,1,a56719e8361de446d09851d2e3e9d1c571cab1cbe64b7bb17e45ba80ccd7893d,2025-07-08T16:18:53.607000
+CVE-2025-38213,0,1,441bc698f9048d499ef3005fd7ef5012b23bbabc7568bba738c259d52a5e7f5c,2025-07-08T16:18:53.607000
+CVE-2025-38214,0,1,af0406b224428c13078794bd63c0594794d40b2603750dd2a4faf94488309a3e,2025-07-08T16:18:53.607000
+CVE-2025-38215,0,1,42ec05dbbb11e8188d6541f3ffc92faf6d5934b8e11073b92d5e5164b1e953b5,2025-07-08T16:18:53.607000
+CVE-2025-38216,0,1,13c662099fb07b1f0fd703bca39e8f9c5b4607dd7539a8058a9aaacf737eeb42,2025-07-08T16:18:53.607000
+CVE-2025-38217,0,1,5ef6fa13112234e979675013fb1c8d015624b4ae73a6e0627ea2b848c0b6508b,2025-07-08T16:18:53.607000
+CVE-2025-38218,0,1,6595aae4f41eb5f2354b6642ead76a9139edfa514633a0237ab5a17be4242e0d,2025-07-08T16:18:53.607000
+CVE-2025-38219,0,1,15c1a4974cba1bd74d82550b2e997ab25b64d29dacecb6b417e1dba9487f088a,2025-07-08T16:18:53.607000
CVE-2025-3822,0,0,7790a01e24287d8b249506db0d133ebb2d3ce7360cb94da0889d65e764ec0507,2025-04-24T15:40:04.663000
-CVE-2025-38220,0,0,e6764701e6f59933b569148c0921b4d38642cd6cbe906bc0489af4c26ee95eac,2025-07-04T14:15:30.597000
-CVE-2025-38221,0,0,aae650f3072a94fbd5846395ec7469cb0255ed121318a4eeb949d739bb98bce8,2025-07-04T14:15:30.723000
-CVE-2025-38222,0,0,814bf08005a96ef6825f9c4e0686a123814f55dca64dcf5f5c984fe5a893247f,2025-07-04T14:15:30.850000
-CVE-2025-38223,0,0,043d16b61d1467b29b84defdca890f91a604a326362a721bdb0fcec6a52ea9f2,2025-07-04T14:15:30.987000
-CVE-2025-38224,0,0,a5e73c28c76ed93e3d4986d5a8ed1538bcc5cb3e8241b1666496bc78bb999ca6,2025-07-04T14:15:31.110000
-CVE-2025-38225,0,0,ea8f0bafa11a6154287cff2dfd4ead2224c96801ee547c02145c5f104c586ddd,2025-07-06T10:15:24.010000
-CVE-2025-38226,0,0,b0590a19664c34e49bc85552383cf0465fd8d272423cc51c69d14e55ce3ebb97,2025-07-04T14:15:31.367000
-CVE-2025-38227,0,0,86b8f3380e72adcb247b4b389d036a991474aa6fb0b897882f7d344dfaa72843,2025-07-04T14:15:32.153000
-CVE-2025-38228,0,0,1c6e392629d50da71bc3ff1e44f01ed1ab4ec6be5edf1dd45457fff759f54bf5,2025-07-04T14:15:32.290000
-CVE-2025-38229,0,0,4f6f33a13f63bcb33b8777003a240ac6067a1a3e3bcbe1784fa4da76d7f89c16,2025-07-04T14:15:32.410000
+CVE-2025-38220,0,1,c18d8c38d1efe6a20bc1c2a0645d8a06f83b1cec3a115f0b8e6ee54ec683a4e3,2025-07-08T16:18:53.607000
+CVE-2025-38221,0,1,5f4d704413999b0bd675b820002141e54cc70900e7072ee76527b02113c929eb,2025-07-08T16:18:53.607000
+CVE-2025-38222,0,1,a8453638a258803458351d3888902d1840f97b074c669f343ecc044388ba838c,2025-07-08T16:18:53.607000
+CVE-2025-38223,0,1,cf810c902bd7e12daaf08176ecf92e17f68f5e9ebe1f2e61fc50a00275c83cd4,2025-07-08T16:18:53.607000
+CVE-2025-38224,0,1,a726db11f6219634d58edc4e87e84436bd1fbfbc4d3841542fb34dacfc7fcda5,2025-07-08T16:18:53.607000
+CVE-2025-38225,0,1,c1f7f1767d7030bc3346a6a14e66203a4a8779cf1067d1c19aab0461032f71df,2025-07-08T16:18:53.607000
+CVE-2025-38226,0,1,21352a5760844c5b0a544df6649fd8cb582972f7483df17a7676ac81abc2bdd6,2025-07-08T16:18:53.607000
+CVE-2025-38227,0,1,1b6f21e7eb0ffd85d3131bb9462115540df1d0291cd72d7a749ffb2fb7dd48e8,2025-07-08T16:18:53.607000
+CVE-2025-38228,0,1,9f7506b2814022bec341d1c063a49aba59914fb1b3d9e8ce93b1f180adeceff5,2025-07-08T16:18:53.607000
+CVE-2025-38229,0,1,4f3f6eb924c476290b16f4ff1f58014b9d4b70109652b86fe8e0df547f3d4c10,2025-07-08T16:18:53.607000
CVE-2025-3823,0,0,f978abbb7fa2709632f1f6fe745ffcaa6b81e025b2c8e5749491f7b8db352dc6,2025-04-30T17:38:51.467000
-CVE-2025-38230,0,0,06736ff7a1f8a8fb03e45bce86f6083abee797ef90289e73609771babc1ef2bf,2025-07-06T10:15:24.120000
-CVE-2025-38231,0,0,c951206a630c3cacf3c4fc38390ddd21f4e289b76ecb9d793e849ca52168b708,2025-07-04T14:15:32.683000
-CVE-2025-38232,0,0,b446111677a15eef3d5a51e04c9eea515113cb574d43b2169fb423609b26ee44,2025-07-04T14:15:32.810000
-CVE-2025-38233,0,0,afdffe290ca80c9a789387ca12cd1e81c7c6ebe83b7e4cb392ce6d0adb1e21f3,2025-07-04T14:15:32.953000
-CVE-2025-38234,0,0,829e151d3722969e4296c72d092f8f462985b592d44984b22f3bb0cb4dc82826,2025-07-04T14:15:33.087000
-CVE-2025-38235,0,0,f3e80fec81abd1d9c6da9c43d940d2c9d7a711fdf26936c795b18d8745a748ba,2025-07-06T10:15:24.223000
-CVE-2025-38236,0,0,430bad2b76f229ac74304fc05a367abc6d3a4056ae7fa26638c2f9cc9e7eed79,2025-07-08T08:15:20.960000
-CVE-2025-38237,0,0,e1edc35ce9d35aa4c0d1e8bd642af5307f7433ad1bbca00ee5c1b3f444aa5053,2025-07-08T08:15:21.870000
+CVE-2025-38230,0,1,503be28483a37551b7bfecb54162bd07ee4f94d965a10eb1adad88b605a069c6,2025-07-08T16:18:53.607000
+CVE-2025-38231,0,1,6f3eaf34b9ccca640f70850aebcac065baa9a81b973489452eb28367751c0357,2025-07-08T16:18:53.607000
+CVE-2025-38232,0,1,b59c5c4de98f460491c42b2561273f52f1c5b558aa0592fecd60c98ce0fd88ba,2025-07-08T16:18:53.607000
+CVE-2025-38233,0,1,aba5ba6fb83069ec7292f30a022276b783b700914b8006071fd7b3b1544efa79,2025-07-08T16:18:53.607000
+CVE-2025-38234,0,1,7801cd6daadf896b034b55772ae192aff2623e5097c77279aba0275b578ed8f4,2025-07-08T16:18:53.607000
+CVE-2025-38235,0,1,59873f035daa0e680ba496a3e232026e89dce464be5b4ba966b2d6abbb44f108,2025-07-08T16:18:34.923000
+CVE-2025-38236,0,1,b4520de60ae95f48e5da3e404c8337bbe168cced88a3271312e49d824e416da0,2025-07-08T16:18:14.207000
+CVE-2025-38237,0,1,3fdb0a5b39477f2910150e2e191c0d515db3c8030bb3e6ce688865dd74daa358,2025-07-08T16:18:14.207000
CVE-2025-3824,0,0,4042020909e5223dbce6d2958e1aacca8166710222023563345f997e50394c09,2025-04-30T17:36:04.970000
CVE-2025-38240,0,0,117d76f4b128d7e0799c3952cf9e021270b3a89841576592d72d8a875350efe5,2025-04-21T14:23:45.950000
CVE-2025-3825,0,0,f32d1d72467b4949b7a1ca6e34d7286cd27354f39fac3d30ab70022243e0cd52,2025-04-30T17:33:52.383000
@@ -295131,7 +295146,7 @@ CVE-2025-3916,0,0,045ece3601bd5ccbedc31ea0240de6aa0afd0b9d1478dcdfa2e80b8a58fde7
CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000
CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000
CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000
-CVE-2025-3920,0,0,31c433673f0c0524a4643f80060a30fb3eb7a739da1bf0a4b8e4f7d0512fbf46,2025-07-07T09:15:26.587000
+CVE-2025-3920,0,1,7ac7e1679abd882236bc382222da327901f79aaf5f724694ab7db03cdfe4b24d,2025-07-08T16:18:34.923000
CVE-2025-39201,0,0,ac494421fef95e7246be675844d0567c84bbd09125124991a997be6495bbeb5a,2025-06-26T18:58:14.280000
CVE-2025-39202,0,0,e4a1b79ce1102dbd814273d9c11f72b989b247a4b565087c308a3675cabe0e1b,2025-06-26T18:58:14.280000
CVE-2025-39203,0,0,c8c71b1662e8236b6c8f7605df9f1ed02dd5c9c88a46d156bc91dee5c5d83d9f,2025-06-26T18:58:14.280000
@@ -295289,7 +295304,7 @@ CVE-2025-39481,0,0,ffc38075b9c9e137d0a9f220b07f654268d9b6b192ff077aaa96738d747f3
CVE-2025-39482,0,0,f44ca390a511cc4fa9864ad222a12fd65c81c88e214777e055d5294de44cc742,2025-06-06T21:54:00.823000
CVE-2025-39485,0,0,70335b3403cfdaaf341612abdd2f1cd24b67724d9af1078263285d5edb296bf1,2025-05-23T15:54:42.643000
CVE-2025-39486,0,0,a8678a386a3e73b719defe3b7be5928e9b61c25832c712379ec5f04f83eccc71,2025-06-17T20:50:23.507000
-CVE-2025-39487,0,0,061fbb607f28d5a0bb8e103f5d48bb8717076e158984d2e348743368d7e0f4f5,2025-07-04T12:15:28.353000
+CVE-2025-39487,0,1,42264e5ab7ceab31101d5c66aa08c900a4f1637c6e654386069489c6dd3f8020,2025-07-08T16:18:53.607000
CVE-2025-39488,0,0,632999481930c08854f29c3aac16c1691ab347c034a3ff2179fc0cb8b58cda1c,2025-06-30T18:38:48.477000
CVE-2025-39489,0,0,b80eceb8e17f53f167eb1f01a46351e47168a0eeeb436f1c1624f43d9e9a40e7,2025-05-23T15:54:42.643000
CVE-2025-3949,0,0,168e2abe66849b76f108d2275699dc7aa3f34d482497d50c4cedde8b889e7a83,2025-05-12T17:32:32.760000
@@ -295532,7 +295547,7 @@ CVE-2025-40585,0,0,cc49595cf918d38ac5ca973b9f62b22af94b8b980f73beef0c7038a55a139
CVE-2025-4059,0,0,aaceabed3f9504437b5acc8d70c6023c40c2f0a56aba5d8e6d1c9f7eecdc635a,2025-05-15T20:45:28.467000
CVE-2025-40591,0,0,287b7cab1fd76e8adb3aa980b49a631f0bc9062780824cad9dd2f0ff13f69e79,2025-06-12T16:06:39.330000
CVE-2025-40592,0,0,d167b00de1483c951fe43cc552b62b49543eff58159af12bb6823a6122401016,2025-07-08T11:15:29.330000
-CVE-2025-40593,0,0,e51b040a7af17b3f5051f28ce8918891c3b06a5db9c4628dfadec9cee61bafac,2025-07-08T11:15:29.473000
+CVE-2025-40593,0,1,fc05c6a5fd94f322d4859899df3496875992167f41cb7914cff600ee12352a27,2025-07-08T16:18:14.207000
CVE-2025-40595,0,0,e8883618ba87c7020b44e8c6f164b0155ef7e7a3cf9c54a337a593438f28d611,2025-05-16T14:43:56.797000
CVE-2025-4060,0,0,170985bf8f2f8cc428b363944749e5a7390ec03c3ff9ebf1391dace27bffb441,2025-05-09T19:34:16.987000
CVE-2025-4061,0,0,38d10b753ff5d559244af6fd3081a54533e11210e5e1217338182a3bb0bb72be,2025-05-09T19:34:08.123000
@@ -295594,18 +295609,18 @@ CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f
CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000
CVE-2025-4071,0,0,68547b4133937980d039f29a0abcfa60e8d56aeeed72b73dfe6880158fc5f6a5,2025-05-09T13:51:10.523000
CVE-2025-40710,0,0,42ad010adfdc6c00aa1fadf7d62248a714015e44a741236875ef2f26ab43f4c0,2025-06-30T18:38:23.493000
-CVE-2025-40711,0,0,4e784c266fcdce3ba998ecb1c4f9a703a291e4daf2c5172cb653a6e3830a804a,2025-07-08T12:15:21.347000
-CVE-2025-40712,0,0,6d46810daf75a28f4d134e07db40a360e237f3390441df7d888132a52f34cd23,2025-07-08T12:15:22.080000
-CVE-2025-40713,0,0,a1c56b4a57257debb1a85f2e0095db64f29f9eb7c8acc0ceff012223217a1bda,2025-07-08T12:15:22.230000
-CVE-2025-40714,0,0,5061163222fc780d448a14e3125daa0ba6cc58aa10d552b14a76b33fc4943c51,2025-07-08T12:15:22.367000
-CVE-2025-40715,0,0,fc8b4667f192b86a60e2d19e708c06701e7b90cad323d1734a8f2db900284ec6,2025-07-08T12:15:22.513000
-CVE-2025-40716,0,0,fcb56a508ab3c22dc332fee9a2cb0da226dab4b0c6e4f044508fbd8737e6d86f,2025-07-08T12:15:22.660000
-CVE-2025-40717,0,0,d8bcfb6dc23de144b89df6b3452e147b4c497638ec537f7cc31e09db46d1c529,2025-07-08T12:15:22.803000
-CVE-2025-40718,0,0,9e275456ba5b86dd5be704d4b1893216e81724da8238e05a52779e7d286602b7,2025-07-08T12:15:22.947000
-CVE-2025-40719,0,0,4adc68f72a8333e8dc8b7b84c6e748e13b8267aee28710d098134b0405729389,2025-07-08T12:15:23.090000
+CVE-2025-40711,0,1,39c4359a8c28d3a61d9baaee9e6ac1ea0db713553c2b24e963470ce4d808ef74,2025-07-08T16:18:14.207000
+CVE-2025-40712,0,1,a9cda378b0f11fe65f63d39c3c3d3105a9e1c339e687d2d05d09ff9707c8afa9,2025-07-08T16:18:14.207000
+CVE-2025-40713,0,1,f9d32c15c8199f1b02cf7522e459f7acfc254edb192a546d68f713c25c9a3893,2025-07-08T16:18:14.207000
+CVE-2025-40714,0,1,e4dab7f1f76a77492153a4ad93eb2a6c7a8c6664b7b4fe9d6f28e1a9afd6e410,2025-07-08T16:18:14.207000
+CVE-2025-40715,0,1,ba91d38b0f72ec88324382f639458a149bc2078d5105a4716eabdb910d1799fa,2025-07-08T16:18:14.207000
+CVE-2025-40716,0,1,390da8bf54f50553871c8a5db9913439fa58ff184c4d4d1ac9dbeae956600fc5,2025-07-08T16:18:14.207000
+CVE-2025-40717,0,1,e6602718c2d992a6b51319af09688512332895b40c15288e936680f87b305ec5,2025-07-08T16:18:14.207000
+CVE-2025-40718,0,1,d3db88d54aabb3316fab81e05469babd1fff36f2eb33c48b0c951e306cc0d26e,2025-07-08T16:18:14.207000
+CVE-2025-40719,0,1,8ee705766bd7841a433d833aa5eecf6f0876235783e84e3ee1d08dcb8d8984c6,2025-07-08T16:18:14.207000
CVE-2025-4072,0,0,d0cf8b7d2285b873c553b1cc40373ece79b00a96b5dd7782b5277899efb2c1fa,2025-05-09T13:51:19.130000
-CVE-2025-40720,0,0,0971a7ffbac2c3d6bca062b1519075074f23efc0eb6b963e66e564764427d282,2025-07-08T12:15:23.243000
-CVE-2025-40721,0,0,98431672c376c499c4d08092a49b21368ac7d9094a25fcbe2ad6c0b0857f64cc,2025-07-08T12:15:23.397000
+CVE-2025-40720,0,1,329a06c681a1a0094a4b1952c0066ae67978841711dde55074ad8c7f52919ffc,2025-07-08T16:18:14.207000
+CVE-2025-40721,0,1,b4834b00fd78c4fd91ba15d5651cec47252272309d88f70bd0eacf64394f7c99,2025-07-08T16:18:14.207000
CVE-2025-40722,0,0,17ae0215841c8df3ad9ac86bb8c62178f60c57c488f5f1f3135b4c4a97dd3f84,2025-07-03T15:13:53.147000
CVE-2025-40723,0,0,cc3ab78e91720ad7ee5fde7952f5be8c0f6c096808873b067f78944aa088ee0d,2025-07-03T15:13:53.147000
CVE-2025-40726,0,0,06973151ee6645a9d84113341fb6a06b6153e8d65c35cf71d204b0fa7561f372,2025-06-16T12:32:18.840000
@@ -295617,15 +295632,15 @@ CVE-2025-40731,0,0,d60c62e1efb95e2b565ba5cdd1823438090fcfa4d190527ad179b2ff07ef2
CVE-2025-40732,0,0,b700ef468ef5143eab1a98a8a5ac6a7d7624ae511e2f8f3e0dea04d0ebabeee8,2025-07-07T19:38:33.170000
CVE-2025-40733,0,0,264813c2043b96d454598a2961a40f1f771ab5e11dbf8f475c01110001a3b9d3,2025-07-07T18:18:08.400000
CVE-2025-40734,0,0,dd1cf6ad7ae73b91f6e1567d2c837c143f88fe605c960391f2b618e852f997b8,2025-07-07T18:17:48.017000
-CVE-2025-40735,0,0,4ab576df561a2045516e507c1b5476121885a79d996c207b8f8cf980a16c1ac0,2025-07-08T11:15:29.657000
-CVE-2025-40736,0,0,1e411489e1a21a4a6bfe03c4aa43cdefa23a76d415b8257bf7b1194d1883175f,2025-07-08T11:15:29.837000
-CVE-2025-40737,0,0,ab7a48c790db43fea70864b81d60407b90cb4595b7259c8f4b3db5c25a8c230c,2025-07-08T11:15:30.007000
-CVE-2025-40738,0,0,027bbc273e0ffbe7b990afbf224a9a2edca5025a549dbffc00b0aaa91a71863b,2025-07-08T11:15:30.190000
-CVE-2025-40739,0,0,86e715337b2fffa5a0946f5560d31b5f46754524478a37541f320675cb6c0dce,2025-07-08T11:15:30.380000
+CVE-2025-40735,0,1,9680276ec1ba3c819f5186edd72f8128818c9cc2b6e47414dc981d9f9f6f6c0b,2025-07-08T16:18:14.207000
+CVE-2025-40736,0,1,b14ef8a95a8aaeaf7a63fafd593ceeb42961b3224890394ce05399505b7ee596,2025-07-08T16:18:14.207000
+CVE-2025-40737,0,1,69246b1123889f9a714aee561239c61f2abba4d4478f91407da7f8acc43aea62,2025-07-08T16:18:14.207000
+CVE-2025-40738,0,1,e9c36af6d0002b6f42b9271c8b7bcb553f4d743e588fd31f76503293bbf45f70,2025-07-08T16:18:14.207000
+CVE-2025-40739,0,1,abccc513ce8a4d0cd98ec1c621e3e06246c1e1aebc1cf9669149dba4d833ca7d,2025-07-08T16:18:14.207000
CVE-2025-4074,0,0,67c949a36ba05d695588494a1af59c90dcd6f218e799b578e62cc10508e92154,2025-05-09T13:49:25.337000
-CVE-2025-40740,0,0,ebe91ae840e094d087a6b5a8cf8f95a6f1b616ab1ca898d06ab0997153a17f4c,2025-07-08T11:15:30.560000
-CVE-2025-40741,0,0,971ad7caa457466209b0f23784636cc2c28eedd3f60ab31981cc70afb6c0a7f1,2025-07-08T11:15:30.747000
-CVE-2025-40742,0,0,57cf3ff9363cffedbd3fdca7c5121d75efcb0692ba65b22acd0b165e1ffc2034,2025-07-08T11:15:30.923000
+CVE-2025-40740,0,1,55c3d4e8f18912243de786c74d24a9c20b6ff00d615cdb31dd0f3742afb756ba,2025-07-08T16:18:14.207000
+CVE-2025-40741,0,1,6901a98589973714c99cf858d336266cd262d0525e9da479abe8c4bd4b55eba9,2025-07-08T16:18:14.207000
+CVE-2025-40742,0,1,f32748bbecead2efd60880c69a95dcf3cf9ca99b2a15bb401ccdd947bc4f1a22,2025-07-08T16:18:14.207000
CVE-2025-4075,0,0,980439803ac2a564a1211ca7907d1f8cd24fb9992986c85d77b9d15e9738b3a9,2025-05-02T13:53:40.163000
CVE-2025-4076,0,0,15e359152ac3968e95f76736d18611ed85f132cae7da09b8e96a2ab1cfc7b92d,2025-05-02T13:53:40.163000
CVE-2025-4077,0,0,8079a7498d68430e78a72c093e01ac09f17f033b46e97453ab1f898650cf61ff,2025-05-14T20:12:06.770000
@@ -295684,9 +295699,9 @@ CVE-2025-4119,0,0,e22a40d4a6bba430436ed5cd521d95b9290408de98448e267ea5b0ff1d02e2
CVE-2025-4120,0,0,91a7986356ace02b1faadbef66f401c0debf895af76ae678f57790666062b352,2025-05-13T20:28:48.900000
CVE-2025-4121,0,0,7e5016f57db0166b2ed895f4d1dbfeb1645406dfaf0cae2948f2a256c69377c3,2025-05-13T20:28:09.793000
CVE-2025-4122,0,0,b6ca4452ee292421b2c21021a76be5367aa41cfbabca448a9baeb52d919cf372,2025-05-12T19:43:56.157000
-CVE-2025-41222,0,0,738466ae450d43dcf79524b7c682479f01350dd58e3b6cc054165b80b6ad3891,2025-07-08T11:15:31.117000
-CVE-2025-41223,0,0,4c9cef3608318e54ef56fb7a699b3187c36056c726ec913392d7588703cf45b6,2025-07-08T11:15:31.327000
-CVE-2025-41224,0,0,1a8abb704cab998fd7157646b7cd9b5d6ed39478873dea8d8f6c3ea8d79cfaa3,2025-07-08T11:15:31.527000
+CVE-2025-41222,0,1,d468dbddff65d62a31d3bc57bd5449ee6bb1f7118020064512dfd5f7a6ad27f6,2025-07-08T16:18:14.207000
+CVE-2025-41223,0,1,1404aeb7b7fce872f31a83831f32e0fb7b59c0cf5c7de1c719018ac3b1511138,2025-07-08T16:18:14.207000
+CVE-2025-41224,0,1,fa90844cc5a82f66e4f3f1b2af08bf485fea3338e778a995fb7861d1fdf9da59,2025-07-08T16:18:14.207000
CVE-2025-41225,0,0,ffc98f9dcad9846a3a108fe3a7132a69bd7a2a6d0a3c8f34ab76d93d3bf08419,2025-05-21T20:25:16.407000
CVE-2025-41226,0,0,ca4cc48cca0502f2bc408b79a88ab6d132173955f1ef39e82ca47faffba98e58,2025-05-21T20:25:16.407000
CVE-2025-41227,0,0,4080075a62ea151bef0a098041eb959f6a8703afeba9690ae542cedf1c853291,2025-05-21T20:25:16.407000
@@ -295793,11 +295808,11 @@ CVE-2025-4166,0,0,5bfebbee34c2356ee039434bb4ac7a8705ff7fab6fe8d313f7df39c4661cee
CVE-2025-41661,0,0,79dfa817986795435d6c654e1eede377100321eba8444aaa94e2f98111523cbf,2025-06-12T16:06:20.180000
CVE-2025-41662,0,0,f4c7f5b91e9dbf0a17c75acfb892489a5744961254c1900bddb432592357c27b,2025-06-12T16:06:20.180000
CVE-2025-41663,0,0,9201f2a5707580a5af3fb5646429d71fd7d870cffc0d7f43eb8e8ea7a31aab43,2025-06-12T16:06:20.180000
-CVE-2025-41665,0,0,4df39b26fcc56baa7e30a7850c0654c17e2d83369f1663df0db8aaaf7bf529e5,2025-07-08T07:15:25.457000
-CVE-2025-41666,0,0,f13a9f864611be028e19f412e7f56703e2176d6752901ab9554ecd66ecde9499,2025-07-08T07:15:25.630000
-CVE-2025-41667,0,0,a6706829f2c4b177a473cc9ab245cc7dd87d7629b2bdfb166fddf06aa60b4844,2025-07-08T07:15:25.813000
-CVE-2025-41668,0,0,77700a0fad9716c8a0afb622759a2ec7b5629dea90ebc05ca2c9dd1a821ddc47,2025-07-08T07:15:25.987000
-CVE-2025-41672,0,0,30725c52618b9700331494b75aaf80f5c0cb0ccd0c82c7ee8cd1799c9d74c993,2025-07-07T07:15:23.973000
+CVE-2025-41665,0,1,58a48f6d00fd8a29a456fb99c67b93934ce42e911a503d0049b1049a22819f81,2025-07-08T16:18:14.207000
+CVE-2025-41666,0,1,8db46bc8b74ab3032ec0f910c70937bd4d45b909f39a67f8356dc990ab07cd6a,2025-07-08T16:18:14.207000
+CVE-2025-41667,0,1,28f1a554e03e3bcb82cd6d8023c14a5d4d6c9607dbe001b486d0eb3df235ab08,2025-07-08T16:18:14.207000
+CVE-2025-41668,0,1,14c347c681876cc09167081501614b0b45f6b706bca5a0a75c64af075141ed1c,2025-07-08T16:18:14.207000
+CVE-2025-41672,0,1,dba984d9e627ee2849ed575a9b44371d0067d44ca4490a0403c759c737374f99,2025-07-08T16:18:34.923000
CVE-2025-4168,0,0,a6468df4f7a2597ad76d3cb7aeb08566a4877cfddb2b3e40039e98441ddbce5f,2025-05-05T20:54:19.760000
CVE-2025-4169,0,0,bfc728158ddf7f1a565291bbe3bc05c4816fdb9cc64adedded01a1b86d632adf,2025-05-16T14:42:18.700000
CVE-2025-4170,0,0,133573d3aa8594d19e56ffa6beff9d425ae43d2765fc46c0e41b4c599f9a4675,2025-05-05T20:54:19.760000
@@ -295919,44 +295934,44 @@ CVE-2025-4291,0,0,3c966d095e0027ee25fc69633f95e30252d911138428dd59f98b42d5972922
CVE-2025-4292,0,0,3b0e06bfdd97a17ba7f68946a85abe7ce662b331b5db371d423d8c2c22e38a38,2025-06-17T20:17:44
CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af017,2025-04-23T15:25:30.927000
CVE-2025-4293,0,0,3e0fba3b11651bbd0f80afc0b87a24c09c8226e80f3350735e023f15e0a509b4,2025-06-17T20:17:29.200000
-CVE-2025-42952,0,0,768bcb21d776f11485a2152ac2dc0bc7598a8ee5e50ee1082d5b052c728d9328,2025-07-08T01:15:22
-CVE-2025-42953,0,0,1741d0db8362bf68b72a94a7bc94759493f1591ad7cdcbfb856df8c762f30086,2025-07-08T01:15:22.163000
-CVE-2025-42954,0,0,3d6fa81167173620b022305ba34ea04bc5b97373e3681aaccd6730092982902a,2025-07-08T01:15:22.317000
-CVE-2025-42956,0,0,e254045e3bf0e68c041d419f86048c8dad7d921fec68cbb1e6e1dab1f4ea9d51,2025-07-08T07:15:26.167000
-CVE-2025-42959,0,0,d5b01cf70a8a433d4660d71c79e0cd35066490817f078e01438734aadc02e44f,2025-07-08T01:15:22.477000
-CVE-2025-42960,0,0,a89186331f55bed8cbab7ef13d784bde9dc4953755cfe296098974f13d09bafe,2025-07-08T01:15:22.633000
-CVE-2025-42961,0,0,2a9cd005f1d38d17bbbd4cdadb65a99fa4810911bd990533ae7e0c7f7028d38f,2025-07-08T01:15:22.783000
-CVE-2025-42962,0,0,10a76ecedc82f8c73f4165b127729cde329e2a1b8397decd07283e995d13713f,2025-07-08T01:15:22.937000
-CVE-2025-42963,0,0,3eceb758431bd7a9b776e6e359f16ac8c0bd21ef6b4f957b0e4b861a43f9a6ad,2025-07-08T01:15:23.093000
-CVE-2025-42964,0,0,35eca8fe2e5b0b8592914d5f9aceac811262537d112dd16fac42dd7a2874f291,2025-07-08T01:15:23.240000
-CVE-2025-42965,0,0,5468ec2b856abda7976d3a7237854316e3a567ad8f1e21914fd754cca072a790,2025-07-08T01:15:23.440000
-CVE-2025-42966,0,0,f5060d8be8c97a112f6bc890e97f1361483623af18e26949db8b983231720bd9,2025-07-08T01:15:23.630000
-CVE-2025-42967,0,0,66fcf4f745ead69569e143881a197a2eadc36681f688e13394b8d383891f97aa,2025-07-08T10:15:22.040000
-CVE-2025-42968,0,0,8d0a352810ded26f1ea99be4361c89b7f442d5266f1052174dabce56e8dd9e2f,2025-07-08T01:15:23.950000
-CVE-2025-42969,0,0,9338f259fb3824acc0cf0f061beeaca8fff6d92da434d45e0c6b7290c985ddcf,2025-07-08T01:15:24.120000
+CVE-2025-42952,0,1,8ff5b5823654f1f0c601668e29d38950cc51413cfd58df13a218a0a80acfe54c,2025-07-08T16:18:14.207000
+CVE-2025-42953,0,1,81cee349ca1b0595ab280c2d4657fb9a09934d5e69f66ce05ce3b45424d41065,2025-07-08T16:18:14.207000
+CVE-2025-42954,0,1,1c8684be31dbb867014015e5ed8da212c2280672b5b4c5882c5713c126d72f2a,2025-07-08T16:18:14.207000
+CVE-2025-42956,0,1,4172d0a4a696fcfc82d91a78ae89186350161d670dcbf4766feff578b0556fe9,2025-07-08T16:18:14.207000
+CVE-2025-42959,0,1,e9837cc3f9761a3c96be8a303a62ec0c064ef7fbceeed0cb603057ff0f864d46,2025-07-08T16:18:14.207000
+CVE-2025-42960,0,1,1e56f4fe40d736bfe01ea1ffd516cddc4ae1b86a0f8f180f9bd9bba1f5ed6647,2025-07-08T16:18:14.207000
+CVE-2025-42961,0,1,58f576f912f46ee1a638380a445f36b09ad3533d144e36ee4a306df44e2cc875,2025-07-08T16:18:14.207000
+CVE-2025-42962,0,1,cbbbefe4eb6f65e2a857f6e3ac6e5cd7d508fb9f93720b389c9f0ac3cbb19c2a,2025-07-08T16:18:14.207000
+CVE-2025-42963,0,1,9e8326a53e71a7158b49ab35040683d71a8da9e4c210da36af91f5f065c1c168,2025-07-08T16:18:14.207000
+CVE-2025-42964,0,1,c6c6f0d1550cf97ca9605e8799841799baca1c5fa330b8f5e02cbd8f8d20e1bd,2025-07-08T16:18:14.207000
+CVE-2025-42965,0,1,190d6f0d74dcb28fc2fffcf6b80bebbefbf48b3db52ac2eb94f8b17fcbc6d77b,2025-07-08T16:18:14.207000
+CVE-2025-42966,0,1,cf0cf42cfb4c9bbc76708a86f6b3265db3513cda7b79d44f696ac148cca0aa0f,2025-07-08T16:18:14.207000
+CVE-2025-42967,0,1,3c1600f0023433c8e495312d8f7b44bd02012219a9b8802e57f4120f4abe5ec2,2025-07-08T16:18:14.207000
+CVE-2025-42968,0,1,20ed5ec18a2b02af6c9fdfc13196c80497dedf1f62633f07c0b26dd3c936cf88,2025-07-08T16:18:14.207000
+CVE-2025-42969,0,1,f3c0329b38195175d64c3fea5df0b25562a5e5ec0fff7e8bb599bcbec9fac965,2025-07-08T16:18:14.207000
CVE-2025-4297,0,0,2125bd423cd8ee8185dc917035443ae13b98a933b8dab9e4e9a974e1b93ea733,2025-05-16T17:44:43.850000
-CVE-2025-42970,0,0,297fc1e2ba1c14dbe5bd505fa3c89552007ea34556578cbbf833ac087705be7b,2025-07-08T01:15:24.290000
-CVE-2025-42971,0,0,4cad154b4ee90a857234e7063e5c465f9082e3eb4d5b97a829dcca0253a74c9d,2025-07-08T01:15:24.463000
-CVE-2025-42973,0,0,49b8336a92be1c55e6b9eb63e4c5855a9103ff4ee08c29904e5bb21666614cfc,2025-07-08T01:15:24.623000
-CVE-2025-42974,0,0,2110eefab2c0feb97089f6b4f42310beea47c1c0fe5b1d7e1f69b412e743935a,2025-07-08T01:15:24.773000
+CVE-2025-42970,0,1,90c5d15e7eb8a65fdc6200151d80276808df21ea79cef4dbebd95ac3551d7080,2025-07-08T16:18:14.207000
+CVE-2025-42971,0,1,8d463e6b3b51c0c3235c2e25b3530d8059ca5732f67e4c96c82e3e74009f09bb,2025-07-08T16:18:14.207000
+CVE-2025-42973,0,1,caad19f711ab1eabf35510139fb2999287cebd390340cc19b80d0a7ee0ebc588,2025-07-08T16:18:14.207000
+CVE-2025-42974,0,1,984f17a37d2dd0579922f74afeaf9cff8b9d7cb0d80865ee1074ee63b146a811,2025-07-08T16:18:14.207000
CVE-2025-42977,0,0,cc9ae0e46200dea4243b9844a4fe105554475587976aa2e885549e66131394da,2025-06-12T16:06:39.330000
-CVE-2025-42978,0,0,2523b44e162b8bd1d841960211fe9d53134ee2f7a88691f864fd3ddeb7e14606,2025-07-08T01:15:24.930000
-CVE-2025-42979,0,0,05a43941f2db0c355cef3d700bc8e776e51a17162eeda5028cce22375c0f9b15,2025-07-08T01:15:25.107000
+CVE-2025-42978,0,1,d2a09d858f64b3edcbe52b74a862bbc87148a55bd120b947b6b8c157d6ad92e5,2025-07-08T16:18:14.207000
+CVE-2025-42979,0,1,beae85f2a46675af989a47b723c0807bd2893e9b2951bfd3b9d8798c226f9d9c,2025-07-08T16:18:14.207000
CVE-2025-4298,0,0,e54afc5cb294aa37ab5ddf7cb60307aaa6afeb78004ee588006228c0c5b744b4,2025-05-13T20:06:19.080000
-CVE-2025-42980,0,0,025244ac3cd19547b69de612ccd1f7e177717aacc7ebab940de3d9eb2517fa1d,2025-07-08T01:15:25.270000
-CVE-2025-42981,0,0,c03cbc3aec3769340850877e016e67298a888abdd40e3cc82b8b3705d8fe406a,2025-07-08T01:15:25.427000
+CVE-2025-42980,0,1,2186dad3d782521a5ce00047299435d3e1773cc4ce1ebceddecda643490b922d,2025-07-08T16:18:14.207000
+CVE-2025-42981,0,1,ff65b7b21c870007d5784d000447e987b242811b449560f4fbe226e461a45dc5,2025-07-08T16:18:14.207000
CVE-2025-42982,0,0,e6968c3fd7871556e1e29606a4f8dbcd4707b8846dc0d2a09bc157db8b57cc24,2025-06-12T16:06:39.330000
CVE-2025-42983,0,0,1b0371afa97d4d0347bddcd8ab1cfda4660ea8f2c5878217b37c9e5cdc2ac967,2025-06-12T16:06:39.330000
CVE-2025-42984,0,0,7e6a153ab4f0a760b3d0e2df015134c0a7cce8a9e0c5a0424eb4c14f09f58894,2025-06-12T16:06:39.330000
-CVE-2025-42985,0,0,23bfa90335b4026cee62c8268f435b9b1edd6f9821da86eb80e036ca956ae9e3,2025-07-08T01:15:25.577000
-CVE-2025-42986,0,0,eb2ac8fff323b248a9469f1f0699df7f57c8a401b7d13bc375054f7b2bdb9f8b,2025-07-08T01:15:25.730000
+CVE-2025-42985,0,1,9b86f9fdc4f87509514c22f6b428361b275e77bdcfe49dfce7c86ab2b039be73,2025-07-08T16:18:14.207000
+CVE-2025-42986,0,1,178b611a5b95bb0f6b630f0c67d28edd4d0a842777f33b0cdf369c2101ec7869,2025-07-08T16:18:14.207000
CVE-2025-42987,0,0,57e561deb69074295408ad93b87915b59df3e27da58e7c9dc77ffc675fb4f969,2025-06-12T16:06:39.330000
CVE-2025-42988,0,0,802715f7a93ebc8f9f5311d82d3ea45d70eb23bce1f100c736f7d19e12e423ab,2025-06-12T16:06:39.330000
CVE-2025-42989,0,0,f7c874047faa5bbde13807979293b3a3f749e5612e701215df5efa9c37a39e0c,2025-06-12T16:06:39.330000
CVE-2025-4299,0,0,cc4a3e24204515aaf4850521a61cefe5731008dd8b97ebba472ff5c5a801f5ca,2025-05-13T20:06:00.377000
CVE-2025-42990,0,0,3a9e5f7c57455afc01a40c0ea2245139d37a87774fde193be7c4255a63f51cb4,2025-06-12T16:06:39.330000
CVE-2025-42991,0,0,483fe762357a709c84ee8b01c25339045c78ff0318a3cc007a6356796e166421,2025-06-12T16:06:39.330000
-CVE-2025-42992,0,0,96ce2567afed88e5f49a397de2e5cd2b29cc5415d8f6a30174112626eb1ac1e0,2025-07-08T01:15:25.887000
+CVE-2025-42992,0,1,d42d7a7c0297370c508154e1ec4e9a39eae2305ba4a2cc3e25cf7f4d2c362749,2025-07-08T16:18:14.207000
CVE-2025-42993,0,0,770b23d31b6a3733e5f2e2910516b7bc5d5f11275ee3a601562cde06caf0884c,2025-06-12T16:06:39.330000
CVE-2025-42994,0,0,145ac3aa415b4167c9777bfe2d4a55a89181bcc2e386f22a825736b3071eaabb,2025-06-12T16:06:39.330000
CVE-2025-42995,0,0,3ec9ec8f855874770ecce1d03a99a91e674f14d0bfac33ac9017da879811ca6f,2025-06-12T16:06:39.330000
@@ -295966,7 +295981,7 @@ CVE-2025-42998,0,0,2bfe656344a0b85a5f4fff2abcf4a6577e799789f89dc0ea98745669a30ec
CVE-2025-42999,0,0,a0a9942912bd021b739fb32ce123af4bb7497f07493d1c056f2a75451f04f20d,2025-05-16T19:44:49.400000
CVE-2025-4300,0,0,f7c03ed92744380706d903a9f694588f32e405152084eae0fc0569337f5db7ce,2025-05-13T20:22:08.717000
CVE-2025-43000,0,0,e31fc74811b3e3770c864cd0f324b9ae9ae79a3c82cdc5b33a35261048a81925,2025-05-13T19:35:25.503000
-CVE-2025-43001,0,0,b0c7292d301e8ed28cbd3ff11650a2455582cf81da9979e867729586e9206a22,2025-07-08T01:15:26.047000
+CVE-2025-43001,0,1,20e03852d3ce438aae6e4584fb4317dde6b148bb218efe8af847ca9dc51959d7,2025-07-08T16:18:14.207000
CVE-2025-43002,0,0,434480ab85f45382cf8911be3496b00027aeca710a87c1831baed9aeffb6a42f,2025-05-13T19:35:18.080000
CVE-2025-43003,0,0,c5a14dcddb63dd3a6317cb81df2b91482d1e16b9c687c3fd2da6622f294a0a59,2025-05-13T19:35:18.080000
CVE-2025-43004,0,0,c44496c430b2ebc5fb5dac27e9ac73a29a0d9eebcd7c1bf6e68e10748aefecc2,2025-05-13T19:35:18.080000
@@ -295983,6 +295998,7 @@ CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07
CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000
CVE-2025-43015,0,0,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000
CVE-2025-43016,0,0,f2c72cd86df0dc4f466aff47f20427f717da38e7cfd3bc2cf6bf3e8b276a88fe,2025-04-29T13:52:28.490000
+CVE-2025-43019,1,1,cddc3c0c6e5cfae037834dffc4bc3fb8ebbf0e5900908a0be6f373d6656fdc80,2025-07-08T16:18:14.207000
CVE-2025-43025,0,0,3882f94b6f95335ffc0c2dd9b817b88d65f4ec0375b5e45661de460b59f32008,2025-07-03T15:13:53.147000
CVE-2025-43026,0,0,6b388ee0410ccd9f871364237fa3dd74ba38ecd5d6baae293c1bba0c62bbe8ed,2025-06-06T14:07:28.330000
CVE-2025-4303,0,0,ca67198b40d61e86a7061774e966351f8111400fea02ca918ed591bfeb4cb946,2025-05-08T19:03:26.480000
@@ -296072,9 +296088,11 @@ CVE-2025-43577,0,0,98cc1204a6a3385cac3ba56c2bc27124f101e6345d86422dc654b29802404
CVE-2025-43578,0,0,ac577744e3d75036a3fd7c0e9fd3722cd95372fe477a953b923836178d2be5b8,2025-06-27T15:14:52.487000
CVE-2025-43579,0,0,7eef94019923cdf7523c797919be9d42cfebb3f84c4aac09a8b6180f71a5fd59,2025-06-27T15:14:49.923000
CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000
+CVE-2025-43580,1,1,296c99ebc23f32f4dd18a945cf6ad3e76fcf085e153a660b50b07de56bba031a,2025-07-08T17:15:35.940000
CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc15f2,2025-06-12T16:06:29.520000
CVE-2025-43585,0,0,6df4e3a17a9131e321c50e0e04cd2c0725f7cea66af401580d79eb104580f09e,2025-06-23T19:22:41.517000
CVE-2025-43586,0,0,bf57beb4510c3c1c98308dc5ea38415d9786647d178b76150399e4110e62a6d4,2025-06-23T19:22:26.633000
+CVE-2025-43587,1,1,4594025616f20b82c6b239fc92b3effb5293c92268387236cfe5ca3122042a7c,2025-07-08T17:15:36.137000
CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6deb5,2025-06-12T16:06:29.520000
CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000
CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000
@@ -296099,7 +296117,7 @@ CVE-2025-43701,0,0,cdb9e5c0513ac4fc64d1742761490b6e885c34f05f46ce897491703334c8a
CVE-2025-43703,0,0,d6625a868be77b8d7893d215165a3a98f3361eec5aed450c8d69ce3a9dfaf391,2025-04-17T20:21:48.243000
CVE-2025-43704,0,0,e4a4f68c1c515be2555ad90b5dc0fde58f5ff1d76445660f48da718ee733becf,2025-04-17T20:21:48.243000
CVE-2025-43708,0,0,d38c003beeae09584e47fb48659652128bc4a5d2c5ae13da147de319358e0588,2025-04-17T20:21:48.243000
-CVE-2025-43711,0,0,41ec2e168dee2a12ef3e8b130af5b1288ee1d1434f1cc9b3bcb199c9f8b3412b,2025-07-05T00:15:23.733000
+CVE-2025-43711,0,1,fb2b648bf7e01f4d50fed3fce96e6bd8fd145d2e5a8382eab6041d390fd69c6f,2025-07-08T16:18:53.607000
CVE-2025-43713,0,0,0f452e045df8ef85551a2e3df028c4cd3a68d4b296b600fb9e1a6b90a9b6235f,2025-07-03T15:13:53.147000
CVE-2025-43714,0,0,cb1496a71eb67171c1556f15fdd8377c3f3c264e0a77af928be602b0d89248f5,2025-06-12T16:24:24.810000
CVE-2025-43715,0,0,16cf4954d648fd87012f5a88d33c7f63ff2347a1f446f7ec65261364d5ff03d8,2025-04-17T20:21:48.243000
@@ -296113,8 +296131,8 @@ CVE-2025-4376,0,0,9420fe6cf88700687e51473e9a5bdfa5c55844808ec53c6470445953d8f65f
CVE-2025-4377,0,0,8e0530103ee880cb7f294e1c4c7e6cf387e9a1d9a6703ed3634515ee426ce352,2025-05-12T17:32:52.810000
CVE-2025-4378,0,0,e1851322dcd3c6fe554fb52d15f994fca0f772009e69eabfd5d3b801ed1e800f,2025-06-26T18:58:14.280000
CVE-2025-4379,0,0,e139293cb2798c2cb2cb3f79d802fcb657bde9dc9fa4c7255ad0325e9262fbc1,2025-05-23T15:54:42.643000
-CVE-2025-4380,0,1,6a86ec744bcc28a7c922a23383e6ce5f0083662fbcb9756281d981ee6e7b7202,2025-07-08T14:34:59.070000
-CVE-2025-4381,0,1,870f22b073fadd962356f06edbeb47dce1d77cdf040bc5fe78fb4e0e460b6b93,2025-07-08T14:33:19.947000
+CVE-2025-4380,0,0,6a86ec744bcc28a7c922a23383e6ce5f0083662fbcb9756281d981ee6e7b7202,2025-07-08T14:34:59.070000
+CVE-2025-4381,0,0,870f22b073fadd962356f06edbeb47dce1d77cdf040bc5fe78fb4e0e460b6b93,2025-07-08T14:33:19.947000
CVE-2025-4382,0,0,8a1559ab8cc558a940530a080d0d085afab83e90e4673936d125191c010d9218,2025-05-12T17:32:32.760000
CVE-2025-4383,0,0,d673ada83f93e5b93da8989794aa0e2df3902190f6c25e9a6c9aa4fbb9d3624a,2025-06-26T18:58:14.280000
CVE-2025-43832,0,0,513f95b74ed67840e16dbc4acf643166581497dbe2d1eae72a6cbab4e9aeeea0,2025-05-21T20:25:16.407000
@@ -296185,10 +296203,10 @@ CVE-2025-43925,0,0,5cbb409f553038693387337b241da0f0142b19c7ebb79197568d829b038e5
CVE-2025-43926,0,0,4d0844f61e8a4f3908e6525284978ee3dd3d8da4c86df34256626c5eb8824ebd,2025-06-12T16:44:04.490000
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
-CVE-2025-43930,0,0,40719ce663d5093801d4c4c8db4d1a35179473361a2d3305b8bd947b7d91ca90,2025-07-07T15:15:26.733000
-CVE-2025-43931,0,0,062dee84644016a965484838481d185219d384a01c018d9eb9198f7b3872c999,2025-07-07T16:15:23.250000
-CVE-2025-43932,0,0,3bf03e78b6a5b8776a71c4dc2354170cb4360162ed5efa14c00fc6dbf9c83a9d,2025-07-07T16:15:23.380000
-CVE-2025-43933,0,0,95697e9e665845d48349c495f48f7a6ec689392bb002a94ed8510e91fc2fb988,2025-07-07T16:15:23.513000
+CVE-2025-43930,0,1,36afb15436281464c2e02f6a6a9e8a6b5a01a99c60840ffae9529cf564e9ea19,2025-07-08T16:18:34.923000
+CVE-2025-43931,0,1,7d629a4dec223e1e35a8018c918257540d13062fe40b5c84c21f787183c8999d,2025-07-08T16:18:34.923000
+CVE-2025-43932,0,1,d42b983bc3c57b4c7581673735f91133f9cfdd5c04fc0743d1b44251d88387ed,2025-07-08T16:18:34.923000
+CVE-2025-43933,0,1,16a06d6d77cf1af4c91617e283bb49bd71f23eb05baf8b1e4edc0932cd4ea65d,2025-07-08T16:18:34.923000
CVE-2025-43946,0,0,c567cb496d37f6e22b9596b552a09de1b07a7e7e527c7608b3f0bd1ce8e16534,2025-06-23T18:03:44.927000
CVE-2025-43947,0,0,a218c15b83c9a2c09ba597126a826cdb3cf5018f77547d94f85a505842a307eb,2025-06-23T17:59:17.940000
CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000
@@ -296237,7 +296255,7 @@ CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc
CVE-2025-4413,0,0,8183abcbee02e568828cd8e2d235c04da10125992cd5d9faeabbb70df4043122,2025-06-18T13:46:52.973000
CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000
CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000
-CVE-2025-4414,0,0,221c6e0a0804453fe8b27029d24cb5280cb8f036dd1aabda2d76a914ac2e058b,2025-07-04T12:15:32.617000
+CVE-2025-4414,0,1,77ff069fa431e78ffe9a4e131ce34cc7fe318ae365aef389c11819f2a427733e,2025-07-08T16:18:53.607000
CVE-2025-44141,0,0,1b640fec5b67675dd6c48e39ace9ed93416eeec7d96ebdef4175bdaef84aa0ca,2025-07-01T16:03:07.920000
CVE-2025-44148,0,0,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000
CVE-2025-4415,0,0,ad03eddf6945a3abd185a8d960097016d4b62ffbf34756b693345e56021597e6,2025-06-25T15:23:59.237000
@@ -296417,7 +296435,7 @@ CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47
CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000
CVE-2025-45055,0,0,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000
CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000
-CVE-2025-45065,0,0,8c9659f3a8f77cd17cc0a9901f417013087870ee5a7e357f3c2eb6733e264347,2025-07-07T16:15:23.650000
+CVE-2025-45065,0,1,80ce42bce32ee33f9331a162a3c5344c7f7385b7d0bb4af714a713b7d0851ed8,2025-07-08T16:18:34.923000
CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000
CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000
CVE-2025-45080,0,0,06a0f2cf3a479da0a1242f0af19e11456b7516b7534ba880f3dcc032666fd851,2025-07-03T15:14:12.767000
@@ -296428,9 +296446,9 @@ CVE-2025-4510,0,0,50fe2f41c100bf30a7a331cb71fdad04515b698453cff88a3298bae68fb6f5
CVE-2025-4511,0,0,1cd8de156a18d60c30afe7accc623c4dda171fb7e4df21ae36b00099268e3485,2025-05-12T17:32:32.760000
CVE-2025-4512,0,0,4bc127dad728cea971a7dc75249591809a3cb32fae7bb8b8e7b7b730a069efd8,2025-05-12T17:32:32.760000
CVE-2025-4513,0,0,07bb12809c9624505f96cc0b646724d4d7277016849e93a883dbac45774258bd,2025-05-12T17:32:32.760000
-CVE-2025-4514,0,0,8ec1805f4f97bd70a1c948cf3cee2fc7b4e3869030a6e61bb33b5355ac6812fc,2025-05-12T17:32:32.760000
+CVE-2025-4514,0,1,61b29c0eae00d236e422a36751cc990894b787b70782636b36921cb3c2c48692,2025-07-08T16:46:21.943000
CVE-2025-45143,0,0,b1bafea92723b14e402f19953a15e88d2a3a7a95f8c35f8d027efd9ba0371f6f,2025-06-30T19:15:23.950000
-CVE-2025-4515,0,0,15842f64bc5158ee594ebc8bcc08fddcbccd67b13581d77b6c2aa4b49c2d35dc,2025-05-12T17:32:32.760000
+CVE-2025-4515,0,1,25b2d0b7ffb65f4f28a31b41e5103a94d784f13567bf8f1cd94b8d154220bd03,2025-07-08T16:47:04.503000
CVE-2025-4516,0,0,796b8f07feac2cf0afff20513d00fadb85e8da28c0408ddb3453089e5fc0ed01,2025-06-03T14:15:49.697000
CVE-2025-4517,0,0,8f51c46af888510dd73bb462bbca2c104af9d3c9f1d6809b8679167122b8adcb,2025-06-05T14:15:33.050000
CVE-2025-4520,0,0,2649cd1b163a0622d5bf29e4b3dee5950ca643285f952a7b68fc954427092ffd,2025-05-16T14:43:56.797000
@@ -296459,16 +296477,16 @@ CVE-2025-45332,0,0,3e680282347d513ad76d880bfdd241726c33a42cd9243ea852e7ec50a8a70
CVE-2025-45333,0,0,45594321e39ae2977f3091895d155d4678d0aee4381745d3aacbb14cd19adaca,2025-06-30T21:15:30.427000
CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000
CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000
-CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000
-CVE-2025-4536,0,0,a2b8008b92a195b68a0752c6339879ccac94f1f570a919d5eaed929b26125f6f,2025-05-12T17:32:32.760000
-CVE-2025-4537,0,0,3541ad22bbf9e4ca3f8ea882220c2357e61730ded40620327b0ee2be0afe12a2,2025-05-12T17:32:32.760000
+CVE-2025-4535,0,1,f593fe6cfb9b3c752e85658072fab37afc579c750ce8a8208acfd1b581be1e44,2025-07-08T16:57:59.043000
+CVE-2025-4536,0,1,d0858e362886c0984552347fc55a23f251fadb0edf9ffddd568145e3ba6eee7c,2025-07-08T16:59:31.103000
+CVE-2025-4537,0,1,465cc7f6af6b7f86ca400d4e0fa563f9bab6f48c611a3ece8a981395d60251c7,2025-07-08T17:01:24.163000
CVE-2025-4538,0,0,2337f829f51f9f31b62055a7c3aa6001ded46b6485d6d0073b7e80d592e0ba07,2025-06-16T18:31:48.913000
CVE-2025-45387,0,0,23bd6a95486716845026d11dfc92cd6ade1f90ab3fe02f173d18417ad36ee00a,2025-06-05T14:11:24.113000
CVE-2025-45388,0,0,c14b2843d5b1ee33c4fb3ac5bcbe61dc58ca0366a4f22e5c98445035f444d3cb,2025-05-09T14:15:37.813000
-CVE-2025-4539,0,0,4cea8fc534f9fe405b8ad908d4e6f097f4382bef617bc18109b8d5e8c637ff6d,2025-05-12T17:32:32.760000
-CVE-2025-4540,0,0,8cc0219b9599542c1458321b60f6526b4a06d781c2bf124752cf69c701bf9208,2025-05-23T18:15:36.813000
+CVE-2025-4539,0,1,c53a8184c706b37be111e00c8e3acb4ae808ff5f07d45108ab043f7abed5f608,2025-07-08T17:02:56.373000
+CVE-2025-4540,0,1,1b3c3abf062eb0820cb79959fdabe59bb99fbc1697a2050e8d98f052d7f85945,2025-07-08T17:04:11.077000
CVE-2025-4541,0,0,f69af7cb834435790fd2bc7c7fdd35148c39775cd73b6e79ac588217ba1217a2,2025-06-12T12:55:42.967000
-CVE-2025-4542,0,0,b2811e2a4a5d7456e65880ba2e5fe541779cd453c5ff8f673586e2db73c7c0e2,2025-05-12T17:32:32.760000
+CVE-2025-4542,0,1,519752fd857e385a514aaaf6928db4878675b2573d28397655c42c940f7cd1e0,2025-07-08T17:07:04.910000
CVE-2025-45424,0,0,0d98501b657ca2eed486467c42e6579375e05a65035b8f3b65eeeb9eb7a9779b,2025-07-03T15:13:53.147000
CVE-2025-45427,0,0,2acb289b4531d79e0a4fdda0743ea875280a2030836ee1f38a4e78112f2ff823,2025-04-30T13:51:20.023000
CVE-2025-45428,0,0,a55753fec0ea61e23d5357aef97cfebf259250af906a54fae9de1214ab7deb77,2025-04-30T16:12:11.190000
@@ -296476,14 +296494,14 @@ CVE-2025-45429,0,0,32099a126e41e157c073e4b282e42326bf59a85e3c0de57c5dd11afb3e225
CVE-2025-4543,0,0,dc39b45289657c0f8047a24080b1a0f6af24cd36e67011ecc21691be9eb02e99,2025-05-28T15:46:01.440000
CVE-2025-4544,0,0,6a43d7f36aac234126cdbeecf3f1adda4cf97682779e9e46f5d9798cfbcb8b3b,2025-05-22T18:24:37.697000
CVE-2025-4545,0,0,0027a192b923ef7ef8843a5c7cd1663bc87319fc40a1a00255412f7ef0be3662,2025-07-01T20:12:36.177000
-CVE-2025-4546,0,0,0cea7bb386a5dc75622be5eefe915e6aacb6f0a3c4ee86c146e363f983939c46,2025-05-12T19:15:52.150000
+CVE-2025-4546,0,1,bec42cc52c9c24ae51c0d03fe3f86c98051ee1f5b54affdabff689278eba0e0b,2025-07-08T17:08:09.853000
CVE-2025-45468,0,0,1f9ca402c698f9398e2cfc09460d45546d3a5c4644d69b2590973d05b1fe61b5,2025-05-23T15:55:02.040000
CVE-2025-4547,0,0,5a9f97c59a5517a42eb37b2bfaeb218892d8ce2e6447168e1978702b9836490b,2025-05-16T17:19:47.520000
CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19e21,2025-05-23T15:55:02.040000
CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000
CVE-2025-45474,0,0,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000
CVE-2025-45475,0,0,7400d330caefeb635586e4a2df7792360a8bced766ed5816725e62dba811d485,2025-06-24T18:42:50.893000
-CVE-2025-45479,0,0,7828b1883f087d7a016d1e6ce375ad7d570a7bbb4a4ea52ec14074702d954ec4,2025-07-07T16:15:23.780000
+CVE-2025-45479,0,1,26b8217f04e7b8e6e147e282244d392915998c2b2f44939381080e5ba447191e,2025-07-08T16:18:34.923000
CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000
CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000
CVE-2025-45488,0,0,a4a677b217c9c59760c1fc85e8b2f493a1b1fd5df028087d0ead93cd4bfeadf3,2025-05-13T20:19:15.500000
@@ -296531,7 +296549,7 @@ CVE-2025-4567,0,0,121a90467be941d9ad01a97d3e24fb32b96a7e829013a214205341e8c02842
CVE-2025-4568,0,0,a7dc4015dc0dc8a1d051ca0a0c8659f2aa00a001767db9893b5b3f88ebbd1af5,2025-06-05T20:12:23.777000
CVE-2025-4571,0,0,cfaf6e0f0966147161fbd50ba7ab7242473c58c0fee9a367c407b586b3a394d5,2025-06-23T20:16:59.783000
CVE-2025-45729,0,0,06be15248618c3ff93c4c46939eb1599b4520127edd7c0f5a530b5db10e33c3f,2025-07-01T18:16:07.600000
-CVE-2025-4573,0,0,c035b8bfa906235a0cce27823a2eb6565132897abeae831d980ffad03d866155,2025-06-12T16:06:20.180000
+CVE-2025-4573,0,1,9833962aadf8d3b7f1925383fbf4c253483b7a393ecb08a1cd68f61830787758,2025-07-08T17:59:16.597000
CVE-2025-45737,0,0,6baae94abdeaca96f8062136b86f29ff9a054c9d0570a6ba0f8f01afc7ff31d0,2025-06-30T18:38:48.477000
CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcfb5,2025-05-16T14:43:56.797000
CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000
@@ -296555,7 +296573,7 @@ CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c0
CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000
CVE-2025-4580,0,0,2c434f3aced55b1225815c7de47b3cc229863447aaf3ca455a84427f71dfeaeb,2025-06-04T20:04:21.700000
CVE-2025-45800,0,0,2adeb4a59c132c5d4a56fe8afda223e1c5b86658a949bac17c9d9bc540ba8292,2025-06-04T17:26:02.743000
-CVE-2025-45809,0,0,b94ae077a82c8bb0ab60e103d9f216ebc766b6a71bd5a9ef0ed4daa71200defd,2025-07-03T19:15:24.027000
+CVE-2025-45809,0,1,581b7358772a03f99ae17aba5643c5364a746cae8d6c93d06e5d542681f65dc4,2025-07-08T16:19:11.700000
CVE-2025-45813,0,0,1cdb35349454355ea90284f73a3a629e371e03fd1917b24cadfbc183cc8f1c12,2025-07-03T15:13:53.147000
CVE-2025-45814,0,0,8e500fbe650a74a0fb125601ba4882cc600d6293d2674f68472c4b342456b8fe,2025-07-03T15:13:53.147000
CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9e3b,2025-06-17T19:42:01.770000
@@ -296587,7 +296605,7 @@ CVE-2025-45865,0,0,367062564ab2fabd14817d58b3e7095878e7c26afaa0eb1dd77e8dfb0a650
CVE-2025-45866,0,0,48c16ba2c1a450558a2d650800240d515297efe6c8338a7502e000a11c7cf020,2025-06-17T19:39:56.640000
CVE-2025-45867,0,0,a78de81cad59bbc316e2ff4eacf13da0ca81d5efbf89eb838fbfcc576cba1eb1,2025-06-17T19:39:47.240000
CVE-2025-4587,0,0,46f89bf24d329fba7cea5376e91f725d501d6eb29b0841d09b170b5098d2f86b,2025-06-30T18:38:48.477000
-CVE-2025-45872,0,1,989a68d1a1944857fc7e63bcb4b858e7324d8fc00abb311dfeeddd4eaa96a949,2025-07-08T15:15:28.080000
+CVE-2025-45872,0,0,989a68d1a1944857fc7e63bcb4b858e7324d8fc00abb311dfeeddd4eaa96a949,2025-07-08T15:15:28.080000
CVE-2025-45878,0,0,76479685a387cf61a43f7a306424fbb1613728900c34c34b117627476b791297,2025-06-24T20:15:25.250000
CVE-2025-45879,0,0,d26de1679d602860f0cdcf60c8d4caf93d94a678f9ab26c90e89d24f908cd9a9,2025-06-30T16:15:23.467000
CVE-2025-45880,0,0,3705fe6fc368f2fbd94d197728c7493a9d3bdf0bf25c0a8940fe6c0fa1b87358,2025-06-24T20:15:25.410000
@@ -296598,8 +296616,8 @@ CVE-2025-45890,0,0,8ac00b4a4d2b8dfd1b1b6dfb0cc90a379ee4159a9db0a5d8d5ac9b721444e
CVE-2025-4590,0,0,1338bc68ec3d6917d4ad238b5739bcbca3832b2475d3a347918656638fb549e4,2025-06-02T17:32:17.397000
CVE-2025-4591,0,0,09b633064167908f2267d3dc13a3052b782cbd19249bba4734b3313b4950008b,2025-05-16T14:43:26.160000
CVE-2025-4592,0,0,5d60bfef7beec0930ab89b7223857faa5fedaa5c280d844c7ee57c05bd2708bf,2025-06-16T12:32:18.840000
-CVE-2025-45931,0,1,e8180cd397eca074455ba0c2670f4dc8ea62b0ad00d9e3c4f6a5f590c1ef79e2,2025-07-08T14:13:39.897000
-CVE-2025-45938,0,0,82b31adbfe52c5962798d2f505dcdff443245fa0b999c877c172c1aacce4f1e2,2025-07-03T15:15:22.937000
+CVE-2025-45931,0,0,e8180cd397eca074455ba0c2670f4dc8ea62b0ad00d9e3c4f6a5f590c1ef79e2,2025-07-08T14:13:39.897000
+CVE-2025-45938,0,1,bf0716d3613a775e49ed9fcf793ae796850250b609a984f5731bdaafd48f821e,2025-07-08T16:19:11.700000
CVE-2025-4594,0,0,7df8ab2203157d0a7bf8dd2950daccb26cd8e209521e1c21f045016862d54d12,2025-05-23T15:54:42.643000
CVE-2025-45947,0,0,359c9dbf14e503988017d67aa788a499a7ac3bca9ffc4dc379e7011548317f85,2025-04-30T18:59:47.113000
CVE-2025-45949,0,0,2cec517c1301a76b89b8ccefb135dc95210f8464628904a6679478252432eda9,2025-04-30T18:03:41.357000
@@ -296971,7 +296989,7 @@ CVE-2025-4669,0,0,89694c55d9fd313842642068b4e7d93ae57ac47c416a461a97faccb3f92a74
CVE-2025-46690,0,0,973a37c2db031d79f10319288b5777f494d38cd710bbcf14cf819512ce030af8,2025-05-12T19:31:51.950000
CVE-2025-4670,0,0,b10edf3b6f71bdf8699eb65a94c6cf4caaaea0ef9ffd3b5514b32f41c78e11d6,2025-05-29T14:29:50.247000
CVE-2025-46701,0,0,b884853be12bd482597d0eb6a852eaa592cbffe615ddfb2ad9c8c604424c3797,2025-06-25T15:40:55.053000
-CVE-2025-46702,0,1,c1e0d1a34d40e31ee7baf900ce6ce0a614694cc03de26c326842844e251679d5,2025-07-08T14:11:52.077000
+CVE-2025-46702,0,0,c1e0d1a34d40e31ee7baf900ce6ce0a614694cc03de26c326842844e251679d5,2025-07-08T14:11:52.077000
CVE-2025-46707,0,0,341e09b844acb5ce9f65195045a31b596fdb0cb6ba2414a09e2f6e4ae0f8244c,2025-07-02T15:15:26.797000
CVE-2025-46708,0,0,744d37e3badd856ca529c8e683d603043b39effdc1c03fdf5e624c5ed73777eb,2025-07-01T18:15:25.280000
CVE-2025-4671,0,0,6a90a1a21db3f0dd064a3ae6cf47d91b222f79983dd36d1d7a9509d95c189f20,2025-06-04T14:54:33.783000
@@ -296998,7 +297016,7 @@ CVE-2025-46729,0,0,3d8d59d25190133ac6496709f02425f4d1111f3c931af4f4025cae2f29ca9
CVE-2025-4673,0,0,8ebe6f381de46cbcd176f9bf2be0da1445d7f3d9c7d4ce0c61d2293f68e7bb9b,2025-06-12T16:06:20.180000
CVE-2025-46730,0,0,b778d0b5827610b109aca84c60c7db8a5c07cd79e4727d7833dbfa430226054a,2025-05-05T20:54:19.760000
CVE-2025-46731,0,0,740ae6cdf8e49828e45e818d257c44d2898d4000cadd73cc7ec4d28341cdaef9,2025-05-05T20:54:19.760000
-CVE-2025-46733,0,0,ae2e7b11430a7cd4c06f8f05a7c7fd5e06d43fcc67b5e66240caff665548ea53,2025-07-07T17:15:28.197000
+CVE-2025-46733,0,1,6bc34d5479413e238e4966411a0dea09dc25df9202742c42bae148c1c54d0995,2025-07-08T16:18:53.607000
CVE-2025-46734,0,0,27cdefb7b43f54c218843044d524287f654bbf79b65207f62aa51f5ae27b4d71,2025-05-05T20:54:19.760000
CVE-2025-46735,0,0,2150630835f1e409644bdb468cff4c89fbabadc89939c20bcdd0b4d1b651714f,2025-05-07T14:13:20.483000
CVE-2025-46736,0,0,8694e287f5d10d35b9cac8cd30430efa86a726280e0c4502e53d2236462dc452,2025-05-07T14:13:20.483000
@@ -297112,7 +297130,7 @@ CVE-2025-46886,0,0,45ed2d08f5d15d4f5e3c7e7d714d38b27a02821ff09180f6fbdbdc108f48d
CVE-2025-46887,0,0,034b4edc4fa80fdc80a385cbe687c8366b28610f6147acc39b704486bd6fe438,2025-06-13T13:01:45.833000
CVE-2025-46888,0,0,46bc39e77594cc14158fe0bf9677a699bd101a4bac8739cac933705d4066c5a8,2025-06-13T13:01:40.437000
CVE-2025-46889,0,0,18dab22b1f628816c1ebec7d6dffe8ce279379c6e34cb5fba86147b1fec00067,2025-06-16T14:28:58.390000
-CVE-2025-4689,0,1,b229e676bebc5f57d3a5fc5d5b0f9bb1b2da0f4a19b9247a6c1a7c56293af89d,2025-07-08T14:26:15.963000
+CVE-2025-4689,0,0,b229e676bebc5f57d3a5fc5d5b0f9bb1b2da0f4a19b9247a6c1a7c56293af89d,2025-07-08T14:26:15.963000
CVE-2025-46890,0,0,c7b22bff1b6d25dbe82be7ca12fa8a71c6456d81869e490219ca110a612fbefb,2025-06-13T13:01:34.650000
CVE-2025-46891,0,0,7e04bae87cfb29995abe51a76e08fe7639236ecbcb4c4e531d89cd0e91ee7388,2025-06-13T13:01:30.007000
CVE-2025-46892,0,0,1028fe917905f339be72950f607fc070e3750c9fc4607132e213369597204e9c,2025-06-13T13:01:18.427000
@@ -297311,6 +297329,7 @@ CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a14
CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000
CVE-2025-47107,0,0,fdd924643f30ad0038e7fd95dd810702588a19273ddc406fc67f30e962777fd0,2025-06-12T16:06:29.520000
CVE-2025-47108,0,0,357230c30613137af807a607a4225bc350d8e27b93f9449fb985d3fecb4482a6,2025-06-12T16:06:39.330000
+CVE-2025-47109,1,1,3e0bb9a89273a696beb898e3486e7ab2ca47d2bca622e51b762e7da0ccc9458f,2025-07-08T17:15:36.510000
CVE-2025-4711,0,0,21c8c473cfd0b8fb70049ba4f98b86bc8037c0e94662198ff53f909236b4a0c5,2025-05-27T14:10:06.050000
CVE-2025-47110,0,0,49c43ccab82e39b25d7ea4eb4a55b915a9288677ae6614bba2550a2fb650411d,2025-06-23T19:22:00.757000
CVE-2025-47111,0,0,f862b1a532c10c94153382c9f09de619d358c8d3286f2fc1c19899801eeb930a,2025-06-12T16:06:29.520000
@@ -297327,9 +297346,10 @@ CVE-2025-47149,0,0,2734c76650c27423981403171e8ba8344bf60f54ddfbffa7869e6a96d7489
CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a14,2025-05-27T14:11:05.693000
CVE-2025-47153,0,0,1bca3f0c72274ce4b4c023a8e0978fd82f9f0090c23ca3f26eaede96af2bc369,2025-05-02T19:15:55.930000
CVE-2025-47154,0,0,6a55c646b5911b6b02123224674cd90dd2e3787c01df5f2ac266b60ca2d454e0,2025-05-02T13:53:40.163000
+CVE-2025-47159,1,1,c77623cd41d9d2ae5218502eb399cdb493dfc8432a75b9b6080f90774133ea66,2025-07-08T17:15:36.730000
CVE-2025-4716,0,0,dada52e8c94f58b9450b0b4a9bdb43e377412a57e7caa3e8191e329a90a55c88,2025-05-27T14:11:12.623000
CVE-2025-47160,0,0,a0673bfc3377f6149f8100847033ce8edcd97adbbe55dd8bae4d51e9d9ba5734,2025-06-12T16:06:39.330000
-CVE-2025-47161,0,0,c57678455db85a0578aecf2074b58b5fee35a3f62106f7b1cd95a7df17ec9499,2025-06-04T20:03:05.893000
+CVE-2025-47161,0,1,b68b6000e33589ce1a4cd207bf8a4eaa6d5ee09a184dce990cf542f1a7590a6e,2025-07-08T16:15:57.937000
CVE-2025-47162,0,0,394a92160bf2a8cb9c2786cfe2bbc04322d831934a516fc7b7331a5b8fc613f9,2025-06-12T16:06:39.330000
CVE-2025-47163,0,0,344f56604a4e5da53d1a7da50659c1824bee236748150398c9d878ca496ca6de,2025-06-12T16:06:39.330000
CVE-2025-47164,0,0,93a9eacc3af6e4faa9a4312187d7d9803de41e8cba858f424de197ac7e101f4c,2025-06-12T16:06:39.330000
@@ -297346,19 +297366,20 @@ CVE-2025-47173,0,0,5d75f5220b0259e8056020c15ebac61f0eeb1193b35b182ff411ca93f5af1
CVE-2025-47174,0,0,c1efd64e9e1c5f4db9a5033f7070a691bed68a3bab33a1ee6ad8c971410f57b6,2025-06-12T16:06:29.520000
CVE-2025-47175,0,0,06098afed8be6b994b919d2f93f5e3c4832424f2b662d530a338d29d0a81d1ae,2025-06-12T16:06:29.520000
CVE-2025-47176,0,0,d5024465ca52874cf0a4883f1ede98b76c7f64792ce8de66ef4e198a8bb58837,2025-07-01T16:50:53.030000
+CVE-2025-47178,1,1,8e44ef7ef256cba14bbdda66aa467977a8c2b1063b0acdd0730748e970af18fa,2025-07-08T17:15:36.937000
CVE-2025-4718,0,0,e197120a33051d36a3bdf1b0305cf7de5c5f5941a30eaf0eb2f8e25b8c33d5d8,2025-05-28T14:26:27.280000
-CVE-2025-47181,0,0,aa11c9243cf9f21606fed813a8d7013ca1fc81a1699c797c7e93c8870c1ba872,2025-05-23T15:54:42.643000
+CVE-2025-47181,0,1,0dcaa7da62eb599bc0c4884b7faedf2756f0f5de47436d94bd3a1a0bf83ba2ad,2025-07-08T16:18:17.580000
CVE-2025-4719,0,0,8f45404e8c5e0b5372b6c6d3c18e425f04bef83b0b8978ee2807105e5fc3ce21,2025-05-28T14:26:35.423000
CVE-2025-4720,0,0,ab92b1fc5d01e1f35f68c76c8f5bceafc841c3ab0985f1035de502421e632bac,2025-05-27T14:13:08.100000
CVE-2025-47201,0,0,f7da15483f84676db296d7fc167792c339031bbfa11c378fcc7b75aaf9edeb30,2025-05-07T16:51:09.947000
-CVE-2025-47202,0,0,d95db89ee2675c9011712d80ce0270e53a0f128466dc557720d5340c9ed37f27,2025-07-07T16:15:23.943000
+CVE-2025-47202,0,1,875283b0f66f84110b7eab666e9ec4354ba71d80ce109cc1aaf1cd1c53bae1be,2025-07-08T16:18:34.923000
CVE-2025-47203,0,0,5affb412d65195e809b09967884d230d1db85b53ddc355815b9628e8d17b2453,2025-05-17T22:15:18.390000
CVE-2025-47204,0,0,1087581499a2135246bfaa4b4dda36ede5f4134f69e3bfd8a83443409525f3f7,2025-05-14T14:15:30.460000
CVE-2025-4721,0,0,5b12152a812ee0a8141ca92ad1ce07fe54f58122d1a25434c4f23dc9f9b473ec,2025-05-27T14:13:32.497000
CVE-2025-4722,0,0,7a9f4792d9d2d1bd9669bfc9ead090bdeb53cca7dd5e461fb6c113463a0e9c32,2025-05-27T14:14:15.353000
CVE-2025-47226,0,0,9e9ee9e6a0d1290ebfec3cf4efbf332e325ff8173805761710078650f408fa82,2025-06-03T14:44:17.277000
-CVE-2025-47227,0,0,152a34bf0f6054b7f9d43ed099a1887cf4e8c1f4b975db425f9c84011151454b,2025-07-07T19:15:22.940000
-CVE-2025-47228,0,0,f71e0d21d92923eb316422827311b4b252771137653f01f5a61e4e310378d004,2025-07-07T19:15:23.100000
+CVE-2025-47227,0,1,8cdd07b4f7b039faf439f8f1eaffc0aa579e166ffc7a0d9d26fe58394e2a2591,2025-07-08T16:18:53.607000
+CVE-2025-47228,0,1,2924f034ec538bc4a1f5b57929cb77b258bf35c98bcd55dd7f85d3847e39972f,2025-07-08T16:18:53.607000
CVE-2025-47229,0,0,ce628b1ca08883508604ad35fbd46640a7a9f93ddbaf98a26f657b9032cc95b5,2025-05-05T20:54:19.760000
CVE-2025-4723,0,0,0415daa35bafd9e63de1b551374da44563d1be8395330dcde3975fc4eef0ad28,2025-05-27T14:14:25.467000
CVE-2025-4724,0,0,22ef6d583945f18353bdb4e3bec008d3a4110d3da2137080faced1b57a1b5a5d,2025-05-27T14:14:38.270000
@@ -297390,7 +297411,7 @@ CVE-2025-47284,0,0,927b09b86a7bb19dbf3e9d0808f921b2d28747e702e8d9ec13ede5b5a7267
CVE-2025-47285,0,0,a4b322cfa16ac0198aad5626c2233334a81e0c8124806adefa631e6ad6b3d8e6,2025-05-16T14:43:26.160000
CVE-2025-47287,0,0,4a03b7a85e9f4f1ae469c2f4edaad7e40d35a7308b2c4cacf7afd6a1813a45c3,2025-05-29T06:15:23.090000
CVE-2025-47288,0,0,6240d445f51e80c803629b9dc8b3ffd9c4606efb6ef121520c5379fe5f8a49d8,2025-05-30T16:31:03.107000
-CVE-2025-47289,0,0,7b2d07b9276f372c016937ab57524a13f28f549ea01f02462a8a1601753f897f,2025-06-02T17:32:17.397000
+CVE-2025-47289,0,1,21262127c679cd8748d54b62f2e53659b097cc1c7c81693ae8e24c5b40a305e5,2025-07-08T17:09:14.273000
CVE-2025-4729,0,0,516628fcb168c9a086e8a38e372db03130e187aa10d82a6a9cd8ec99d5a1ef49,2025-06-20T14:10:00.287000
CVE-2025-47290,0,0,fef9205d946b23690e870377651d8631936053bea9e3a05a823cfda120b52c00,2025-05-21T20:24:58.133000
CVE-2025-47291,0,0,77c2613c093f23da4845bc4516f16594af2697fccb6f4c62fbf6122c314ea551,2025-05-21T20:24:58.133000
@@ -297423,7 +297444,7 @@ CVE-2025-47418,0,0,bdeebdcffdfcfa25a9c3fca2d88b0ef86304dd2bce949cfa926a70785bd61
CVE-2025-47419,0,0,fc776138a91094c8a7b58fa141974765a03e9710eddfe22ed3c577752b353134,2025-05-07T14:13:20.483000
CVE-2025-4742,0,0,ee2f2c0b14e93f0d64b20a7c52ca41f5d96685f95f979ed4c5b911d5d1c284ab,2025-05-16T14:42:18.700000
CVE-2025-47420,0,0,c1bc73f65501af2caba4c7542063041141320145e66b4cd312289b27bba5f98a,2025-05-07T14:13:20.483000
-CVE-2025-47422,1,1,f0e62863c52f45a53fa18044cd18d98a6ac48dd38f88c78fe209748ce2743723,2025-07-08T14:15:27.997000
+CVE-2025-47422,0,1,79cf1edab21b7689d22de2740d5aa6f2cd439f22093b3e706eca3fac9602d0cd,2025-07-08T16:18:14.207000
CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021365,2025-05-08T14:39:09.683000
CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000
CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000
@@ -297471,7 +297492,7 @@ CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375
CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000
CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000
CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000
-CVE-2025-47479,0,0,615afe1b3b815594c76d8b7f5cd63272f49df020e558275a50ea30eeafa0e272,2025-07-04T12:15:28.530000
+CVE-2025-47479,0,1,d4b44d4013061dc7dd2950919f2b3009a6e3e076483c8ee2d76f907cae36db4d,2025-07-08T16:18:53.607000
CVE-2025-4748,0,0,d72b1fc830074b164b8acb25ed3eaab3cb637a77bda96fbcf4a4f78a30586787,2025-07-04T10:15:23.127000
CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000
CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000
@@ -297560,7 +297581,7 @@ CVE-2025-47561,0,0,8b050526c8237fe36193e74cf309358734a02806bb21757e1cf72a029c892
CVE-2025-47562,0,0,879496304ffa94481070c08ba70f4beeb80850bcaa0cd491262f65c2fe9f8f35,2025-05-19T13:35:50.497000
CVE-2025-47563,0,0,72acd05048e66bf43174d423048963fa4336cfd5d05a950e28ccf6a586953f28,2025-05-19T13:35:50.497000
CVE-2025-47564,0,0,758c7c233976a079425cfa725a742dd6e7231873de27eacf12a1e47dc13257f8,2025-05-19T13:35:50.497000
-CVE-2025-47565,0,0,8b16b5c755075c3dcc98667be5e0b1272b5f8108f52b520047a7220b1bb94e13,2025-07-04T12:15:28.720000
+CVE-2025-47565,0,1,cede3cf1101ac0e34b33e2fef26efdb4bc22e6e21569669ba57fca2311110998,2025-07-08T16:18:53.607000
CVE-2025-47567,0,0,8bd59bb6ff8c472a7ea16c76eaaa9fb8be8e5bf93dec95aa6197eaff663abf08,2025-05-19T13:35:50.497000
CVE-2025-47568,0,0,f480586aac65d539368cfac805d522668510a1666c047470abdbd253c43ea3fd,2025-07-08T13:24:03.987000
CVE-2025-4757,0,0,aff32a5dd8531f1cf16b47f2eaa3e2f3dcb4fa067452c943f1a1e24c22fb61c9,2025-05-27T19:49:21.437000
@@ -297619,14 +297640,14 @@ CVE-2025-47623,0,0,adb1ced070dea01b2e40fc59b84823c3de3af7a1cdf4dc4cba34ff48b6ead
CVE-2025-47624,0,0,3dbfa0dab0132de797c9a5cab8ee76ac7a93263d3ebb72f7a44909996daa6ae3,2025-05-12T20:13:02.450000
CVE-2025-47625,0,0,b879c66726c7cc8f91a62e5cada6922da2027387107c601a854ac60f809d11a1,2025-05-12T20:12:01.663000
CVE-2025-47626,0,0,bf88148a7c502f96131b60b77588d57b9b40344b978f3b708b521e2614a36d54,2025-05-12T20:11:39.513000
-CVE-2025-47627,0,0,5fd600955760d79ff9ca897e818c88517f566fac41c0fc13577245730938bb0c,2025-07-04T12:15:28.917000
+CVE-2025-47627,0,1,00a7466682c66aca9ca74703a47907f16b1cec86283da1c7fdf944d0847f35fd,2025-07-08T16:18:53.607000
CVE-2025-47628,0,0,3a352204d5e4cc12d5ce2e2e1ea3da85e25e0eb47c6bbea20c8b5b637fab879d,2025-05-12T20:11:13.080000
CVE-2025-47629,0,0,68608bf59b09b45aca1dd6b501b7a877b54d1b0c440b69b9904797f74442993a,2025-05-12T20:31:08.413000
CVE-2025-47630,0,0,f790609ceecba739ddd28929a03ce3e7133470ecda92675205e840ef8b22ebf4,2025-05-12T20:00:07.693000
CVE-2025-47631,0,0,12034c51ff11737e86761439c9b9dd9575d84000baabff3044b7eb2f26d9fba4,2025-05-23T15:54:42.643000
CVE-2025-47632,0,0,ee2719cb952cde93b033c00cf78ab6f3291285f0dd8209ef8af4b77a88946ad6,2025-05-12T19:59:39.963000
CVE-2025-47633,0,0,fe0fc967b6a437fc51271e1790c541fcb665c108db49d6bb16969242bddb37dd,2025-05-12T19:58:40.697000
-CVE-2025-47634,0,0,c6b1d110661276605da1933fb0ab64363540b5164dca315fb3a12b7eca92052e,2025-07-04T12:15:29.090000
+CVE-2025-47634,0,1,4c4d8d40e131abe90b344a41a91d600f678cf3b7300fd4b191d14af55d2fc79d,2025-07-08T16:18:53.607000
CVE-2025-47635,0,0,2d332eb90b47618ac710d319d79594887a0d45990abd9224e46e68d15f534de4,2025-05-12T19:56:54.593000
CVE-2025-47636,0,0,ec0e283d6103bb393c29402697250981cce8cea83f07c93c3c7a0090b2e210ae,2025-05-08T14:39:09.683000
CVE-2025-47637,0,0,57e63b481c7b92bcd190b336ab47b8c4dd17f9a48948c3115cee252776f48397,2025-05-23T15:54:42.643000
@@ -297758,7 +297779,7 @@ CVE-2025-47786,0,0,04d15aa36906f407ce9503b5e85686cf0003a20f24e1aaa4e03a652f6d18b
CVE-2025-47787,0,0,8b3f006971f3c77e8bfe09c8095c5ff79a4ccd86822488783708679fc0bca11b,2025-07-01T14:42:21.900000
CVE-2025-47788,0,0,6b5e38cbcfc946bfd59d42d46514cb0def4592e040d374abdc709005316d2f44,2025-05-19T15:15:25.200000
CVE-2025-47789,0,0,45dc770bb0c94c5e8c48030b8884b90c652471ebe6c8c411f93ca31ef83185f9,2025-05-16T14:42:18.700000
-CVE-2025-4779,0,0,e76da2c4ccde5f0f2dae7a8b55398d14c015ceea85d1e38685454ed6f4b4b6fc,2025-07-07T10:15:28.717000
+CVE-2025-4779,0,1,37d7247e0fe5eee9fa98a14dd2b6864ec406936052558ede1d69139a317b9b48,2025-07-08T16:18:34.923000
CVE-2025-47790,0,0,a6351ab24f93f0d386dbb08791d6aca496319ae8a2ceb95e2ce6b8ad46d620c7,2025-05-16T14:42:18.700000
CVE-2025-47791,0,0,ca1f70ef41d3a1ed585c10f4aaea46f0cbe8cd3b5251cfe28c38668da573721f,2025-05-19T13:35:50.497000
CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000
@@ -297803,7 +297824,7 @@ CVE-2025-47867,0,0,14e2cf9dd2acec794c23657550e3c1b9bd4e4597f7bca79912fef0473d628
CVE-2025-47868,0,0,7d45f71394cd4e814bf9adbd59715289451e7f856f9c04c62ef1dc6407182eaf,2025-06-17T19:38:08.090000
CVE-2025-47869,0,0,87cf7b2756f82b852d422d0cac688ddf635ab90d079f52e49077b6cd1e9348db,2025-06-17T19:37:52.710000
CVE-2025-4787,0,0,70171c374cc28e10623f3aef3f6906d1bab0599aa174f66a1665228af79ea2e4,2025-05-23T14:02:33.847000
-CVE-2025-47871,0,1,4602378ffbdbc5c43d8f9876c962b8f53ea918033257eb55461a1716bea231a2,2025-07-08T14:11:33.783000
+CVE-2025-47871,0,0,4602378ffbdbc5c43d8f9876c962b8f53ea918033257eb55461a1716bea231a2,2025-07-08T14:11:33.783000
CVE-2025-4788,0,0,6549de8473f891daf65760389e77371268c3135604d761cfc045c33ff9e38a07,2025-05-23T13:40:39.103000
CVE-2025-47884,0,0,4a77a59ba7de92eec80221a3e38c584f28852ee782b873242f9a5e28747dea9d,2025-06-12T13:48:38.967000
CVE-2025-47885,0,0,80b2e1a1af2aaff734bb418c3664bc2c762896925ab29daad3d30426b2aba81c,2025-06-12T13:47:54.280000
@@ -297859,14 +297880,38 @@ CVE-2025-47956,0,0,4cfbb5c80414a8087e31896e372b9fd004884a02d7d93ff8e8c0afdf43efb
CVE-2025-47957,0,0,d341d88d759563a3f4399c0cc7c0be250d6a4f712ee86a86b2c4c607955a9838,2025-06-12T16:06:29.520000
CVE-2025-47959,0,0,0fbc344af7988c6894e76b48842d48c9ca915a33b285f343b6a8f1686805800c,2025-06-16T12:32:18.840000
CVE-2025-47962,0,0,64809dd00f9d5b807d7efd01d36b41cab6d31f95db8109d1860d103458dc1142,2025-06-12T16:06:29.520000
-CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8d40,2025-06-06T14:07:28.330000
+CVE-2025-47966,0,1,6a6afa232c1f0d52c775fe5438f2a5af5e3f92fc5beb02f863c1334d297f5394,2025-07-08T16:26:34.813000
CVE-2025-47968,0,0,48e32d06263bafbf6ecc51f7273b9f56a0afb5687cda944ea2120c61b19da819,2025-06-12T16:06:29.520000
CVE-2025-47969,0,0,dbc316bedc2c917fa3194c4717cf8135b692ea4432a3a91aa236c81eefdd62b1,2025-06-12T16:06:29.520000
CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000
+CVE-2025-47971,1,1,634f3daf5e12d4b4057300e32402dff39c4429f9365d7e5678340d6d8ad79987,2025-07-08T17:15:37.133000
+CVE-2025-47972,1,1,0c42f939065d1e33a6d0b0b18cf9e4e04f955c10ed7d43d3f6716fb1337014dd,2025-07-08T17:15:37.350000
+CVE-2025-47973,1,1,9a37838aa270b2400c0de9e698ccaa3b7c70ff237b3fd1b2f9a3121b8a7182f2,2025-07-08T17:15:37.560000
+CVE-2025-47975,1,1,794bec8101839e31859f882846c88a51332385b92e9352fba0e64deadab865bf,2025-07-08T17:15:37.780000
+CVE-2025-47976,1,1,c7d899a84e93a01f95fe7bdd083ba761f2e6ad20ae877cda1e1eea9ce7099a5b,2025-07-08T17:15:37.993000
CVE-2025-47977,0,0,6af34889dac57a1045af91e7f2de348d68f235294a337b157e1847f7cbf76bb7,2025-06-12T23:15:21.750000
+CVE-2025-47978,1,1,6e6b7ca6ab88bf11c619f3ee08a9f3dcc2a5215994ca016d5ce385bf49a8138b,2025-07-08T17:15:38.217000
CVE-2025-4798,0,0,9b8ab9289111a0871d3e91905c5a349bd176b84d3e9fea635596f2bb2a26aabd,2025-06-12T16:06:20.180000
+CVE-2025-47980,1,1,80dade523e3982bc9c455a3a18f8179cdb7bc6be0c80dc368eaedf5d7809ac40,2025-07-08T17:15:38.417000
+CVE-2025-47981,1,1,edf568480f5fc1c1498cc791f49eef0c6bc8b39dc17e212a385cc0c87141ce87,2025-07-08T17:15:38.633000
+CVE-2025-47982,1,1,b07b49b5a197c3aac6ca3e64c03281e8b0f8b3cb244fffbcd0530fa646e1dc22,2025-07-08T17:15:39.287000
+CVE-2025-47984,1,1,5e30f23350d10990217520274fc89e55857bc5eb2818c4348b4b5715b02d7841,2025-07-08T17:15:39.503000
+CVE-2025-47985,1,1,19cabb4990609fb74d5434db375e6c94b51de4dbf581b5d94024e0805feaaba5,2025-07-08T17:15:39.723000
+CVE-2025-47986,1,1,3844c987158e3aa9332129cb6b6a0522abbffaf5161a3ae2377976deeeac6306,2025-07-08T17:15:39.950000
+CVE-2025-47987,1,1,66f50ea6eb2807ca7b88af8ecbfbe637ded199bab0e3322383970b137e463826,2025-07-08T17:15:40.177000
+CVE-2025-47988,1,1,40a675d752eb358f1b824babc1aa0b8f6cad68d26a8372dab1699f7b6d587337,2025-07-08T17:15:40.387000
CVE-2025-4799,0,0,56b141b743a0e8f3c153238f20486ded6761fbaaa02b2456251586a3e9220d5d,2025-06-12T16:06:20.180000
+CVE-2025-47991,1,1,18f29f21f583cd2127eac10bbf7e3fa2332affe6a8507446d26fc2978d0c1e20,2025-07-08T17:15:40.590000
+CVE-2025-47993,1,1,b5c3a7a2ae93d5b2f1b2d448645bfe9eeb992e803af611417e3097cbdc4cdf93,2025-07-08T17:15:40.800000
+CVE-2025-47994,1,1,4522d8fbd9e1077c0aa7300d9da8400b520b0cea581fe3310496c57377584139,2025-07-08T17:15:41.020000
+CVE-2025-47996,1,1,c609a69f2dc1c4ce942a056d3757264fc8f0be7b6675fef929eae4210c9cc005,2025-07-08T17:15:41.223000
+CVE-2025-47998,1,1,703bdb741dfd9c6810912c693d9416090e8b02e36ce9ae59cea3edaf8ae24dea,2025-07-08T17:15:41.447000
+CVE-2025-47999,1,1,8ddb41f349a1957d58de969b45ed7e65671f6988d581b3c8875a90c49a55f760,2025-07-08T17:15:41.657000
CVE-2025-4800,0,0,9318c6df70d36b773d7fc889153c4ccced0bd2fc6ace455b4d54f9e1c185a4a9,2025-05-28T15:01:30.720000
+CVE-2025-48000,1,1,94c45565b0953948ee905ae15a97963998e77c100d27967296f860b60e40930d,2025-07-08T17:15:41.870000
+CVE-2025-48001,1,1,238db1895ea4300e6b05c63d9de5d4bb2826e7d43b43fffb405ac0cc72aed159,2025-07-08T17:15:42.100000
+CVE-2025-48002,1,1,2914bed912c8c06ac705255d0b76d4805724bc60eb695f2e37e35d9cc1edfea2,2025-07-08T17:15:42.307000
+CVE-2025-48003,1,1,ead4366e30f970cd4139241a29b886247a87e6250426cf1c010cc302c50595cc,2025-07-08T17:15:42.503000
CVE-2025-48009,0,0,9bbf54dd866dd4de365cacd3cc58cc80c0cc2d2ba8fbdc821eac253715a62cf9,2025-06-10T15:29:32.900000
CVE-2025-4801,0,0,fc6ec83b7f99dbba6d1228da70489464cc23b7a30d8f01ad6791644a180c4530,2025-06-10T16:15:42.923000
CVE-2025-48010,0,0,4819d2e93ad3442257f70fb7864093e1a4200a7b0a7fba4a346e3f36d3da9e5b,2025-06-10T14:13:51.267000
@@ -297957,7 +298002,7 @@ CVE-2025-48147,0,0,d66fc5f0d4a515039630f4bce27a90f7dd008308f73336ecb1c7033f2767d
CVE-2025-4815,0,0,31cc1cd9ba179e2e20111ed224a5d1f55b5f28081bf7ef82d4c48c2315ce9fb6,2025-05-28T17:08:54.983000
CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000
CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000
-CVE-2025-48172,0,1,9646232463f147a84c32e617306252fdeefc3a32bf1d138e12055e184ec2ea19,2025-07-08T15:15:28.330000
+CVE-2025-48172,0,1,8b5a1f2db944c441fa5428ed217e36394a6d3f797e3e99d3485e22daa9e2e9dd,2025-07-08T16:18:53.607000
CVE-2025-48174,0,0,c3e8083f71af16819d1dd271b42b6299c82ce55401fe37929ced2b9ea25ef1fa,2025-06-04T20:02:37.147000
CVE-2025-48175,0,0,c27d60fa36a5115b45f4438bfaf90b1bca9400541c8b0eefea9c65d281f833e1,2025-06-27T15:21:28.030000
CVE-2025-4818,0,0,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000
@@ -297976,7 +298021,7 @@ CVE-2025-48207,0,0,76c33189882fc278de738df7a6b1dc2c788c6db5fb8f29781ff8867125eb0
CVE-2025-4821,0,0,92d368bfa18cafd9d05ab7b7ed7a6b97809179bd232f0c3ad9a1c2953edd3a1d,2025-06-23T20:16:59.783000
CVE-2025-48219,0,0,98450c06dbf29b24b552934a30418d25f24643ea5ccfd103ca30ed143612ddbc,2025-05-19T13:35:20.460000
CVE-2025-4823,0,0,283f31f86f82bdb204520c6735b8d24ab48777f5f8963f659a2cf1ed36292c4c,2025-05-23T15:48:37.327000
-CVE-2025-48231,0,0,3243a1c08fbdb148b972cc684caa08dbcbdf7095ea97e5fc007d873d265138f7,2025-07-04T12:15:29.280000
+CVE-2025-48231,0,1,efba9792eb511ba2fa521c16d7032fc3420b0491533ffdd38e91e85a43867122,2025-07-08T16:18:53.607000
CVE-2025-48232,0,0,80ff2e8338291ebd304eb653c59213914ff7845248a459b3e90f05de1679bb9a,2025-05-21T20:25:33.823000
CVE-2025-48233,0,0,a70aa48121179191c73aeba86b3a3e5f6d9ae6b94ea09863a6836bdeb088521a,2025-05-21T20:25:33.823000
CVE-2025-48234,0,0,de1834686011353e4f79735587df8299d0afcaa9c087afc26be22ac4627cd62a,2025-05-21T20:25:33.823000
@@ -298062,7 +298107,7 @@ CVE-2025-48346,0,0,df44a636fcb8a95eb1777f4620f7844fd80604e2a21bbe85a4714ec18fcfc
CVE-2025-4835,0,0,2f5ad6229d5b9b413e04a81b59106e5a85fb8d33f4f22cdfba9946f94435c0a6,2025-05-23T15:50:01.543000
CVE-2025-4836,0,0,381a21f4fc668a982c9ea0d6a5f4b8a8152eb0ca75926c09f17075729aa073a9,2025-05-28T13:54:46.070000
CVE-2025-48366,0,0,c4b55aab61c20a48c9f4f35cfff88c4f001aac74c3c0fe509ce92338a5a73cf2,2025-05-30T01:17:53.250000
-CVE-2025-48367,0,0,776a8c467327faff393fab0252264a4197383d5cdcda42307ab5c3c2593dc511,2025-07-07T16:15:24.063000
+CVE-2025-48367,0,1,44d310c64b4420e74e85374c67b36b95f0c9e84a38ace60584873a766584b647,2025-07-08T16:18:34.923000
CVE-2025-48368,0,0,7aa43beebddc67e05e855de1c853e16919a3051539d389fbfeaded768e9a7691,2025-05-30T01:17:44.430000
CVE-2025-48369,0,0,576d533c9ddbdbacc2f8abf33153567b9e0e45e4d6d1bb54beb34c6dbf2139f3,2025-05-30T01:17:25.770000
CVE-2025-4837,0,0,97165344a1aaa334dd7151b29efb73d1ce1ef6112299500e4f1c0dfe72af4861,2025-05-28T13:58:35.157000
@@ -298152,7 +298197,7 @@ CVE-2025-48494,0,0,0329dcb313613e53f258f49f9571ad3f690e1a097f931b0aba423ffd21693
CVE-2025-48495,0,0,231a0a2df8efd4f811988b128f1772192e88580d1043466f8b361c6491441d56,2025-06-02T17:32:17.397000
CVE-2025-48497,0,0,87864234e61d762b45107c5a61a3b1913d445c275f7eb7f6e202fd8227edee1b,2025-06-26T18:57:43.670000
CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000
-CVE-2025-48501,0,0,2b57303455e9608f6b6f7e4d40c142e0e71a065cf9df20bb51ee33107d125d6f,2025-07-07T05:15:41.913000
+CVE-2025-48501,0,1,5c57adc3870af6b8ef95f48e7913473030230717b94ab82a9be37e526f077c85,2025-07-08T16:18:34.923000
CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000
CVE-2025-4852,0,0,9fdc9f5e4228d0479c129fbe9c7f799e549cc0e36b5c79452a30c2f45481eb4e,2025-06-04T20:10:34.490000
CVE-2025-4857,0,0,b8cd444e0175beca8d40133df431ce226233c6568d6b88387b6a31033e9026f6,2025-06-02T17:32:17.397000
@@ -298173,8 +298218,8 @@ CVE-2025-48699,0,0,44d8862507c41a93f498ba4b6a9317982afecdc3e0eb3976f21c5759c7dad
CVE-2025-4870,0,0,b9975f7dc89af7cfd09d0fdbb811b050a9e4120a956157701f81e28626493a8c,2025-05-21T19:40:16.293000
CVE-2025-48700,0,0,fbc83b54f94113b037c3a49d9b26f8a3ca31d5c6cdffa629cd5cdb1667884919,2025-06-24T16:15:29.037000
CVE-2025-48701,0,0,35aa8b81bef67a8b475084f139411c80773326ef7d953cb76c543e9e2bb840a9,2025-05-23T15:54:42.643000
-CVE-2025-48705,0,1,3b069502956cb6d5483858210e4d04c3f8625df0adda679c58e63091bbf500b5,2025-07-08T14:32:25.393000
-CVE-2025-48706,0,1,3349ef920a170cd95999b04241686d934123b5e89f5df0438e336ebcc42ff437,2025-07-08T14:32:12.930000
+CVE-2025-48705,0,0,3b069502956cb6d5483858210e4d04c3f8625df0adda679c58e63091bbf500b5,2025-07-08T14:32:25.393000
+CVE-2025-48706,0,0,3349ef920a170cd95999b04241686d934123b5e89f5df0438e336ebcc42ff437,2025-07-08T14:32:12.930000
CVE-2025-48708,0,0,2f2ee7f6835a24101b8f2fad92720fa7e2d2cfee9343296271ef3f76df75e315,2025-06-20T17:13:54.913000
CVE-2025-4871,0,0,d9183a6ea5a2afa28642be53d20b661c6aa8059e9e6e695046b3eafadb08ebe3,2025-06-12T16:27:46.547000
CVE-2025-48710,0,0,f0402bb1ed6d8f6e40d35a516c63ba6d11524553c0fc1bb2ee868d959afc0447,2025-06-04T14:54:33.783000
@@ -298222,9 +298267,32 @@ CVE-2025-48794,0,0,0f60a10fd5bbac90e9e184a916afa3ee1c6a6178325620c93725d026aac18
CVE-2025-48796,0,0,5c467d1a2669d77ceb69e55cea05d09cde2aaa034119240321683e5490565638,2025-05-28T15:01:30.720000
CVE-2025-48797,0,0,0f610e462fa71aef647f917d9ca4275a49e1477214074f960a230a5c09486644,2025-06-25T01:15:23.097000
CVE-2025-48798,0,0,cac8dce99c388d73bf7ccb75438676e428ef366daee3945f14aef371aef27da6,2025-06-25T01:15:23.220000
+CVE-2025-48799,1,1,90e47c896903c581e5b8eadcdab17f055d6bdb9ccf822d05a478f7380e3b17d9,2025-07-08T17:15:42.720000
CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000
+CVE-2025-48800,1,1,bffa01c2c1c4aec6434a05ad3bc1c817f6ea616c9ea315f8488d41d8791984a7,2025-07-08T17:15:42.920000
+CVE-2025-48802,1,1,7a37bd4e84801738bcb062922dc2ff5c65827961c40b5843c7670ab8a07cfb32,2025-07-08T17:15:43.130000
+CVE-2025-48803,1,1,1330fab805c228fee21878659c3d93a4e35911407026a800a03a6e4dec2203c0,2025-07-08T17:15:43.330000
+CVE-2025-48804,1,1,f2888d720ecd76fb0124d4430926a739c97efc5c9466e2d08b342b6880aee5f7,2025-07-08T17:15:43.543000
+CVE-2025-48805,1,1,7963b211ed50749c87b08dc5293e5c28ec56f737961de2e5f35ce53cf4599035,2025-07-08T17:15:43.760000
+CVE-2025-48806,1,1,d533a479b8b3986c0ffb379693a128aab1379d306b310864878f5c4c94196510,2025-07-08T17:15:43.973000
+CVE-2025-48808,1,1,ec48e18951d72d23e24ce2295ab47ffe9eb3db260afbe49702b78989d2dfcf81,2025-07-08T17:15:44.197000
+CVE-2025-48809,1,1,3469533d3be980f44f3591947ac5d3a20c5a7405a2811fc74c316b187dda2bac,2025-07-08T17:15:44.410000
CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000
+CVE-2025-48810,1,1,f1f984dd4fb79c5a478f03c9356103964cceb7c0291c219c0b8ec9b59797f956,2025-07-08T17:15:44.607000
+CVE-2025-48811,1,1,283b1fe82e784e0337135dad565f71b1ff5f632aa9a910b851bca527612668f1,2025-07-08T17:15:44.800000
+CVE-2025-48812,1,1,07baff925b61dde5400b44d1124ad87575b01997288a7c6f9939a03c9ebc18ff,2025-07-08T17:15:45.023000
+CVE-2025-48814,1,1,c510dcee9c0302c04be33acf4b98a8677aa4c013f382c600a98535a762925970,2025-07-08T17:15:45.220000
+CVE-2025-48815,1,1,f83327a8b9b703a710061bdcc31ba59a4277e524bc696c642df7a9aa716a4192,2025-07-08T17:15:45.433000
+CVE-2025-48816,1,1,245cbb5ba77faaf663d6dc3f41014a9598686a6a77e32bb30e82791ded30c68e,2025-07-08T17:15:45.650000
+CVE-2025-48817,1,1,ace08977509e897b5ee9c4eb52098630195e6e17c52de456f61b9fc666957dfc,2025-07-08T17:15:45.867000
+CVE-2025-48818,1,1,b9336b7574a89374cdd4234adb18c99de24260f5e3ca64853287fa485b8b7884,2025-07-08T17:15:46.120000
+CVE-2025-48819,1,1,fa42257bdcadfb053ba96c50694fea26e4e9e435826225dc6fbb8cb97ac2a43f,2025-07-08T17:15:46.420000
CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000
+CVE-2025-48820,1,1,2e74f9f8b2d9ed11788b951bc950b24854e2b9893f9159467cb30595952cb6d6,2025-07-08T17:15:46.933000
+CVE-2025-48821,1,1,1a4d95f816f2f2758b65238f9bdb04ca33836aa135fc96eef6e93d6113635de8,2025-07-08T17:15:47.143000
+CVE-2025-48822,1,1,2d5b55fe88eef162906b8c5adfa17341149d03e7f5fff0103a19782e06fdedfc,2025-07-08T17:15:47.363000
+CVE-2025-48823,1,1,d34eb7a41dc7225b081e7e5b123d9aeebbd61fd7cf98f64876707e9f8f0e8621,2025-07-08T17:15:47.580000
+CVE-2025-48824,1,1,1dd7dea5e40a16323be3275b42e67674f077489ab06ffc014fc46067b7aff78c,2025-07-08T17:15:47.777000
CVE-2025-48825,0,0,449f974167a8b96d483685583b54c55bf8ad97d04b0702624b6d7ca85c1f9103,2025-06-16T12:32:18.840000
CVE-2025-48827,0,0,e2e79ef6a8629053e66e0020881c95eca4862508fcd8019d12aa8f7c12118ad4,2025-06-25T16:46:46.703000
CVE-2025-48828,0,0,a20d67a6220e199cb76316e65707e3c589202908bfbbdaa1e496c0db70fc2c08,2025-06-25T16:32:38.947000
@@ -298300,7 +298368,7 @@ CVE-2025-48935,0,0,ec5adb238e8b174d884cb3b3a92e9f531a747bcf07c8f8e4c86751e080e4e
CVE-2025-48936,0,0,466cc85edbb9de09c6e53990c33f4edba165b1227854443bbecd0e6313d71310,2025-06-04T18:31:41.773000
CVE-2025-48937,0,0,28f58db3f8621445ae98b44d5f691c0045c9340b2c402374333dbd0a6e714594,2025-06-12T16:06:39.330000
CVE-2025-48938,0,0,69a6b3e527c71a70d204c408cd7b6de2f9d11cdc8bb56708cb8a375fccb4e065,2025-06-02T17:32:17.397000
-CVE-2025-48939,0,0,b47fd6e8189143c747df4ef13035dbb81bc277c373ec11a45dd0905a8f456411,2025-07-03T17:15:39.300000
+CVE-2025-48939,0,1,64252264ddb38d9b3444226c3b4d10507b43578fd4572add5769da470f01a6c4,2025-07-08T16:19:11.700000
CVE-2025-4894,0,0,e203d4bd91eb3e3cb92f624dec258fe2ede19a69c9e41059892032f4ff18f560,2025-06-05T19:39:01.520000
CVE-2025-48940,0,0,b3aaab1b84a9992f91f23a2bf064d896d79e6ee62c280444b9c35716c8f3326c,2025-07-02T15:18:47.520000
CVE-2025-48941,0,0,f132715b6cfbde41787254c74e6c0975c25685806e51525e3ec6973e4851bf2d,2025-07-02T15:14:30.267000
@@ -298315,7 +298383,7 @@ CVE-2025-48949,0,0,fc8b75cb76f12da9c381ba1cbe524a49076c2a7b248109a10affb97261136
CVE-2025-4895,0,0,451159abdd179506166eda92c0cc3ecdcfca15d4a903bf6a2c0ccf029c166653,2025-05-21T19:37:48.777000
CVE-2025-48950,0,0,9bd2df0ec4cad73b40bbd800221619a66c2826a632481e33cf4d06eef25d22e4,2025-06-04T14:54:33.783000
CVE-2025-48951,0,0,3823fc35179c543872b426c4694073d903a5819202e9221b05d29e433592de33,2025-06-04T21:15:40.580000
-CVE-2025-48952,0,1,bba1e57bb4117fc1a8f7c8b0841871640720b379ada9919038de9b8adc869483,2025-07-08T14:15:28.227000
+CVE-2025-48952,0,1,e7b04c79343894ac83e2200ad294182e65e0ff2222abb9818ad84be47e3f750e,2025-07-08T16:18:53.607000
CVE-2025-48953,0,0,70684a4684db41347c8126e913d4ccc37a9d8250a7889d7b10445edb04853791,2025-06-04T14:54:33.783000
CVE-2025-48954,0,0,9a5d9fdbff1bbd7ba308d1268f50bac1e3ed28dbf527070a93b616756ee29907,2025-06-26T18:57:43.670000
CVE-2025-48955,0,0,560b04619e43ec6eda07e48b947f9bc229ed274e024fa427eb478249da962f8f,2025-06-02T17:32:17.397000
@@ -298347,7 +298415,7 @@ CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094
CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000
CVE-2025-49003,0,0,1da67ca9b716c123c688161b49fee9912581154838af6d0b1912e10013dd11eb,2025-06-26T18:57:43.670000
CVE-2025-49004,0,0,89d47ac006a07f0278b924493f5a5a2553c688202c5da141c2c812c60b3a1cb1,2025-06-12T16:06:47.857000
-CVE-2025-49005,0,1,1c74bce76e14a7cb4196c0e16584971ff7c6e53cec6bb2f544e81182aa9527cc,2025-07-08T15:15:28.543000
+CVE-2025-49005,0,1,be191c32bceac7880e51077a7bb9ea5b332d3f4a59999223dc86c49fdcd69bce,2025-07-08T16:19:11.700000
CVE-2025-49006,0,0,69cfb489d390e5afe2e42023086b2832eeed6d765863e99bd3de00a5d46a4fa7,2025-06-12T16:06:47.857000
CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000
CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000
@@ -298369,7 +298437,7 @@ CVE-2025-49067,0,0,691f1062539c729cb34ba7b80fbff1950eab310a0c7af6dba9c9e83b1bdcd
CVE-2025-49068,0,0,3797c73d2b9edaa67883a9553985689bdbba75f4cce7b860c4953ec6ac0de3ac,2025-06-06T14:06:58.193000
CVE-2025-49069,0,0,85c17ca27d4707197d4656ead7a2d4a3e357783b382cc504f2810ab6c0682e62,2025-06-04T14:54:33.783000
CVE-2025-4907,0,0,faa33c63c7cecd77dfa79228df8feba1d9b9297d2893ae52af491eb90f07f770,2025-05-21T17:33:11.603000
-CVE-2025-49070,0,0,7ae7d50e458d36d3a7e6b09e87ecdde59e9658fdc5445d514d8d9a3f75528809,2025-07-04T12:15:29.460000
+CVE-2025-49070,0,1,15dca1e90e2437b9ce550dce70a49e3109af5934c5c67670433ec170a2a9d6e3,2025-07-08T16:18:53.607000
CVE-2025-49071,0,0,d041ccf61b0683d3dfcf9ab8527f320aff8ce39f9864d5340bd895447487615b,2025-06-17T20:50:23.507000
CVE-2025-49072,0,0,cc91acb325984d61f014d985d75bbf7e0e9082962c9e96f3405c74646c593528,2025-06-06T14:06:58.193000
CVE-2025-49073,0,0,1520b38b23f181db334ec4a13a2dd7df7cacf51643f5e8d527931755cb4ee618,2025-06-06T14:06:58.193000
@@ -298492,9 +298560,9 @@ CVE-2025-49241,0,0,2f8ca8f8925b1656c1a0c236c2adb9bdd822c30cbb9a4e4329769edc63780
CVE-2025-49242,0,0,bfc4a3cd1ebb15c16b40a39a81f90dfba810f74df400953fdc841286fa11ae74,2025-06-06T14:06:58.193000
CVE-2025-49243,0,0,be422389f0f23c085e3118430a7e87786f59ff770e2372311a2fd00743ac9058,2025-06-06T14:06:58.193000
CVE-2025-49244,0,0,9c68afdf7b0277569dede9f63158f2c34887b825bb13712e05b1b911771e3db4,2025-06-06T14:06:58.193000
-CVE-2025-49245,0,0,e39137fcd71ab8c192d7933bfd51df0dc79cfaf8504f4fdfc77de39d5c489b0b,2025-07-04T12:15:29.677000
+CVE-2025-49245,0,1,06734a968ea09b526ecf1a67e814fff40c989491ebd9fc0191078472b0d4d614,2025-07-08T16:18:53.607000
CVE-2025-49246,0,0,c4f00883a12b7639ec4f097be449bb342bd0c987bc06f581d137de0d958bd000,2025-06-06T14:06:58.193000
-CVE-2025-49247,0,0,b1bdd2f3c645ad431aff3fa0a24e20768434d57f6918defadb9b3cd77eeb0578,2025-07-04T12:15:29.970000
+CVE-2025-49247,0,1,6cd1f448e0650cd76625ca1795bfb608bd321359c8b172cee69eda59b8b26874,2025-07-08T16:18:53.607000
CVE-2025-49248,0,0,db1641a9d43ab4f081dc759f5beaf5cd220fbde11ca36fb8965e1fb35e92f72f,2025-06-06T14:06:58.193000
CVE-2025-4925,0,0,c7c7b57edd485a39535f310e5e884e623df880c83d50cc9504511597c6a8f4a8,2025-05-21T12:58:28.507000
CVE-2025-49250,0,0,427d3d2370ad4ed43da6ad5bd181602d6f79f8a5d6eb3d4e04409b35d996f102,2025-06-06T14:06:58.193000
@@ -298520,7 +298588,7 @@ CVE-2025-4927,0,0,2750a792f3319584debfa65553b14ad85f4e2aa32076ab9798f492c480349e
CVE-2025-49270,0,0,e8f873097abcb2d7ec34af1f5af5f329365db5f98f8d71b00b026f39e6c86d90,2025-06-06T14:06:58.193000
CVE-2025-49272,0,0,0223ce7855dd053f73ca5207582b78d94265515445b553316bae9fb5bbe6c2c5,2025-06-06T14:06:58.193000
CVE-2025-49273,0,0,453f97c5e2432cf4d96c04a3f9b9508448408e0f16b514e0f12be518fd3ced92,2025-06-06T14:06:58.193000
-CVE-2025-49274,0,0,c47e98615623d0b3436894750cda778b58b9503b58501b40792db0a27599711d,2025-07-04T12:15:30.150000
+CVE-2025-49274,0,1,9830c22d44d6118e7e62fb3f69428d21cacdecf011a1c65f59f5115e57dbbee0,2025-07-08T16:18:53.607000
CVE-2025-49275,0,0,dbab4602ee2f48cdaade21f33ea2a245a178ba294a7989698a181ee14d8135b3,2025-06-12T16:06:47.857000
CVE-2025-49276,0,0,ce1935cbdacf71ebc0f030671ca560d22889db5010511583b5cc0037d4678785,2025-06-12T16:06:47.857000
CVE-2025-49277,0,0,f9f318632f85b97a9b391fd3b791134d0b2f9f4c1eb90fe4741410b755d21d1c,2025-06-12T16:06:47.857000
@@ -298550,8 +298618,8 @@ CVE-2025-49298,0,0,073584eaa855bb4ff156a1a6719d633957fe08f33dad454fd79ef7434ddc1
CVE-2025-49299,0,0,9b2bf1000ca705203f3e6ae9b05fdf6cc3eab72aeb70dc1a3fe97834f5f25dda,2025-06-06T14:06:58.193000
CVE-2025-4930,0,0,1d8aea9f3773d4505d618710791bd7bfa563ad02d1fc1ea6085e41b2b87bbf2c,2025-05-21T17:43:31.997000
CVE-2025-49301,0,0,86cb4f8acdf19a6599b96dfb9cc403588373b414144be21a67c9f2d273770a3e,2025-06-06T14:06:58.193000
-CVE-2025-49302,0,0,2f67239e8605e5ccc5ba142f478b1f40065b33de8990d6382abc6df657a0fb9d,2025-07-04T12:15:30.387000
-CVE-2025-49303,0,0,93007861c40bdf680e0dbf24c3725448af6a1ff061fbc7c0fed7029dd36064d6,2025-07-04T12:15:30.623000
+CVE-2025-49302,0,1,60c92b4e7b440695028a1c99572c547c05e8750cf8e310c62fa487f14a48886d,2025-07-08T16:18:53.607000
+CVE-2025-49303,0,1,0e8e6bd612b943750a32423f5cff4ab6b1d8c8941856e2f7602b5b84697db63b,2025-07-08T16:18:53.607000
CVE-2025-49304,0,0,71574b6a3f2d73836fc1fa830da690db23390a1ed2f0b605e183be288fb555fe,2025-06-06T14:06:58.193000
CVE-2025-49305,0,0,01c7b04cb3780a2d125e224028e4607a8e9e800f0ca0370b769c30081e8a05f4,2025-06-06T14:06:58.193000
CVE-2025-49306,0,0,dad0197fc4ad72912c31a8ac6d742d8be718822a2959e5494bcbb0cd92699791,2025-06-06T14:06:58.193000
@@ -298594,11 +298662,11 @@ CVE-2025-49385,0,0,9499db0bac8c8103af9f01ddf5769b40f7275e6c664daaf940a76fd436198
CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000
CVE-2025-4940,0,0,260d8b62a32cfda7d1f9cdbe4bba3d30912c7644fed6c87e919fb1700ed93983,2025-06-12T16:24:13.067000
CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000
-CVE-2025-49414,0,0,60cdf774051915c43d1804468ca2c61ae601825c8fd0140045a8877ebe17331d,2025-07-04T12:15:30.817000
+CVE-2025-49414,0,1,7130c226b3f4f991c9fbd39a04f6aaea40cf5afc004f93d85ba8f270e4bf265b,2025-07-08T16:18:53.607000
CVE-2025-49415,0,0,7d38eade25fb27d048d738694cace447f89049889459c31c86029c0cb0f43d1d,2025-06-17T20:50:23.507000
CVE-2025-49416,0,0,1aaf23a00d8c1d182bdcea4548893a2f9639f93e1cd838fc6136c3fcfd778515,2025-06-30T18:38:48.477000
-CVE-2025-49417,0,0,786668c696a6bca05cacb4babee705d702e23efd7cb3aeedd544c421f5735f94,2025-07-04T12:15:31.003000
-CVE-2025-49418,0,0,2645c7c6dc863ee61bc37103a133e3dc2753df8ba7b7e230450a02147812232e,2025-07-04T12:15:31.247000
+CVE-2025-49417,0,1,1b1f9a853399580c7c9d70d8d36a41364150cfb8e8295eb4caa3b9aaacf8db4b,2025-07-08T16:18:53.607000
+CVE-2025-49418,0,1,79219c5eaa5fce636dc30a24c1f2d2e4dfa1dbbfa1199dbc7ef8661bcc2c7a3e,2025-07-08T16:18:53.607000
CVE-2025-49419,0,0,85038d062ad76809afc89d292d3481b55710d3abc066574e74740256fb04fd24,2025-06-06T14:06:58.193000
CVE-2025-49421,0,0,44f56b132253671d91321e10d79bc87df372212fcb6d1bb27ad166d07a72fc32,2025-06-06T14:06:58.193000
CVE-2025-49423,0,0,ac6ee00f85c55473ab88bbe3e5c40945dd96a0fec218aa704824bc0b0ffc740b,2025-06-30T18:38:48.477000
@@ -298606,7 +298674,7 @@ CVE-2025-49425,0,0,e1fe97c376de5a4e19ac419b1615599b7ee42807d954ef5670e99aa67f018
CVE-2025-49427,0,0,fc8aa2cea4178b9be9c92854da4245673ac0828517420b90ee0d5a6af5e8695b,2025-06-06T14:06:58.193000
CVE-2025-49429,0,0,72e428471408646b43b87d752d84f4119c531c2054284b1fa2ca291913599aae,2025-06-06T14:06:58.193000
CVE-2025-4943,0,0,4340407097d641a732a3d64a65d30b42dd912a533e30289b536536d0a1b67ff5,2025-06-04T18:31:24.923000
-CVE-2025-49431,0,0,e253dbe816eeb412a544244e797f17b31f15a388687846ac846f9db942e5ad75,2025-07-04T12:15:31.537000
+CVE-2025-49431,0,1,c51672966b88b8d356a2d3b2e417535023851840708582e0efebfd8f699c186b,2025-07-08T16:18:53.607000
CVE-2025-49435,0,0,3d125ae356818fb0441581cec3fec2e504fbe1aa0a55596b773f33955c684bbc,2025-06-06T14:06:58.193000
CVE-2025-49439,0,0,2ce45d011a214293b10c77cabcaa7af3e67891d083356380452c41e41d5e5922,2025-06-06T14:06:58.193000
CVE-2025-4944,0,0,9a1f50eb597824061a4527d790f3f67b01a7246be2339b95cef835a527892fed,2025-05-30T16:31:03.107000
@@ -298683,8 +298751,8 @@ CVE-2025-49596,0,0,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7
CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000
CVE-2025-49598,0,0,388fe7ea425620c97395f0a980692153036c5ee134fd73303c8f32af7dfdea32,2025-06-16T12:32:18.840000
CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000
-CVE-2025-49600,0,0,1d2f6d5e845401a19b933de9552b50e729ccc1b4f338fa02dea949d62b02295a,2025-07-04T15:15:22.277000
-CVE-2025-49601,0,0,7e706c165d483c31879c70a25db3bbb19a8580c0e3a424c207a2c26dcaec975f,2025-07-04T15:15:22.467000
+CVE-2025-49600,0,1,18f10ec25cbcba857753785dd95d2b5563134c14f78d6d91ea859ef770c1be7a,2025-07-08T16:18:53.607000
+CVE-2025-49601,0,1,8d603a74b4057011c1040749565202a7549acf99bed53be1bf8dfb2db0b5db74,2025-07-08T16:18:53.607000
CVE-2025-49603,0,0,7395d73576cfabab04ab49602d436ec98b347f7918e0b99ea3cd461f2126aeb9,2025-06-26T21:15:28.150000
CVE-2025-49618,0,0,4bfe83ad3ab72c8a6832dc1e20204d117aa6cb448073b065fd4bdc0c1e9deec9,2025-07-03T15:13:53.147000
CVE-2025-49619,0,0,4c0d40fc3ee7bd72dd83c2074eee512adc364038a8ba65d0d91525642fffe52a,2025-06-17T21:15:40.087000
@@ -298694,17 +298762,93 @@ CVE-2025-4965,0,0,e069e25774f934a0ed0e3552ca1b39aa6b329d13781b94ba84a805a25e26eb
CVE-2025-49651,0,0,ecd6db239799c80e73dfe281bfa935795ea245e34751118be82d7d5f0d28a7ba,2025-06-12T16:06:47.857000
CVE-2025-49652,0,0,5a76dd260d6029491ef52092d08bbfa84d61278dc46b50bc18d56c90cc0b5e95,2025-06-12T16:06:47.857000
CVE-2025-49653,0,0,36772486eb86bf027545ccf93e5df122b7fe00938396229f36e9e79e3e8b0f30,2025-06-12T16:06:47.857000
+CVE-2025-49657,1,1,6a048bc2eb0c9274d6a40084574dd9c67623d8ae1b05c3859cdb1e905e211c0b,2025-07-08T17:15:47.980000
+CVE-2025-49658,1,1,382d15414cc381a73123ceb9946334ae50a4f6a675f766f8c43b52987e6b5031,2025-07-08T17:15:48.200000
+CVE-2025-49659,1,1,f45987591661dc376a6786f37124a1924f7d34f6a8ae47887957b63b824b4610,2025-07-08T17:15:48.433000
CVE-2025-4966,0,0,eb3c553beccac77a44a61f7b4d3cec4244dd4bb9822af603b96b55e91f203bf2,2025-06-06T14:07:28.330000
+CVE-2025-49660,1,1,d552a1efbf89e5b7806a0fc2882c1d1d3bc9a75f0aa35b884932255c9e5e0da0,2025-07-08T17:15:48.677000
+CVE-2025-49661,1,1,2833a5c2e707dbf91af42a892e64e527c681360b56e81161162c19f9ae631227,2025-07-08T17:15:48.913000
+CVE-2025-49663,1,1,b2d9bc3b685015976e18523d1413637cd41764d1242ce4e99f3058a9beedf244,2025-07-08T17:15:49.143000
+CVE-2025-49664,1,1,1ace04210ff12cf42b890007c21f9af2797f06c89dfeb85489d010d083d9fea1,2025-07-08T17:15:49.367000
+CVE-2025-49665,1,1,cbc98271e3b43144ada2f99c07f6f7538e459b7df5aa8bfa97756e8fb8aa43eb,2025-07-08T17:15:49.583000
+CVE-2025-49666,1,1,25474344169eb9f4484e9fcbc10c980b667252fcbc5eab645f0ba4ffccfff054,2025-07-08T17:15:49.830000
+CVE-2025-49667,1,1,db19ad8bf1a983a2d22c6cad70998c2f362df0d559664e1f5d753b73d854e3b7,2025-07-08T17:15:50.043000
+CVE-2025-49668,1,1,4142c157ee74464b2a1d5349d6bf0e7ee2aaca7eb25cc18de5668809724d5b08,2025-07-08T17:15:50.253000
+CVE-2025-49669,1,1,6fe955512f9274e42f36e78155f1048b57dc21a98a694c5f1b2ee7abc6bbbe14,2025-07-08T17:15:50.470000
CVE-2025-4967,0,0,108222a9fb8d269319085d1510581dfa0458c27c4448fa960791612bde83ca72,2025-05-30T16:31:03.107000
+CVE-2025-49670,1,1,ab2df08ff3d287b47a554e36b011f1710f17db9d5e4271d0cb9a7c01b5554ff6,2025-07-08T17:15:50.690000
+CVE-2025-49671,1,1,069481bb55a7dc99a37cd4f2c1c158d77bccaea58100ccc89a63ab77da02447f,2025-07-08T17:15:50.933000
+CVE-2025-49672,1,1,e4f08b41ad67bbad4bd6b144e78ec89182b76c03f71d1181425b954877810fb3,2025-07-08T17:15:51.227000
+CVE-2025-49673,1,1,b2e9ff7ae18feb0a2cc13ea94ddf4876aae2e0b100a9d18753931158e0eb2b9b,2025-07-08T17:15:51.423000
+CVE-2025-49674,1,1,3b6069ec65042288cac3aff7cb5e4a90b11f413f8bdb871b9e750faaf5ca2194,2025-07-08T17:15:51.630000
+CVE-2025-49675,1,1,1853b8c3a07991371a0143c386698f5629be5d02903be034aca8b976caad7517,2025-07-08T17:15:51.837000
+CVE-2025-49676,1,1,81f4c3b6b9afddc8ea6401a58ef049f7559a157fe51b5f98fc4c9d21a1ad9ff2,2025-07-08T17:15:52.060000
+CVE-2025-49677,1,1,884c5dcfeccc7e68de258c7f7d85fe83cefca546c200978b062f3d89bba1f5f8,2025-07-08T17:15:52.257000
+CVE-2025-49678,1,1,73d503dd9675724534fe368ac9109d65b8376e544a1d66da4fe0d059354a8d7b,2025-07-08T17:15:52.450000
+CVE-2025-49679,1,1,96c1dd1a6634fce8d82afbbe2a866f231242bd8feb21cd25b39a5a697f7511ae,2025-07-08T17:15:52.663000
+CVE-2025-49680,1,1,4a1d8a10e9c5d3bd00e5629a807cec79b7e7451ae83cf383bffb098d4b28ce08,2025-07-08T17:15:52.867000
+CVE-2025-49681,1,1,095833353ae8922058cd178ca4dcb0b75300ebb033cec22438bd67e42e343d29,2025-07-08T17:15:53.070000
+CVE-2025-49682,1,1,7978f25b45ea2ab3bafbf7751cf42b72a7bebcba29416d1904f17bb1979b5741,2025-07-08T17:15:53.260000
+CVE-2025-49683,1,1,ec0d08b1cd611961648de7d058539f38c657ba4870066570c3bdea37be748e50,2025-07-08T17:15:53.457000
+CVE-2025-49684,1,1,eb1836b1123746df0e61f9d509948189d641c7a382e8b66a69f573fae546f0ed,2025-07-08T17:15:53.667000
+CVE-2025-49685,1,1,c62ad8332d816d17527e6a2384ceda922348e7c75e4be8831fd2fd134356313e,2025-07-08T17:15:53.860000
+CVE-2025-49686,1,1,2eb97f61ab70aa63180d6dccb77d8a01bb0e341b09764d13159b2b3acf0ac3c3,2025-07-08T17:15:54.057000
+CVE-2025-49687,1,1,a5fd1ad293f224e81d1abc8a090699f1090d3db193065ef1db3b8a0a641439e8,2025-07-08T17:15:54.257000
+CVE-2025-49688,1,1,c3181c8158e5c78a3e9757e8614291d536d5b924e30c09df27ea88ff40df609b,2025-07-08T17:15:54.470000
+CVE-2025-49689,1,1,35eb742e6bcd2b62e7f00524d5d5cb6ff5527f10d1be75b1fc0ff7dd952dc206,2025-07-08T17:15:54.680000
CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000
+CVE-2025-49690,1,1,2f9438abe69f3f23a6d3d7d908db4b110ab582293a18c3e8569fc96474cad054,2025-07-08T17:15:54.890000
+CVE-2025-49691,1,1,b3ec7cdc39d95d1e5d13f7a14a442a58b3dad5eb4cbee05372d931c8064cfb2b,2025-07-08T17:15:55.103000
+CVE-2025-49693,1,1,49673545f56b9ed3c34874b93756abacb26e5fc96f8870fb4448f0c76864fa34,2025-07-08T17:15:55.320000
+CVE-2025-49694,1,1,12ca25b40dbb653983a43bd4dac767f4aee5f01130ed80730bc92f666267e3c8,2025-07-08T17:15:55.503000
+CVE-2025-49695,1,1,3319a44c321323f2e413eb18051d9f9ec8ad498d254531e2e4727ee1b14b44db,2025-07-08T17:15:55.697000
+CVE-2025-49696,1,1,3234ebac9ace880a8a2ab2c3b57faa936719358ac1d7d67565bc174d2988d84c,2025-07-08T17:15:55.917000
+CVE-2025-49697,1,1,38163f554cdebda25f5020ccc58379fb5233d217638676044958329c51e1bd46,2025-07-08T17:15:56.147000
+CVE-2025-49698,1,1,8fd906cfac41048300de362c2c8ef461894debe15f39ca5f37722375efce827d,2025-07-08T17:15:56.377000
+CVE-2025-49699,1,1,52efca9d9ad94a468fcea6f853b175c00a51dec9818119e3a995cd4fb408a796,2025-07-08T17:15:56.590000
+CVE-2025-49700,1,1,0be94c4b4151c052f35d1dbb0c79e6c1ba5141d7dd995ad0ccf4c2969c328589,2025-07-08T17:15:56.793000
+CVE-2025-49701,1,1,b9bf3bcc2a627f20c7f5984ac9666fdb4784949eaad1d85f88f02c45af61187f,2025-07-08T17:15:57.190000
+CVE-2025-49702,1,1,d398295e1f88a2ff4d65cc4e13cc01b297dc011b4fba2fab5130b8847b3c815f,2025-07-08T17:15:57.380000
+CVE-2025-49703,1,1,3095fb98e45d218c14c7175fc1319262fdd780c9196c3cb91ace21ef6a62dcc0,2025-07-08T17:15:57.577000
+CVE-2025-49704,1,1,9c8442ec8cfc60f1adf0a3b5745cfd46dac17622b2cded702620637a44d1d087,2025-07-08T17:15:57.867000
+CVE-2025-49705,1,1,108aac5b9d644920a02e4f3f288d78d415344d2aade56929dd8685b01ea5d7b6,2025-07-08T17:15:58.050000
+CVE-2025-49706,1,1,7b22fc2aba89cbdfc8292080513a3ba27a8b6d1146f68484a4df2d7f491482c6,2025-07-08T17:15:58.250000
CVE-2025-49709,0,0,6e5da86ede95ac762ffd2aaae8e4447b199f72a6fba5fa138a2263e19d8c9c57,2025-06-16T16:41:05.487000
CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000
CVE-2025-49710,0,0,fdef6b70e5300806b4a42e9567df3fa6452819f84b853bd1194cd77188110e32,2025-06-16T16:40:48.453000
-CVE-2025-49713,0,0,d3ecc1d0956e52e47b877d49f42f933e642583b6f7649b260dd4464e86679360,2025-07-03T15:13:53.147000
+CVE-2025-49711,1,1,2bae4dae95bbce4c4492094e54f8ab6491034cd9accc03ac49767a701570cc07,2025-07-08T17:15:58.437000
+CVE-2025-49713,0,1,dc55d8b6cf093d41451def71b98dd1d5508261124ba71e02b478334c89674da6,2025-07-08T16:25:08.817000
+CVE-2025-49714,1,1,09973c52d6da83ceff5187a822d0a0f1519f5f60e8659839488fa3b2dffb3583,2025-07-08T17:15:58.687000
CVE-2025-49715,0,0,d350a971b67f9d6562ee1abd43003afbcfd7b9d445831ceec772b587e6084416,2025-06-23T20:16:40.143000
+CVE-2025-49716,1,1,10c829dedfc171d243a932930a3c7f538f87986e8446f43416539bd4a5ca3018,2025-07-08T17:15:58.873000
+CVE-2025-49717,1,1,bb7318f85881f141a1dac91ffa5e3ec82672ae59a51f5658045f20ee1084fbfc,2025-07-08T17:15:59.070000
+CVE-2025-49718,1,1,5611a20cb1db56d6e8f3310b307732490323ee75ecacfb0d437b792acadae7f0,2025-07-08T17:15:59.267000
+CVE-2025-49719,1,1,771e64d48ce97970bf4353b00c4dc7661b8208e334f1548384717736a4601412,2025-07-08T17:15:59.450000
+CVE-2025-49721,1,1,b064dc3a85643d3bb5d82e7fd9f7982f3adde04b9d546fc1d9fb400095f12a7b,2025-07-08T17:15:59.657000
+CVE-2025-49722,1,1,a9351ede253eaf75ce539937c8f01f996b80216bf854610fdb4bdf0a7507cb5c,2025-07-08T17:15:59.863000
+CVE-2025-49723,1,1,5bf7fe4097277379fdce765b54a2eb52d72874f4e8bce35c14da0bf227f5dc83,2025-07-08T17:16:00.077000
+CVE-2025-49724,1,1,c0a0156cc5a1d783e01c078872537cb6e6995fb8aa8964ccbba12b107a12a91d,2025-07-08T17:16:00.287000
+CVE-2025-49725,1,1,adba23f146adf0228c46f8c45279b9d2561c8207aea4cd21cfcd29029a6b3daa,2025-07-08T17:16:00.490000
+CVE-2025-49726,1,1,e71f506780e0b1c1b4ac58191b7285229cf9ec71fb6f70738cd79b22adf46a24,2025-07-08T17:16:00.703000
+CVE-2025-49727,1,1,3130a9a5bfc65bfd46b2ff856f5e22fcd5c4a945f0d09c8307efb6f68c1f2fe1,2025-07-08T17:16:00.930000
+CVE-2025-49729,1,1,23a1bb37b7ffb351bbc5ed012aa5b1b44ee2db17adf8e0cc78f4fbc6dcea2d69,2025-07-08T17:16:01.190000
CVE-2025-4973,0,0,a09baa9620620eb012f5ddd6b5ca6dd7efd75fb0c8b55678f3f3e6206d444643,2025-06-12T16:06:20.180000
-CVE-2025-49741,0,1,779acee874c8963695eb267c3cca03f6e6467850301ea58eea36cf4ba929173d,2025-07-08T14:40:57.603000
+CVE-2025-49730,1,1,a6671499bc6021adf00f554600b4bbb263b4402aa6aec20d54ce0f9812bcf8e6,2025-07-08T17:16:01.423000
+CVE-2025-49731,1,1,af6e28da19a3b1a96f61a77c9fcedbf1e3a439c21f5355c1890a9cc98fce44ae,2025-07-08T17:16:01.653000
+CVE-2025-49732,1,1,4a69ba221d9f6080daa85d2dd7ffde31b8c455eb5793ba2dae2c741bd561cf3c,2025-07-08T17:16:01.857000
+CVE-2025-49733,1,1,6ca5d16f5a025694fc2434934c6791423404b230d0392d102d1df82cfea02335,2025-07-08T17:16:02.077000
+CVE-2025-49735,1,1,e59031e79b9b0c9499e42d73e671d38185a779d1f9d4de89cb921b20e3fc0d15,2025-07-08T17:16:02.270000
+CVE-2025-49737,1,1,93b478bf726238d24859983c1212e897239342df4a0373105c9656bf743712ac,2025-07-08T17:16:02.460000
+CVE-2025-49738,1,1,14e9304938a5b40ddc46b567c62e7c290e9e92a6e65c46233115e9869c468589,2025-07-08T17:16:02.647000
+CVE-2025-49739,1,1,188bdfc28d997053e71ff5aea65f0145f43b9c30e399c81592ffc45dacb73659,2025-07-08T17:16:02.837000
+CVE-2025-49740,1,1,cfd6bc8e960c2bf3dc4925a3556097991d781bc6729aa7f844aa2a0b9d2b821f,2025-07-08T17:16:03.023000
+CVE-2025-49741,0,1,5a87bb081f930b145d1fd9e33ed3f0272acceaea4f180901b9844a176aac0667,2025-07-08T17:16:03.223000
+CVE-2025-49742,1,1,f5cf280e84e6c1581ebe9e881890991ed9f30e89d9ef42d25fccff8978024a56,2025-07-08T17:16:03.420000
+CVE-2025-49744,1,1,8dcb1de05e0cff124632e857e2f4ad981bbf8466fbecfb50a5ef9bcab5ab0ea5,2025-07-08T17:16:03.630000
CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000
+CVE-2025-49753,1,1,428e46942737d0b2350a30968793858c77321f16924e13fbf3f13775450dc5ff,2025-07-08T17:16:03.827000
+CVE-2025-49756,1,1,72b59a3571b85805accf4ad3c04e811cbb3668827def59eb44e330bf467a8576,2025-07-08T17:16:04.020000
+CVE-2025-49760,1,1,24700bb5d8ed7ac98ae3cf2b7f6155e7941bd02abe7c36141ee583fdb9d4e064,2025-07-08T17:16:04.197000
CVE-2025-49763,0,0,0af081dbb26299df1f48d259e34c044de0c1d060bc0760fc96e11af62ca80deb,2025-07-01T20:15:05.673000
CVE-2025-4977,0,0,935be558c641a049de0d5b17bd3afe70e433fc81aba4e94570f5c7e91d239ae4,2025-06-12T16:22:28.493000
CVE-2025-4978,0,0,d687371ad5129a9bb5f335e51aa4bb2d4a1326e0f7b71156d03d5b7e69122f96,2025-06-12T16:22:12.217000
@@ -298723,8 +298867,8 @@ CVE-2025-49795,0,0,25ec8d341cb8637e103ab3980102984df2eadd9a90ee54c35a6a9a5b298fa
CVE-2025-49796,0,0,c3ae5367828207e03498fac8ae67ddfb08b0af4ece3b2500316915ff59e84375,2025-06-17T20:50:23.507000
CVE-2025-49797,0,0,13aa17d1b7e46eec0802f65578a147baeb08c4d0e59385ea616f044fa893e802,2025-06-26T18:57:43.670000
CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000
-CVE-2025-49809,0,1,e508b348db2f41164f56063a915c3b176d3c542d9e4c1d137b2970367df219ed,2025-07-08T15:15:28.867000
-CVE-2025-4981,0,0,83b8a9f5c59238b59e3f5d1313045f6acedf73e329ee81228921a800cea802ac,2025-06-23T20:16:40.143000
+CVE-2025-49809,0,1,b16c5e54bd1815993f52b68644f79c44960509f537651d677fe921a69a587937,2025-07-08T16:18:53.607000
+CVE-2025-4981,0,1,e5b0af133e450ae0a4770aa5fe3eadc36d784f9d15273ece9cf10a243cf391f0,2025-07-08T17:59:42.473000
CVE-2025-49814,0,0,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000
CVE-2025-49815,0,0,ab5c799920620d5e4f9d9b43a2af946d17b69db748ce4d8b6a328cb8d7b9eff6,2025-06-12T03:15:25.930000
CVE-2025-49816,0,0,1a16c5d0bd92adeb24c6c00f18c773a3281420da1014560ce74b2134aedf4c77,2025-06-12T03:15:25.993000
@@ -298737,13 +298881,13 @@ CVE-2025-49822,0,0,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73
CVE-2025-49823,0,0,552cd4fad516f02486ff3428bf048ea275d9b1dd6acc2c30a167deddc98bdc84,2025-06-17T20:50:23.507000
CVE-2025-49824,0,0,a895a004d0fc4024e68459e5f588915bce2b646af280cd586a777624c2530c8b,2025-06-18T13:46:52.973000
CVE-2025-49825,0,0,0e665abda9bb7320e845ccad3897b6c19ca9de006ffff115b612bced52534d0d,2025-06-18T13:46:52.973000
-CVE-2025-49826,0,0,49549065fbd4e5ae0552f56cd940a006cf83d157d64c63745a30850ddc645a6d,2025-07-03T22:15:21.010000
+CVE-2025-49826,0,1,63bd5cc7dd5544126d30ea93d4e8f2f7c8263d49be8cb33f1c2875bb230cf6d6,2025-07-08T16:19:11.700000
CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000
CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000
CVE-2025-49842,0,0,52ae012b9d7e2a5cca4715d571aca2380b87e4d5e03f349c68bf066a953b2fc3,2025-06-17T20:50:23.507000
CVE-2025-49843,0,0,b9222270a3de3cff84fe371318c5014957a251100d87e6dbb6e77c19dbcfe291,2025-06-18T13:46:52.973000
CVE-2025-49845,0,0,9566711797ff1e00f934b12660008aa6d34cdd5449ce4b1c35e5f0dbc8b99f9d,2025-06-26T18:57:43.670000
-CVE-2025-49846,0,0,8cfaf4459ef53a711a1bef55e179eaf7ff92796cb37ee922f31aa491ae8b98ca,2025-07-03T17:15:39.613000
+CVE-2025-49846,0,1,cb591bd4fda54cfb8ee32a72e858c2b8a52f92f94a3406c5c85a6026eb68cd9a,2025-07-08T16:19:11.700000
CVE-2025-49847,0,0,16b75687319293a64b5fc04a4bec62821419eaa74a888c73c45b46a13fe550d8,2025-06-17T20:50:23.507000
CVE-2025-49848,0,0,011c6a8e789d314acc78bc0226701ea697cebbeb4f9fd380ea75e78640a5f2e9,2025-06-17T20:50:23.507000
CVE-2025-49849,0,0,6e177e9dcc5251ea5316f5f918414790415054f2d871a2e156929f68379bdf8b,2025-06-17T20:50:23.507000
@@ -298764,11 +298908,11 @@ CVE-2025-49862,0,0,f5994500ced5ae697aa7736fa40d13f1ff9985735e8f252530b56671f3353
CVE-2025-49863,0,0,acc0e837d6f6f3f00a094b2d713c1804b159f84f803d7014f73c64d5b354caef,2025-06-17T20:50:23.507000
CVE-2025-49864,0,0,258a5c6dc8cd2f0164cfb8c9f8fdebfef27a9a36875a730815f9772133c1d368,2025-06-17T20:50:23.507000
CVE-2025-49865,0,0,afaa52d7d97df8606f68c69c82ff59c36ed7982ae89bd39d5a5508a96959db03,2025-06-17T20:50:23.507000
-CVE-2025-49866,0,0,b350816897525b3daf8b1f1673dd78348544d07013e8e08eda9af8473a7acdcc,2025-07-04T12:15:31.837000
-CVE-2025-49867,0,0,ec3b7607695f8885600cdf84b37ac68402a02edd0126abde3b148f43f70a70f5,2025-07-04T12:15:32.123000
+CVE-2025-49866,0,1,05e9300c6093306e301f0b1b8d49955423dbedb24bfe2ad60fb1c504631d382a,2025-07-08T16:18:53.607000
+CVE-2025-49867,0,1,e87e23ccf00bfbe767dcf16c8a7dc8154af12f292be6fef09fe74cb33937ef10,2025-07-08T16:18:53.607000
CVE-2025-49868,0,0,3838e688d9333e2570582b2fbeeba8f26197d1094149bd27ee22b0bfbe8803ce,2025-06-17T20:50:23.507000
CVE-2025-4987,0,0,c7c39e2e9c9954a29f9a19f48f2a034a7ab3e4a411a4b09beb0620c0b311c40d,2025-06-16T12:32:18.840000
-CVE-2025-49870,0,0,d81b36f65b58f1c31d759bbd68f95a6eebf457a9f9031d33f968153b54761b87,2025-07-04T12:15:32.383000
+CVE-2025-49870,0,1,886d1df840ed27b11e27a8a80f00eeb6c5f9b90bd198ec7c8f01940a36ce006a,2025-07-08T16:18:53.607000
CVE-2025-49871,0,0,92187a5c53e27077d84e769128fd96b9b6e89c44f836bdd2490f2fe32a6343bc,2025-06-17T20:50:23.507000
CVE-2025-49872,0,0,9bf7cf6b5114a8363298d760f49debbba899b3e976fe09f09056f43d9a18dcdf,2025-06-17T20:50:23.507000
CVE-2025-49873,0,0,ec0de8a610b7b1335f676701fcd5309b682b4282a02b7518b9d450a5cd7317bf,2025-06-23T20:16:40.143000
@@ -298850,14 +298994,14 @@ CVE-2025-50026,0,0,f144377a6f3d80f4679b8641c9c0cf5283150c7cdc5692c46bc7601017fea
CVE-2025-50027,0,0,6d7cc969637ed42e324eaa862533467ea52c1e0dcbe8b9f9f16b161f19fbe49f,2025-06-23T20:16:40.143000
CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000
CVE-2025-50030,0,0,89bfbe4c17c851c202dba786fd8437943f46e427786a04cec8555b668cc43104,2025-06-23T20:16:40.143000
-CVE-2025-50032,0,0,f2b8ebd1853122087a4329fc29fa60de8945ec9e5c2b66574ef8258e10666cac,2025-07-04T12:15:32.817000
+CVE-2025-50032,0,1,9323c9f9b8155da7f3d8a839b0af91b8acc095d62eea6f1455b1aa94621ef6fa,2025-07-08T16:18:53.607000
CVE-2025-50033,0,0,2738b34f7e3c15101342ce0f4e2a966f0b068e0dd660f08772c609a1813c9d56,2025-06-23T20:16:40.143000
CVE-2025-50034,0,0,addb1cfbd7b325cad895eda16871ef70e873e2a759ed635201cbacff36d11441,2025-06-23T20:16:40.143000
CVE-2025-50035,0,0,259a0180bffb3f46d0c16152cae0b4746fb5fd8600268a21ccf1f39e35a84572,2025-06-23T20:16:40.143000
CVE-2025-50036,0,0,6cdfbb31e33212ff818c6e01f46a41907a59eb679342cccab7098fc2c14bec41,2025-06-23T20:16:40.143000
CVE-2025-50037,0,0,89aa41c8daf5e7e3a3bb662a9aa347d31a83ddd9aca499e045972bb3f7e60819,2025-06-23T20:16:40.143000
CVE-2025-50038,0,0,dada3ffbdfd0a70280f428f92e0331fd06f7702c8363d1ad8ff6393fedeb24ea,2025-06-23T20:16:40.143000
-CVE-2025-50039,0,0,627e4f971518e2a4a7e66b01b8d8f3e461856f53f2cdb9e26a54c64ed0afed9d,2025-07-04T12:15:33.017000
+CVE-2025-50039,0,1,90aad79fa278430141b1f67a3ea14a0eddd87f616805eb0231221783ebb12f72,2025-07-08T16:18:53.607000
CVE-2025-5004,0,0,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000
CVE-2025-50041,0,0,75f6e6278f11856523198053842ec1e104e24492e82d9d573f3f8a4e0971895e,2025-06-23T20:16:40.143000
CVE-2025-50042,0,0,6a00085703c918228f1e392cb0cedde720e1f4f0c99bb957112e06c0e32bb773,2025-06-23T20:16:40.143000
@@ -298879,7 +299023,7 @@ CVE-2025-5010,0,0,378e343c5bbddee87b45f94f2f1fd76512f5e1ec33b0f0fab421b27f0b0e4c
CVE-2025-5011,0,0,41cba4a19108fa201d7350dc043c416f678b4c3290e3c20187f1da42ed6ecb70,2025-06-17T14:11:05.917000
CVE-2025-5012,0,0,108c4a85dd9ec28dbd0d5302959945049615400f448641a47fbee9222bc53fe4,2025-06-12T16:06:20.180000
CVE-2025-5013,0,0,39609cc7be62bab5e0dcdb82a67ea2f685567abbda8b6a9de4ad396fb54bfac3,2025-06-17T14:10:53.597000
-CVE-2025-50130,0,0,775593ba2746661904f0e3d71a2068e6bf8699317a11a6fa00b202e332a9e9ae,2025-07-08T13:15:33.710000
+CVE-2025-50130,0,1,867162d739770c1bb8f0011ffc4ac37be14c58bed7dc52c02c425595d01c9ea1,2025-07-08T16:18:14.207000
CVE-2025-5014,0,0,9c8607db6d9e14448cfdf407e465c7bfde043729f553b3e6d26ffe1d0d8748b5,2025-07-03T15:13:53.147000
CVE-2025-50142,0,0,96e95955d25317e057785db9a58810528a1898027eb53c5d652f8d851e70c8f5,2025-06-14T03:15:21.693000
CVE-2025-50143,0,0,efc3fe49e91ba655ae48efde63259826b6655f9ef2d53032c81a7a1aa6c27271,2025-06-14T03:15:21.793000
@@ -298904,7 +299048,7 @@ CVE-2025-50200,0,0,b04b8a83061873d5a6a0dfbc2d26e36b23b8e421c71e6c73bb812e0e2b22b
CVE-2025-50201,0,0,b71de99131f6d434679207868c298561d8584ffbf25a24bd1c950c135dc4e50f,2025-07-02T16:21:03.237000
CVE-2025-50202,0,0,8426382c587b31fdab442fa7dec19ab1134318b48a3d87dfe295363cdfb44e96,2025-06-18T13:46:52.973000
CVE-2025-50213,0,0,c5323703bbf7326a6340b0eb3f5fb04391afe081eef6d3bbddd434f9589ebc04,2025-06-26T18:58:14.280000
-CVE-2025-5024,0,1,d27b13b1c76553be36dc36867c835ea44df8cba04f9e8020be04aa87ad7b2f30,2025-07-08T14:15:29.100000
+CVE-2025-5024,0,0,d27b13b1c76553be36dc36867c835ea44df8cba04f9e8020be04aa87ad7b2f30,2025-07-08T14:15:29.100000
CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000
CVE-2025-50258,0,0,4e733a37ca27136b2ef93a2119db49ffed90448de5c8c9f307ac9db358663d12,2025-07-07T14:40:56.783000
CVE-2025-5026,0,0,d9b074ad09f171f2cc858535f05c167fb3f2b46a82934574183f725586b2f8f2,2025-06-07T23:15:21.897000
@@ -298925,7 +299069,7 @@ CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f86
CVE-2025-50367,0,0,11927bdde5438b4996a0e36a5bdb40e09ef92eca1ab5001c01636467314bc80c,2025-07-01T18:14:15.680000
CVE-2025-50369,0,0,76505340853baf5eab5f1b048a33fc8b2f27e7032083b67ef77ba56fd5bda577,2025-07-01T18:13:49.520000
CVE-2025-50370,0,0,8ec62a8b136f422328b09eb56f7ad1804d629a60f3240ad9673fb1c786991189,2025-07-01T18:13:30.903000
-CVE-2025-50404,0,0,11cef404b176529c357af317cc2da6b9b1f129a528e28a60bc4f750017e57757,2025-07-03T15:14:12.767000
+CVE-2025-50404,0,1,57ddec287e32c0926c6f1374b329d27b2c9211e16faf9e16f40d597949626528,2025-07-08T16:15:58.260000
CVE-2025-50405,0,0,f3f97aad95dac7533727fec56a85db7eeb1fa3f1a6da3eefa7da3e9d6c91622c,2025-07-03T15:14:12.767000
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
@@ -298949,7 +299093,7 @@ CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd2
CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee5a,2025-06-05T14:11:10.430000
CVE-2025-50693,0,0,e45af4df59709862d79fed94eba81f3c720eac46d3c47878fa15d033f0971882,2025-06-27T16:35:39.350000
CVE-2025-50695,0,0,accd627332da7d97b76cb5783ee219c402d198efaa23d938427a710819f5d635,2025-06-27T16:33:31.330000
-CVE-2025-50699,0,1,1e25e54b0056394e6903ff353773e34767f017adf3a0d8d11456cc6f07cbe587,2025-07-08T14:20:25.187000
+CVE-2025-50699,0,0,1e25e54b0056394e6903ff353773e34767f017adf3a0d8d11456cc6f07cbe587,2025-07-08T14:20:25.187000
CVE-2025-5071,0,0,884ba5d773bfa631189c2fa39c9690b3ec846f53f569c43eb315d4166f9f7924,2025-06-23T20:16:59.783000
CVE-2025-5072,0,0,018794b89a334645a6a5efb53691bc8d4bdc43518fdcf52adffd3eaacbe48488,2025-07-03T15:14:12.767000
CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000
@@ -299135,9 +299279,9 @@ CVE-2025-52487,0,0,7cd2bd74a4137e25655cda69485a3b65bad2829b1fa25c7a60a65991a011a
CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000
CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000
CVE-2025-52491,0,0,99c966bc69ba38206055f8764fa30ca2e2a41c8a1159f64533a7a568f1fc2e2c,2025-07-03T15:14:12.767000
-CVE-2025-52492,0,0,eef618f67ed864d86536961b6d55359d8ae01cd4f67a925c68554cd2e284ab6b,2025-07-07T16:15:24.233000
-CVE-2025-52496,0,1,4ec5e92f7e7b5845caf78b6521b0efa13e66be9d490a838197f96dbe827bed4f,2025-07-08T15:15:29.130000
-CVE-2025-52497,0,0,d6f8f28097d84977174cc14a8c767c7f5e958c1efaad80a86bc0ff509071c220,2025-07-04T15:15:22.787000
+CVE-2025-52492,0,1,46f6fc532e206d45ef2f2d18304de53c2b06499cbb2165fb6d8fddc01b63b687,2025-07-08T16:18:34.923000
+CVE-2025-52496,0,1,c4a5290ed4a6829a338ece7b12a5b7bb4e1239eedf9c2a83e343760d73e782b4,2025-07-08T16:18:53.607000
+CVE-2025-52497,0,1,d15c25d27a40c01af95e0a09ebcb28bc3f303549d4a5549490bd6ec8d44a75dc,2025-07-08T16:18:53.607000
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000
CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000
@@ -299145,7 +299289,7 @@ CVE-2025-52542,0,0,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bd
CVE-2025-5255,0,0,b023caeeba2421cb86c7482514e264205e254122220d82c6bc67ef741a68d935,2025-06-23T20:16:40.143000
CVE-2025-52552,0,0,355ff6e466a39f4325662bbaa49db2816c79c0533f84f99cc3e34c03831df356,2025-06-23T20:16:21.633000
CVE-2025-52553,0,0,a39f718ab824da2cdd9dc21d65a0414d2ad7d6b511be6b992312d854e52baa0a,2025-06-30T18:38:23.493000
-CVE-2025-52554,0,0,576b06c85bd1f0c7b4b6d021bc479bdd9921447ccc3c1c49f62c7b2572f4989e,2025-07-03T20:15:23.423000
+CVE-2025-52554,0,1,84da27c1fd7a29284c26820c62f0a55c8b9a5112a6fc65c7ace318fe872e2bb6,2025-07-08T16:19:11.700000
CVE-2025-52555,0,0,6a75b391ee3c8272fca348930578b6893d5d810e2019dea636affd2993361902,2025-06-30T18:38:48.477000
CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be9ba,2025-06-23T20:16:21.633000
CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000
@@ -299185,7 +299329,7 @@ CVE-2025-52711,0,0,89905531ab9ffc8f95c007eebb988a86cafda84726fa0a1e8a67963e52646
CVE-2025-52713,0,0,dd903bf26897039ff2663d3fa53844a1463ba8229d49746f6dc30423c84667ea,2025-06-23T20:16:40.143000
CVE-2025-52715,0,0,a4815f001b2ab15993c3ab0dbb5671632e88731698b4eae1f2c32fc42830020f,2025-06-23T20:16:40.143000
CVE-2025-52717,0,0,08af7c95982a241bd309ceada869c66b69693c4ab91aa3522e39aca35fad1aa4,2025-06-30T18:38:48.477000
-CVE-2025-52718,0,0,a314fc7a063fdcd9a0ae380b3722118b5756e1a878728075980056b6b2244223,2025-07-04T12:15:33.197000
+CVE-2025-52718,0,1,e24238ff2122a250bcfe94aedd8f4169951e949411ec5811fe44a1ba180bc845,2025-07-08T16:18:53.607000
CVE-2025-52719,0,0,5255f49aee70f7be6419c1cdeb90569664f1a4ea7bb1bbf43ecce1b8104ccab6,2025-06-23T20:16:40.143000
CVE-2025-5272,0,0,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000
CVE-2025-52722,0,0,67080dc3c7ae0b1e5a6c40b4728875a6c5c039edd8a9b90988e8ed70e1b52abb,2025-06-30T18:38:48.477000
@@ -299202,7 +299346,7 @@ CVE-2025-5276,0,0,39d67915dab7ad2300f3ccd3a288fcee1075e32b914c45ad140eb6b7725be5
CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000
CVE-2025-52772,0,0,deb02b2d983c296f8b89a2559d4d4f189f1c6c676131c9feadcc246a08a5cc14,2025-06-23T20:16:40.143000
CVE-2025-52774,0,0,de771a5b10a99171a6970cc2eda061e856ddfde2b5144a0771c7c0ff4baad63d,2025-06-30T18:38:48.477000
-CVE-2025-52776,0,0,ccd61e3d4e9a841186d0d8174e5e05d107b436e4c2d43ad98da3139a85d68fa0,2025-07-04T12:15:33.370000
+CVE-2025-52776,0,1,ad7e38af0b950ab5836b78d30e80fdbef510447bf84a91f6a5a8d7084a2dd2d9,2025-07-08T16:18:53.607000
CVE-2025-52778,0,0,9edf1af608066a282b94a63bd066e5d09838f79b8a975aaf7daa048d884d03d6,2025-06-30T18:38:48.477000
CVE-2025-5278,0,0,1a1d872b476a4e1ede71f599ba5ea7954cfb91958da7bd7ccf42fc9ce864efd1,2025-05-29T18:15:24.290000
CVE-2025-52780,0,0,beda9d0e83d0e69352f6224f37e355d5bbb032dccdf392d8666399c5db09bf24,2025-06-23T20:16:40.143000
@@ -299218,20 +299362,20 @@ CVE-2025-52792,0,0,54a43e5c19c532f6b49f3b5ecdc987ba818c53d017f06190cee2cbed041fe
CVE-2025-52793,0,0,1cecd933b153bc60d3b7b2eddac537905bfaa72ae4b2b195599beb64ec31374e,2025-06-23T20:16:40.143000
CVE-2025-52794,0,0,502cc6110b8b76b562cb28e051a1f9b818d5407c3da5396bd730f9e6d63ac1d5,2025-06-23T20:16:40.143000
CVE-2025-52795,0,0,11006411d1510cee1a98b263384d48fe90a25a6ec4d2d4cab3514b4f857e57ac,2025-06-23T20:16:40.143000
-CVE-2025-52796,0,0,25fc1e9c6e634083b1eb608c31100e28f7e72daff78c1a732e91959ec628e270,2025-07-04T12:15:33.553000
-CVE-2025-52798,0,0,643140ecbd7cd15d9b588c9498359b9a77446ce57111dba13602912a7e3d5b95,2025-07-04T12:15:33.737000
+CVE-2025-52796,0,1,cfe92185d9c37b64c7ab2c7c373f26b4c08c8a45a757803118ecd825098bcdd1,2025-07-08T16:18:53.607000
+CVE-2025-52798,0,1,402dbff84ed3807fbb278e7a34c3a59323dd9b8c6203335be06a88aa9da96f96,2025-07-08T16:18:53.607000
CVE-2025-52799,0,0,f5028a24c09763007e3eed281487ce93df81ad20935db161b5fa934774a40839,2025-06-30T18:38:48.477000
CVE-2025-5280,0,0,3c6af0d30a51ecb706066ad212af1114fdaaf7f2415af1fe946985167145905d,2025-05-29T15:50:31.610000
CVE-2025-52802,0,0,3bbd213c305ded541c93d6153b658373bf8ce9d75ca7fde959b797d174cbb307,2025-06-23T20:16:40.143000
-CVE-2025-52805,0,0,63f698b157cadb312d9d1075d582f16ef63c04bbe38b6939a0eec708774f9365,2025-07-04T12:15:33.927000
-CVE-2025-52807,0,0,059cd16f2ea6a9d24d0fe162b829d3eebf3af0ca661385dbe5201903bd168cff,2025-07-04T12:15:34.107000
+CVE-2025-52805,0,1,4e03e194063290771e968f2c464a9dceb9af6b1f97719dc1d807301503a26a0c,2025-07-08T16:18:53.607000
+CVE-2025-52807,0,1,2f5286030cb6914fe3a388736f3129595c0f02dafd4d6471f409c9f21ca1f184,2025-07-08T16:18:53.607000
CVE-2025-52808,0,0,264722595e6ba27b9065f53ef1252aed986d07a4d8107331608224f4bdea61d1,2025-06-30T18:38:48.477000
CVE-2025-52809,0,0,e0db976f97863e8b90579de6742f8b0830cbc45669f6a22ccaa6edaf8948051e,2025-06-30T18:38:48.477000
CVE-2025-5281,0,0,4065baa6ec2536bda486e7298d71ac521380ba5a3be043da1b14156c61e3ebd6,2025-05-29T15:50:25.993000
CVE-2025-52810,0,0,3ef536ab5644db36bed36f9f57e290b83410a91ac339a870d244108bfe704521,2025-06-30T18:38:48.477000
CVE-2025-52811,0,0,88916380a5b0bf5d3138e345d9114c8701bf92cb923bb701ee3b1bf810fcd1e0,2025-06-30T18:38:48.477000
CVE-2025-52812,0,0,274d283096e469aed47f3651aad592ca1448ad0aa62da5d9be96fd2940c87f44,2025-06-30T18:38:48.477000
-CVE-2025-52813,0,0,dde41392f77fce1e2a3ba3c76acc57662ba5d3c903ec3cddcbec6948c8ae5391,2025-07-04T12:15:34.273000
+CVE-2025-52813,0,1,607b5b5736a8d039f5de83e4c4f0cfddb67a2dbf1c56c79fa4abd4aa5999aa15,2025-07-08T16:18:53.607000
CVE-2025-52814,0,0,0a76fdcb4f9e75be4fd6067991977c8b2d3f3bdbefb4834fd89147a28bc228a9,2025-06-30T18:38:48.477000
CVE-2025-52815,0,0,bc3563b624fe1c8b3289253b3da2640993d4da80643a79037cfd83540c6801f7,2025-06-30T18:38:48.477000
CVE-2025-52816,0,0,1ab5f421dd6d696ffb70bb9546b130cafcd20ab37ee5b0a097c172047fbf32f4,2025-06-30T18:38:48.477000
@@ -299244,13 +299388,13 @@ CVE-2025-52824,0,0,351dd92df1183307d0df204ba321726dfa0b44797469f8905fc2dab11c0d1
CVE-2025-52825,0,0,bfd2129b50cd02ba73ac261df6839665ee9fca96e334d577f196302dba30baad,2025-06-23T20:16:40.143000
CVE-2025-52826,0,0,72a9fee291a4fc6694768e97deb03a4bc851d55f8966b2a155247b9d28a512d1,2025-06-30T18:38:48.477000
CVE-2025-52827,0,0,04da4f456c5a4f30ec7c35209b7acc7cd69257169d05a3aac291d93074f0d62b,2025-06-30T18:38:48.477000
-CVE-2025-52828,0,0,15706c71903314a3f5444d7d5d6f747d3b6ec006ac04112a3766969957a1f2a5,2025-07-04T12:15:34.453000
+CVE-2025-52828,0,1,2a0b831b7be61a3dd1f8c583cb5c270c3e285781372a95c5ae2c75cb565a3f62,2025-07-08T16:18:53.607000
CVE-2025-52829,0,0,eb4d964acfddba9bd78da4c0fddfa106090ce982a7436b16afafa186380d210d,2025-06-30T18:38:48.477000
CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000
-CVE-2025-52830,0,0,0f46ab6c79c04268e6ea0632491c2f4811315223593905ab872a3e3ccc0e233f,2025-07-04T12:15:34.633000
-CVE-2025-52831,0,0,e323e4cc0d3ea824c55871b7d92c864a965f5fc4fd4721407406e6428446513a,2025-07-04T12:15:34.820000
-CVE-2025-52832,0,0,d1461caf95abbb2c3e733fba4a31e8a760fc76390759324484316ec2489eb855,2025-07-04T12:15:35.020000
-CVE-2025-52833,0,0,2efb7206948dae64151d221b1fd24685f064032677da9adb3cd09bb99d379cb2,2025-07-04T12:15:35.217000
+CVE-2025-52830,0,1,e27cb86ee3dc85e4cdb47a5988aae00bbf848413c5b9a186b3ebe76afee6035e,2025-07-08T16:18:53.607000
+CVE-2025-52831,0,1,69995b7480c487a9ece11330e7b3262b8b0108a5ab20ec09c30dd653471e6576,2025-07-08T16:18:53.607000
+CVE-2025-52832,0,1,7d4b4d25fe61a9fa71754d07bf0e867b924974b7a817077d3f59852143ddcd69,2025-07-08T16:18:53.607000
+CVE-2025-52833,0,1,d0422c57470151807dba68198923b574175ba7a4a639ca75d13a36da220f22a9,2025-07-08T16:18:53.607000
CVE-2025-52834,0,0,4ca40346c1caeb484e6b4cab253e3c17da1f917f108bf85aa6fe3c08b7cc103c,2025-06-30T18:38:48.477000
CVE-2025-52841,0,0,f8e068a9006278a5834628f113e54a0f795a1f7457963e2ccbe9ba5790bb87d4,2025-07-03T15:13:53.147000
CVE-2025-52842,0,0,9056d2ba3d41df43ac19f2a8f2245769713a77a20a1ae420dd61d6d62d2c7561,2025-07-03T15:13:53.147000
@@ -299276,9 +299420,9 @@ CVE-2025-52890,0,0,2b79a750afc8ef6b48596dcf4f14c9b9204a9f39da31c3089f912837bcfd2
CVE-2025-52891,0,0,42d87c7a0fb166ab0663a14b7f4f6801a67de6f4c21e6c736bc3eee64f714983,2025-07-03T15:13:53.147000
CVE-2025-52893,0,0,fb290a699a0f7d13541e9b4fd9fa9a8968c62bbcfe99e98f9955877246abf6cc,2025-06-26T18:57:43.670000
CVE-2025-52894,0,0,74a1c27cdfe3b4918c4901febbea0eb20e2fd7cd4e76ab656b0dd58ab073e67f,2025-06-26T18:57:43.670000
-CVE-2025-52895,0,1,bf6a84ce227c6651ad1e6287ea85234c45b1c5e7a233207eada10b15918d5740,2025-07-08T14:10:54.147000
-CVE-2025-52896,0,1,b6456b9e394eb6acc90337bfe20f249fa2907ca3571ade780049f703e940f5f6,2025-07-08T14:10:33.893000
-CVE-2025-52898,0,1,0f17ec88a3ab5b6aeafcfc9924dfe061181d4324d6f2c800366c9351e4ecb4d7,2025-07-08T14:43:50.023000
+CVE-2025-52895,0,0,bf6a84ce227c6651ad1e6287ea85234c45b1c5e7a233207eada10b15918d5740,2025-07-08T14:10:54.147000
+CVE-2025-52896,0,0,b6456b9e394eb6acc90337bfe20f249fa2907ca3571ade780049f703e940f5f6,2025-07-08T14:10:33.893000
+CVE-2025-52898,0,0,0f17ec88a3ab5b6aeafcfc9924dfe061181d4324d6f2c800366c9351e4ecb4d7,2025-07-08T14:43:50.023000
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
CVE-2025-52900,0,0,c3b90b2ec68a1e635c45af29278e5f2829ca967a60e2db7ee11fcb631a71ccef,2025-06-26T18:57:43.670000
CVE-2025-52901,0,0,db02532e8618556b35a07f6397539126cc2e04d60ba57318e9c83d4e9e75cf55,2025-07-03T15:14:12.767000
@@ -299344,10 +299488,10 @@ CVE-2025-5306,0,0,f34be59a6b1e6be6e727751955efa7f722865a717bb3297f17420ade83207b
CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000
CVE-2025-53073,0,0,dc72ce506142801c8b0cea2579e988f3f6c38bb40bb41e7362bf91b362c4103c,2025-06-26T18:58:14.280000
CVE-2025-53074,0,0,f52ca9dd90524e3f3f68a7b7afe10d6feeb9ffad0d2a884a989f67ce569bc673,2025-07-03T15:04:03.260000
-CVE-2025-53075,0,1,e39ffc2504ea1ad5c6a2db7af0a9b25ebca26bc61e1f9e468924b0c305e02c78,2025-07-08T14:19:34.503000
+CVE-2025-53075,0,0,e39ffc2504ea1ad5c6a2db7af0a9b25ebca26bc61e1f9e468924b0c305e02c78,2025-07-08T14:19:34.503000
CVE-2025-53076,0,0,7d0472ee5ac2fed608b0bf1f79433fff2d4bda3e093a984979b51545f0edefa2,2025-07-03T15:04:16.297000
CVE-2025-5309,0,0,4f40b16e57161a0b02ce9c3f4d7e0ba4cf08b0282b7954a09175078f67da41cb,2025-06-17T20:50:23.507000
-CVE-2025-53091,0,1,01f26f0e7340b37fe1b8d341679db61fcaf8487f7c9a90afcfb883f9a5365394,2025-07-08T14:48:01.653000
+CVE-2025-53091,0,0,01f26f0e7340b37fe1b8d341679db61fcaf8487f7c9a90afcfb883f9a5365394,2025-07-08T14:48:01.653000
CVE-2025-53093,0,0,74633fa37f55d3e4578f17a8a8e9cf5802a23514d8c74f36bbe49970c76e862b,2025-06-30T18:38:23.493000
CVE-2025-53094,0,0,418576393828aa4e87c8e5ad6e152067b9fe196eb6fcd7a235ffa2a208b13760,2025-06-30T18:38:23.493000
CVE-2025-53095,0,0,e3e1ddc02861d59eb3c5f2e5932193e02480719ab072e6302cdb88f23f7ff839,2025-07-03T15:14:12.767000
@@ -299379,27 +299523,27 @@ CVE-2025-53163,0,0,7560bfbb1d4a318f63439c9ad14a4ee4c5e29027e65aabf45449f4c1d2064
CVE-2025-53164,0,0,1735ea93a314f58b5aca6d47f409e0ec1efb1092c3281e940e457ba7f02ca816,2025-06-27T04:15:55.077000
CVE-2025-53165,0,0,c18d3f0bac2527c4fc3c5949699939aade6fdfa1fc95f118b55a9226740ab740,2025-06-27T04:15:55.547000
CVE-2025-53166,0,0,009194b1e4d6b1b25c951d276d80052562e14b1709dfd02dd967ce379d64ab51,2025-06-27T04:15:55.620000
-CVE-2025-53167,0,0,1937734cd16b07ca6c6bb5ee3354dff5421b0ebe365f12e74496b278bb03f2e4,2025-07-07T03:15:27.433000
-CVE-2025-53168,0,0,cab6e8885db62effa659adbd77684a828e33d3b767750ef95c2e9c5de9a8c859,2025-07-07T03:15:27.577000
-CVE-2025-53169,0,0,a25334063ce6044e1a59a838e9d1c42ecf35d87b6b53592627817bf160f62298,2025-07-07T16:15:24.467000
-CVE-2025-53170,0,0,12c0fa5e61ccd9f1d3b447d72f3713699af5263eab763a344587a60fbdb817fa,2025-07-07T03:15:27.843000
-CVE-2025-53171,0,0,74217308d7f5dead549093676595fbbbb97fd2c73c1c84309ff03f6074d4f19a,2025-07-07T03:15:27.990000
-CVE-2025-53172,0,0,48bc9a7914ab14e230b31f0355c1be1d33fe11daad2336f543eb059b33850287,2025-07-07T03:15:28.133000
-CVE-2025-53173,0,0,e0ad0340b41ecdbf81718d9c11e41e5b8323876778bd593836f6e5c57ea53843,2025-07-07T03:15:28.283000
-CVE-2025-53174,0,0,e7c6ab4ed8f1d468e14968986fb7b7c08389addc3a01c8bf22992cb63c0af90b,2025-07-07T03:15:28.420000
-CVE-2025-53175,0,0,7171bb1771966435e6f748b50466d8c8a3143400ffb549a8c67a44614f390616,2025-07-07T03:15:28.567000
-CVE-2025-53176,0,0,3a078dcffc93fb0b820f7af49620f5e03dbbcd51111b4e32254e69f7f8278730,2025-07-07T03:15:28.707000
-CVE-2025-53177,0,0,31e920bf484a47b709bfedb0cf32845f21256a906a4aa275186e8d567f3a2e9e,2025-07-07T03:15:28.847000
-CVE-2025-53178,0,0,aa956bd79741dba36774ee93d35536756cf893c6ac5ca6510c95a3c47924a234,2025-07-07T03:15:29
-CVE-2025-53179,0,0,ba9dff4d95a1e7ac53b2b3674e3495234e838cc82154be746ebfbb95c28908d9,2025-07-07T03:15:29.140000
+CVE-2025-53167,0,1,a8424bc2c4a353ace266249ad245ea4e328103b53b602dbce1bbe9678971e6ab,2025-07-08T16:18:34.923000
+CVE-2025-53168,0,1,82259a44bd3d34bd8e05d10cb2a3e11d7bb464136ccc57b6bdc814f8aa62b6b2,2025-07-08T16:18:34.923000
+CVE-2025-53169,0,1,6ebc0b485d7f87f747760e53c0e569139768d26f978864aabea499365217cac7,2025-07-08T16:18:34.923000
+CVE-2025-53170,0,1,9d60e01d3149b6e04380a8b71ce90dd5d79f9cc5b3f7cbba73d161ee7947d66b,2025-07-08T16:18:34.923000
+CVE-2025-53171,0,1,e93865416d7eb5c1d2ad48621d7ad9e2ba7afa2d4cd8a7e65cc44f52c541fd08,2025-07-08T16:18:34.923000
+CVE-2025-53172,0,1,5511b5bf15a2534a96278235e2b2724074216a08f4fa87dc5915ea4257794f4e,2025-07-08T16:18:34.923000
+CVE-2025-53173,0,1,b57472fff07180191a3961aa02cb397ef7cca26dfc642d5755921e9958d39aba,2025-07-08T16:18:34.923000
+CVE-2025-53174,0,1,75f3eb44e1efc55cc219a6db75063bf4c94c72bc399a74f50bf8ef38ab4b47c3,2025-07-08T16:18:34.923000
+CVE-2025-53175,0,1,c6fc2f920b3d034d282038038f770380980eff341d16760e5f4c9968257a0165,2025-07-08T16:18:34.923000
+CVE-2025-53176,0,1,0f230f5a1e47608f4437f78e56758abb2d48016597023396a1b141b7485df9cd,2025-07-08T16:18:34.923000
+CVE-2025-53177,0,1,888ec48a54b7aed12c404f0f6571cd9b51209593603b8a5833dc3f697338fcba,2025-07-08T16:18:34.923000
+CVE-2025-53178,0,1,059139842bc327a3b031c035cd3377529a8ed5a4eed2a46bc12f2f45b17d2ff4,2025-07-08T16:18:34.923000
+CVE-2025-53179,0,1,b96b74a166b9b19510e7da1664ac32141e205058feb87f250f5fc31c6f039cad,2025-07-08T16:18:34.923000
CVE-2025-5318,0,0,d95c49f8bb6d9b056310845ea915af91d8a36448ea3684ee98fec4064c982b12,2025-06-26T18:58:14.280000
-CVE-2025-53180,0,0,ae36ba48d49459ca2e40899b6a412c69b417ef14f6a847671ba258739fe4f8dd,2025-07-07T03:15:29.313000
-CVE-2025-53181,0,0,dcce960f567ec98c7f328b423eb1da97cb2798ad4052a23e304a4fd4b5643bab,2025-07-07T03:15:29.480000
-CVE-2025-53182,0,0,333eafb582551210d2fe743df7e9d48734fd3acfcfe1e9a1eb0063290d7e1e05,2025-07-07T03:15:29.623000
-CVE-2025-53183,0,0,be1e4b7bbef9664c50925e0fbeff32c89f5c402db0b2160e458add028a56e139,2025-07-07T03:15:29.770000
-CVE-2025-53184,0,0,d4f42b161c4cee4c4efe574c31ad8684ed0a88e90d90263c7f216691fb1f4870,2025-07-07T03:15:29.913000
-CVE-2025-53185,0,0,19cbe620ff0405b59896a2ed504269f6f376bdbfa3fc235882ea370399d7c5cc,2025-07-07T03:15:30.063000
-CVE-2025-53186,0,0,296eb22370cb74e874c5294ffba351562529dce4d375f7ea3b8ba1df82dd1e24,2025-07-07T03:15:30.213000
+CVE-2025-53180,0,1,09db6be25b76f96a113842e9efce305397935463524be3f0d839995311d4bb2f,2025-07-08T16:18:34.923000
+CVE-2025-53181,0,1,eb20032c9f34ff6b7c22b010d187157b84b2dba90fd4105a1ed6b85f861d9b22,2025-07-08T16:18:34.923000
+CVE-2025-53182,0,1,4acff59550daf3bda25c88624bd999d7f20815d708ddf4e916ed4ca65aeddf30,2025-07-08T16:18:34.923000
+CVE-2025-53183,0,1,8218c109d82d7f6ae5505e2a73fef282e672ee0a1dde62d078d54a7347b33ed3,2025-07-08T16:18:34.923000
+CVE-2025-53184,0,1,271b647ec1259629e59d017a696285e8b9efa278ddb05220fc8dce6218cda663,2025-07-08T16:18:34.923000
+CVE-2025-53185,0,1,569ddb82bab8cb757396d01957899d4809af9562502e094e91af0c8ad25e69ac,2025-07-08T16:18:34.923000
+CVE-2025-53186,0,1,8ce08bd62230f9f36070b2869d940c5c861decc25ac6d5124aa5240960d3a8c3,2025-07-08T16:18:34.923000
CVE-2025-53193,0,0,e8a1858afec756a866470e301b23ba5163a056600bc99be908895db6b5b13715,2025-06-30T18:38:48.477000
CVE-2025-53197,0,0,c72c4fa2068296a945121bdae25a00c4e4b5bc2b6a4d9dec211949fd42ccb988,2025-06-30T18:38:48.477000
CVE-2025-53199,0,0,0b13aa3fda3336c0253b39c836eef41f1f08653d0ef3393db99526fff842874f,2025-06-30T18:38:48.477000
@@ -299410,7 +299554,7 @@ CVE-2025-53203,0,0,3066a5e0ae713dd43c66d01a142b4c33aa4af60f15bae9ce1c285859f6161
CVE-2025-53206,0,0,1d8e9afd4d5808862609505109286c8fb5bf14faa1fefc35871110b47245a7ae,2025-06-30T18:38:48.477000
CVE-2025-5321,0,0,31d96e00ea1024b8084a7837ef9bf0b4fd55d789d529b1f4fae375684c451003,2025-06-01T05:15:20.947000
CVE-2025-53211,0,0,2abef6a3dfa316373b80998aadb9b980ebc2dc6ea27961810065342330691763,2025-06-30T18:38:48.477000
-CVE-2025-5322,0,0,8caf45eb8b6ec3d60bbfb2b70390f6dc86165d0caf620c59dd0258512d3dd3bb,2025-07-03T22:15:21.287000
+CVE-2025-5322,0,1,1bbfc5b5150523226e5a5b2054af528b34a2dd6d2682303c493f68fae579afc2,2025-07-08T16:18:53.607000
CVE-2025-5323,0,0,b0785ba87cd1215b18904af4ecc0dec4461f38599fcb91263ef5f63563e48a70,2025-05-30T16:31:03.107000
CVE-2025-5324,0,0,78e349d2bd14065297b1365314e2e0d4a2b731776a4275b89f97d27f39ee4fa3,2025-05-30T16:31:03.107000
CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a2d,2025-05-30T16:31:03.107000
@@ -299419,7 +299563,7 @@ CVE-2025-53254,0,0,8d56ffe402bb76b24185845decdc59779e8802d356487d5334398779a07bb
CVE-2025-53255,0,0,ec730ac042e0abf9b2a31b64f28be2cdcae6a879850b6d271183060760548fc2,2025-06-30T18:38:48.477000
CVE-2025-53256,0,0,bb84d9ae19d9cae363a736c94205d30da11efb3c31c9b4723bb955c7beec5e2b,2025-07-02T21:15:41.410000
CVE-2025-53257,0,0,a9a11065de348b88d4b75cff097eee7a5ba0f26c0158d0437a76d9c025fa2cc5,2025-06-30T18:38:48.477000
-CVE-2025-53258,0,1,79f3e878817eb2d0c2e530780034a3370a634bf8818664f6c77be7caff568b8e,2025-07-08T14:15:28.547000
+CVE-2025-53258,0,0,79f3e878817eb2d0c2e530780034a3370a634bf8818664f6c77be7caff568b8e,2025-07-08T14:15:28.547000
CVE-2025-53259,0,0,1a676ff829527268718afb1a97ac7922e0cf1bdad3ac66285a3c31c12b74b980,2025-06-30T18:38:48.477000
CVE-2025-5326,0,0,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000
CVE-2025-53260,0,0,9f0c8ff8c50487a245a0d81d8d4962f8e754d9f618b4095f15340cab9cc950f7,2025-06-30T18:38:48.477000
@@ -299483,7 +299627,7 @@ CVE-2025-53323,0,0,c4bb0bce8eaeeae0db595028fd06fce5fb3a56400cef98de937a1c28dbf5b
CVE-2025-53325,0,0,8e3e8e26e4dbd5c8412e01ff791fe5a4fb9f0769d9c65e9c6d332a118a91ffa1,2025-06-30T18:38:48.477000
CVE-2025-53327,0,0,71efca1e67fedd0f62622f35091acee6852d8d1a47c1510c3872a11834b47c9f,2025-06-30T18:38:48.477000
CVE-2025-53329,0,0,7e2bcfdc4e5def99b30f12a3cca8edf3792d6624620d8d3d11051961618387f9,2025-06-30T18:38:23.493000
-CVE-2025-5333,0,0,a5cfe9bc43416139c5948b0658b230aa4b1b6bb1a416da21c3604602d79f0f9a,2025-07-07T14:15:25.123000
+CVE-2025-5333,0,1,095a3623e81e5c0641246167cbdc73b4561ed3fbe96aaceaf8832f026397e6f1,2025-07-08T16:18:34.923000
CVE-2025-53331,0,0,3c6f4df5d64c5323acf0dc09f4c211199c054593ee6f61a47e7d530f381128f8,2025-06-30T18:38:23.493000
CVE-2025-53332,0,0,1d1495d052af56b7272e2c60ea8f8145bc99cb12abd86dc191a9a1b907a375ef,2025-06-30T18:38:23.493000
CVE-2025-53336,0,0,ac84b14ec4ae1ec81f40af29b24196ef5a7cc4c376492c3cd8f1877425976982,2025-06-30T18:38:23.493000
@@ -299494,19 +299638,19 @@ CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad959346
CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000
CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000
CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000
-CVE-2025-53365,0,0,a04aa20f634d5cc2c76b3a5c2c874b1fc6afa8cec04d4c06c28eedb595b84aa8,2025-07-04T22:15:22.117000
-CVE-2025-53366,0,0,278f06f71382e3197b901b5af1601584aeb379b793bf57697bcc9c6384d7f89c,2025-07-04T22:15:22.300000
-CVE-2025-53367,0,1,c0425ebd2928671adc813e7e47fe55b0c82f81a71e0d4eb8945eee924732978a,2025-07-08T15:15:29.423000
-CVE-2025-53368,0,0,8ed0564d8cf46952d4bd978ff260b3ab3c2d062c631e91fd75491562cf8b8297,2025-07-03T20:15:23.577000
-CVE-2025-53369,0,0,978cd4bc15d6a241f7ac5e5c9408aad89eab4d8653a44aadf47ef7a09be0430d,2025-07-03T20:15:23.737000
+CVE-2025-53365,0,1,3c9002ee138b7484cfeed75e07a2470c0191764d03998fbfcbcb0a841ea0deb3,2025-07-08T16:18:53.607000
+CVE-2025-53366,0,1,54029052115dbda9488ad5cb5c8a51eeb10fcd2b8861589cbce76a5e29e84fef,2025-07-08T16:18:53.607000
+CVE-2025-53367,0,1,a9aca38500e2619dc81e333466e7e761c129b1f118e8323fc26f2d69ef2deede,2025-07-08T16:19:11.700000
+CVE-2025-53368,0,1,49e7e1da1c7c783ca01ebebe76535731702803fd48aeb39fdd527e49f5861f1c,2025-07-08T16:19:11.700000
+CVE-2025-53369,0,1,b4c2d2e474a422a92db7d4fa6fdce8616b89aaa3f904263ffee4c84bb923011d,2025-07-08T16:19:11.700000
CVE-2025-5337,0,0,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000
-CVE-2025-53370,0,0,aed788d0ea7ad170f999fc911bf334c6a1d64a91c4cd0af267b7743b2c628e04,2025-07-03T20:15:23.893000
-CVE-2025-53372,1,1,ce29445d417884bc7724842a516471057dc78c5a89fc3c73c36568e79a367243,2025-07-08T15:15:29.560000
-CVE-2025-53373,0,0,5bdb5216a407e339b24a155af125a66528171fe2687b15f432ef8e83905905b6,2025-07-07T16:15:24.950000
-CVE-2025-53374,0,0,048614a745ae7e98f5321a32b66858d6e6101230ba932d75c053cf17ba95474a,2025-07-07T16:15:25.113000
-CVE-2025-53375,0,0,848890d1efe87764cc544f04fa066b455261f9ea61f69788716dddfa6fa591e5,2025-07-07T16:15:25.317000
-CVE-2025-53376,0,0,fc3afaaa04120e6e44ddb4595db6ad187159526aa9e92e3e7d46c6c8dd40e083,2025-07-07T16:15:25.467000
-CVE-2025-53377,0,1,b53dd79850e94be92085d68793b9d450f696a56ebcb5d7f1ca87a031a84f9b3d,2025-07-08T14:15:28.817000
+CVE-2025-53370,0,1,e4a000a544eb2f2411b55e0eb7d49c1b72d38e427a8fcb2fb8cea3d38e6bc7e1,2025-07-08T16:19:11.700000
+CVE-2025-53372,0,1,46eed3ab0a738613e8c016d62122cd1dc55b58dca835d83d483785ac259e5a04,2025-07-08T16:18:14.207000
+CVE-2025-53373,0,1,6462ff63ab256fea4b5802febd9c983eb3c60586e1ba4b80bcc391c6b8469696,2025-07-08T16:18:34.923000
+CVE-2025-53374,0,1,f5386881a0c4e3d7f878f98ebe7b3615717622d32a0877fd0bde8e94a6ac88b4,2025-07-08T16:18:34.923000
+CVE-2025-53375,0,1,8ac344acb24247436e6b58c267f8e3689b2ea5cadae7ab56354134d793d7e5a8,2025-07-08T16:18:34.923000
+CVE-2025-53376,0,1,be0ba29907ff35b28fd5ee2c07c2c6951750e4f58b6a8bfea05de22e05255b7d,2025-07-08T16:18:34.923000
+CVE-2025-53377,0,1,4c55d31a9599a1f8501b98b6c1b63503ee266c550df58abceeead728df84d91b,2025-07-08T16:18:34.923000
CVE-2025-5338,0,0,30f15d6c7d64c82a0621f7e47f07f7b28b663e259f04318e25340aa82d6ae3c0,2025-07-08T11:34:52.400000
CVE-2025-53380,0,0,778a4ed3b4b51402648379b0a66e0653fc3388939d52b44cfb536c593d391f6d,2025-06-28T03:15:24.373000
CVE-2025-53381,0,0,5bca2379c91be4fadf0c25a7392b9c1b3f109e154b7525c42492575516c349ca,2025-06-28T03:15:25.393000
@@ -299517,7 +299661,7 @@ CVE-2025-53385,0,0,6919cbbce415f6a7965892da59e02c2851818e452a8966594003b8317f980
CVE-2025-53386,0,0,421cd769cbad85964ce345c4647b4d8effb0b5cc08970d5238cc9cb8e91646c3,2025-06-28T03:15:25.790000
CVE-2025-53387,0,0,e2764bb76f8a0fc53098c27eec0c194d10d953d856450579213a555deedd9d56,2025-06-28T03:15:25.860000
CVE-2025-53388,0,0,a892e721c397f4ad48b104d8840965c60b9650055c4b0c4a9cdb65c7fe578d48,2025-06-28T03:15:25.933000
-CVE-2025-5339,0,1,332a771bf7b8c0102452379097eab0d9a4cdb1b7780c79baf4a1eabc6bcb85ae,2025-07-08T14:18:57.083000
+CVE-2025-5339,0,0,332a771bf7b8c0102452379097eab0d9a4cdb1b7780c79baf4a1eabc6bcb85ae,2025-07-08T14:18:57.083000
CVE-2025-53391,0,0,b7a4d75d6918c83199669f17cc2126bf3fa7760aec2c0bc3cd78203b25142608,2025-06-30T18:38:23.493000
CVE-2025-53392,0,0,bccadda7d7ed5e7d96eda919617ca61a93ea88413285b2a192f6a5d2885b8696,2025-06-30T18:38:23.493000
CVE-2025-53393,0,0,7b64755a7e1248a68992b6b63c4b482ad2eb522925d6670add06e1eb0c5e94da,2025-06-30T18:38:23.493000
@@ -299525,61 +299669,63 @@ CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2c
CVE-2025-5341,0,0,310ade0fef4f00a2bb774631c0600d07f23bdfc4eb7718128328a35e4c244522,2025-06-05T20:12:23.777000
CVE-2025-53415,0,0,a69e8e91492110c4dbcf675778ea91b79a25d896361aa62120c18b659d9f38c5,2025-07-01T08:15:24.610000
CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29ac92,2025-06-30T10:15:26.127000
-CVE-2025-53473,0,0,92e0083ee269eb4212926b3287cc39d3ed6a29cce1276085559cc4c84fae9d14,2025-07-07T05:15:42.160000
-CVE-2025-53478,0,0,8917f73100ec6a448b66c70ec2656a359ce2c7e87115b7ec2c00413914566792,2025-07-07T21:15:24.920000
-CVE-2025-53480,1,1,8a84cc7e6e293d2f88b11bddf6044ed4de1a220d3698921a4d3d996f9a59a53b,2025-07-08T15:15:29.720000
-CVE-2025-53481,0,0,1c051551cffe76b0d474f6e015c338541c0bfd354ef6be284333e122485d826c,2025-07-04T16:15:22.167000
-CVE-2025-53482,0,0,5eba40710e02310ba1ecb93085ddc4dc0cc4fa5b62b8ed248a2bb7696c4ab7d3,2025-07-04T16:15:22.320000
-CVE-2025-53483,0,0,b9bb55989c3fd3c1cf55d058e4583af35124f2974234424179c7e6a11dd9be9f,2025-07-04T18:15:22.790000
-CVE-2025-53484,0,0,23699d3877e9948e53fca5253353cc14405051c565fc0e33dec2a42a78d9203f,2025-07-04T18:15:23.380000
-CVE-2025-53485,0,0,759f453eaf0a8d3f91777cb43171b84b861d8c50e5a91c37b68da9a1356b0dc9,2025-07-04T18:15:23.497000
-CVE-2025-53486,0,0,be884bea8027797b76b8cd93865ec6e974b9cdbcb989634c3701e2baafb5693c,2025-07-07T20:15:27.460000
-CVE-2025-53487,0,0,bfe5a591eaeddc16dd1c376af303484381568d15f465b9149b3da7e13c714aa4,2025-07-07T20:15:27.617000
-CVE-2025-53488,0,0,53aa0e53b613f65bf35919d335e1d1ed51a60b43ae0a08db439f12d008fe3eb4,2025-07-07T19:15:23.413000
-CVE-2025-53489,0,0,6981ae59f9089d899baa26f7fb9cc354b1e92d611df463c8bd1c4326ac91dda6,2025-07-03T18:15:21.710000
+CVE-2025-53473,0,1,a98e9bef8a3e8614654fd61fe5e312266f4052bbcda22460250a3d6a497eb2e1,2025-07-08T16:18:34.923000
+CVE-2025-53478,0,1,aa7b2381d7181ee2b89b1383c51d82730ebb38c46cf0997958e21fb414371fe5,2025-07-08T16:18:34.923000
+CVE-2025-53480,0,1,4f5aef8cd6a8f049627d2c4d0d717e279193b6c062dc19ec0f621c20e01dc62d,2025-07-08T16:18:14.207000
+CVE-2025-53481,0,1,276b90a2c3d3db335f731174241d0b8aabb3ab06bfdf9b3fd451a126174619df,2025-07-08T16:18:53.607000
+CVE-2025-53482,0,1,8c8788621c3e7f214a1dc298f7bd2824bda379b8059a940edd2ffa43ceb905b4,2025-07-08T16:18:53.607000
+CVE-2025-53483,0,1,60139410a934f4e04fc3102ec0ef13b137721ade1dbc62166ae533edbdc0b1d0,2025-07-08T16:18:53.607000
+CVE-2025-53484,0,1,e053167e7a709098cf77a4981b7aa9b7faf40996ec3fa277aa8b931bee16360d,2025-07-08T16:18:53.607000
+CVE-2025-53485,0,1,e9d2ccc29d2be05f76bba457a1ae1812c35eed99a7c1277e76e6af1e4195fb49,2025-07-08T16:18:53.607000
+CVE-2025-53486,0,1,b0a002c2440b9cff7e2c8fbad70a2079bf6a8361f9268a9757e051104d57f687,2025-07-08T16:18:34.923000
+CVE-2025-53487,0,1,c0d5dff6ad1c29a23878b2ad903a2b1b68c7f902a012230b954b7fd0b5aeeb16,2025-07-08T16:18:34.923000
+CVE-2025-53488,0,1,64130e9da612a518c7e6771952ea785d8b1f436945cb386d1c6f4d53e16f32fe,2025-07-08T16:18:34.923000
+CVE-2025-53489,0,1,61c0dcb31ac6f85e08147ac28cdf6230d2757c86e00e7b07042fb935b7c08f66,2025-07-08T16:19:11.700000
CVE-2025-5349,0,0,b81f7b1d6a71754537d9828ea9d3acc620d8f1e6efc544e4ef89ee68669bb4b8,2025-06-17T20:50:23.507000
-CVE-2025-53490,0,0,84b14ae3ef7cec574f36654197a8ce18c06c040a8aa9edf5f061ca9d2df445e9,2025-07-03T18:15:22
-CVE-2025-53491,0,0,ac00ca922dae2adc27e0b81adc46d740b78b5ae2014b1ed3ebb873bf8a4f7764,2025-07-07T20:15:27.767000
+CVE-2025-53490,0,1,15355af9bf751ee5a421f08cf1d16ebdd0e807643ef3dedbea85630b9b6c461e,2025-07-08T16:19:11.700000
+CVE-2025-53491,0,1,6b3662c2831fdd8c79ded4454ee2035fa60f94a03054090afb7fd7e68c18556d,2025-07-08T16:18:34.923000
CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000
CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000
CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000
-CVE-2025-53495,0,0,a2d7fb70c8512d0d6bbc0020617ecc3717023879b4fdc019c4c4e7f25a8195b6,2025-07-07T19:15:23.540000
-CVE-2025-53496,0,0,15b1a82fcb54104f243174bdcdea8f3d9f3c81fa9c3bac2b54099ca24881c017,2025-07-07T21:15:25.130000
-CVE-2025-53497,0,0,b61490f4374f88f0752aa2b67588bb2fca0e424233813060ec88a51d4d10c85a,2025-07-07T21:15:25.290000
-CVE-2025-53498,0,0,7b2dbd69b9109a44593b654bf935e01c7dce7191e68349d6e1e8cda58acb4470,2025-07-07T19:15:23.667000
-CVE-2025-53499,0,0,fb151ba52ae7ecca505cb361593d7a811e60c09fcf2e314e84d19e1ecf058826,2025-07-07T19:15:23.787000
-CVE-2025-53500,0,0,3bdf9ba78f8c96e0759eb3bb04f287f9f94cbd8123f377eb631e7dd9af704f81,2025-07-03T18:15:22.140000
-CVE-2025-53501,0,0,e900724eae230d86d7c7987a3ea7fc4bd597cb6f2ad1627c48d4045dca340177,2025-07-03T18:15:22.300000
-CVE-2025-53502,0,0,e8e5fcaf2b9f6d631a41e244b192bdc7d0b428e116af040c9415b6e6f51e01e5,2025-07-03T18:15:22.530000
-CVE-2025-5351,0,0,25fedbd9afa181a22c5b0bde3da57126f5b842bc3c3c6c6aea00f66ca5be6046,2025-07-04T09:15:37.100000
-CVE-2025-53525,0,0,869b92ac04941e0d732e60e45ae870dc45b6732c51121aa00157e0143d86bdb9,2025-07-07T17:15:29.530000
-CVE-2025-53526,0,0,15f4bcef895bfda41a67d129473276a303d467a50ec771c48d470974be81bd26,2025-07-07T17:15:29.690000
-CVE-2025-53527,0,1,f1337c25426314a8a9e4f510246738789e965ba3f3895bbaff8ce81f57e1eb67,2025-07-08T14:15:28.937000
-CVE-2025-53529,0,0,ee15264f84fb4a53cd3983c75d5cb5c77dc3cc78199039df8407eff587a8d3aa,2025-07-07T17:15:30.030000
+CVE-2025-53495,0,1,54f953305204c682e398a33e7db96d60eca3518d52e073c522502bc4edad9035,2025-07-08T16:18:34.923000
+CVE-2025-53496,0,1,32bb968620be65542ddc8682da8b762a1ebbd838a8985a79351fabfecdf695de,2025-07-08T16:18:34.923000
+CVE-2025-53497,0,1,5eae136538b70c3c37a94d0e58a284bca8a286c4bb1c1df40f1d02cade0ee419,2025-07-08T16:18:34.923000
+CVE-2025-53498,0,1,5d183157579db2a0e312e2ca4e6229844a31a876b6597e8a7b6abb933c9480fa,2025-07-08T16:18:34.923000
+CVE-2025-53499,0,1,81820eac14d4542bf8fa7007811ef1e27488a8924438deed66fc55cc0a6757f8,2025-07-08T16:18:34.923000
+CVE-2025-53500,0,1,6bf8ca33713f3a2bab75c61f0f766e7ebebde783ecb1ccdda91000f21a8986cf,2025-07-08T16:19:11.700000
+CVE-2025-53501,0,1,ccac602c786f22315db263303b00facd2536cbcd4bbc6d4d87bf200450bbda9d,2025-07-08T16:19:11.700000
+CVE-2025-53502,0,1,5a7035089ea6976dad62bf0b0d470894d525c57cb053c618d3c57707f23fd14d,2025-07-08T16:19:11.700000
+CVE-2025-5351,0,1,f43512958c8933de764a4ba1958227010145e98ab3795163cb96e1ef5703ab9a,2025-07-08T16:18:53.607000
+CVE-2025-53512,1,1,a24e125986f376aa4b2de09e043e98c10232bbf91c969785ec7c86183a3eda21,2025-07-08T17:16:04.400000
+CVE-2025-53513,1,1,1e2911fee28cd16f32206768aeea2bde21a90f137c2dba4728eae79a94165bc7,2025-07-08T17:16:04.593000
+CVE-2025-53525,0,1,ecb1b185ddf06f2c312418a38923082474429904dabaf45dd2a82528f32361d1,2025-07-08T16:18:34.923000
+CVE-2025-53526,0,1,34ec2de203860d01ce87feab99bf245ecb39d9ddc32e3c0344a4a1247102c9b8,2025-07-08T16:18:34.923000
+CVE-2025-53527,0,1,2d6656d529ffeffb41e4c33d89a2d6a1959d28485ab22436b624c66de48dcceb,2025-07-08T16:18:34.923000
+CVE-2025-53529,0,1,b57e30daa07f0825cee951d18ad96c88476a2560a65cf298a0f3d1b95db381cc,2025-07-08T16:18:34.923000
CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000
-CVE-2025-53530,0,0,49d0eebeaa5fa94ebcbdd6ae93efe5b9624714e2a2ef763d283e5346a75b30e4,2025-07-07T17:15:30.197000
-CVE-2025-53531,0,0,8488530f5da80d00ba594bd8f7c1443ef7ccc9731dad5e36c752d31763c2f44b,2025-07-07T17:15:30.363000
-CVE-2025-53532,0,0,be98140475255b0b9f3d020610187a9a6fbc4c646496523c014b695bf9ed1dd7,2025-07-07T17:15:30.533000
-CVE-2025-53535,0,0,a05fd0968ecdc36c3361ce4dd0264465f30d572629b8d4ccdceca1aebb35c633,2025-07-07T18:15:28.810000
-CVE-2025-53536,0,0,ccc683f38a8b78207dbb857fdf6b5ff606edbc866a36ebe64799bc589d6df9ac,2025-07-07T18:15:28.980000
-CVE-2025-53539,0,0,2c5a54f70fdcef21bf2b3e4ce33706c656cc3f37acbe51aea20479350bcfb25a,2025-07-07T20:15:28.027000
-CVE-2025-53540,0,0,da114d9186e04256eccf1b56c75a7c23beec1b440f69735c12a795cbef99a852,2025-07-07T20:15:28.173000
-CVE-2025-53543,0,0,f3e37b348893c271fe2d4bea9c1fc6b0ff48fcb963998d30d7c18f9ccb69be0e,2025-07-07T20:15:28.323000
-CVE-2025-53545,1,1,dd79c2229fd07ba83196478971d3f54d273e95da6e492bd4e290ac3cad91f1f8,2025-07-08T15:15:29.850000
+CVE-2025-53530,0,1,dcf52a95bd262cebc66f40268abec62a4ffde6f9c553a0331a126f3d99bd484a,2025-07-08T16:18:34.923000
+CVE-2025-53531,0,1,7844b90e6aa33c921bcac04954b89b70f55ac2c6900d3259cf0e3b066db51c77,2025-07-08T16:18:34.923000
+CVE-2025-53532,0,1,b681dc63693a61b3b9551ed337e0b761579c4041d2095a2d5cad001b861481b8,2025-07-08T16:18:34.923000
+CVE-2025-53535,0,1,e7b92501ef22f55b5cf3a9b70e7539bd3016a0f564b0280777dc9de0b8f7645d,2025-07-08T16:18:34.923000
+CVE-2025-53536,0,1,1ffb904023576ac25e3ebc89ed7420ce87a5557241153e513ded38254515bf65,2025-07-08T16:18:34.923000
+CVE-2025-53539,0,1,5db39fcd0a7210d0be83b7c2d14e7c8ed3f3b273c7210a57205be51f0a6b15c6,2025-07-08T16:18:34.923000
+CVE-2025-53540,0,1,68f0d19008b8f949cf7cbae53e1f6ef67fca39bb0fc5628cd655d505d311b69c,2025-07-08T16:18:34.923000
+CVE-2025-53543,0,1,da4e1b5cf6cb8007cd6dfd1396fc489f3840d88a4e59fc523fdbc4c83d5fc208,2025-07-08T16:18:34.923000
+CVE-2025-53545,0,1,ef3d0455098abbefc8b277f85bd071e32e2b46fb49dca2b74733aee634f2df15,2025-07-08T16:18:14.207000
CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000
-CVE-2025-53566,0,0,d4d5c467031c7ed57831ee58fd68b40650318cd770c698d7b1795bc244a2e70b,2025-07-04T09:15:35.737000
-CVE-2025-53568,0,0,bee3cadb56562067625e8db4627ad9a409d5227256f420415bcca74802f43a7d,2025-07-04T09:15:36.370000
-CVE-2025-53569,0,0,c1b758335d1501a4e676fbcaab25763813486a792e49c19492e95ee275f6f029,2025-07-04T09:15:36.560000
+CVE-2025-53566,0,1,454fc69172044556d46b17e70adb6745e5c6362d217f0ee325fd72c5ff2824d8,2025-07-08T16:18:53.607000
+CVE-2025-53568,0,1,ec672fa14438849d4042331d8f520ecf08d3b5cc6d344f82d58d26ad189f71b5,2025-07-08T16:18:53.607000
+CVE-2025-53569,0,1,cdd0c7bd045f505f8a550a7ea0de012d1c57dbed78b7fa2473645446d7d9daf8,2025-07-08T16:18:53.607000
CVE-2025-5357,0,0,907468d4a23bb292098ec30159d44f17f5a58704c8b53f5a961af7ce379d277f,2025-06-16T16:26:46.080000
CVE-2025-5358,0,0,8d1b1a598434ecad4f0ae411fcaa51446d90f020f8729fd93cc9901ead4d16c2,2025-06-10T15:14:21.980000
CVE-2025-5359,0,0,fbaee83932976cabc2c375b7182ecd49a378426f554e3965400f3dd72ff93c16,2025-06-10T15:14:30.460000
-CVE-2025-53599,0,0,69dc7d6c771b182e517ac5daba11a551bd77cfb804a55c06340a16ecb1bd11a5,2025-07-04T08:15:25.687000
+CVE-2025-53599,0,1,58df136613d80ac24a5998be8f4b5ad1c68e734aef175256165cfe6ed96417b1,2025-07-08T16:18:53.607000
CVE-2025-5360,0,0,f6f6f0a68bcc88f729faa5e7b6e62c265dbe0f87de895580450e0ebfdb395bd6,2025-06-03T15:35:19.237000
-CVE-2025-53600,0,0,57f7ad33aa5b3fbe011a76d91336fa9d85248b95f64a8185820e05897dc561de,2025-07-04T08:15:25.823000
-CVE-2025-53602,0,0,4fbb0da67d943a966608913bc985271718ea508f9069cf69ef43d7e44a315671,2025-07-04T21:15:23.560000
-CVE-2025-53603,0,1,fcbed58fde391ceb702e1c9e5d80a818db51423967110738f90dd98103605f94,2025-07-08T15:15:30.317000
-CVE-2025-53604,0,0,1bab9e277cfa892c064c40bbba3b5c77ef51c31c8d81c51bf21cb4ac9451d9e9,2025-07-05T01:15:28.340000
-CVE-2025-53605,0,0,e1850a90bbd00208fdd0f92f6be0091829f3c2d4f97e87d63797a52d65dc4d4d,2025-07-05T01:15:28.523000
+CVE-2025-53600,0,1,cdff6c9e3415b98402f02f907ce89fef4f4af53bbe9f1f12e867dd1ae1ff1096,2025-07-08T16:18:53.607000
+CVE-2025-53602,0,1,80af5d7001cee4eb35e2703fbca47f96b312650580be3927abff93f135bbe250,2025-07-08T16:18:53.607000
+CVE-2025-53603,0,1,5db52850d120d71ef124e962842248708c198fe6e2675d8e1cf2ebbb02c0969f,2025-07-08T16:18:53.607000
+CVE-2025-53604,0,1,9daa2f4769c37bae33325e5cacbc0a5a446d78ff5f1e987c05793d3e6ebf1037,2025-07-08T16:18:53.607000
+CVE-2025-53605,0,1,5280fa20d17b09cc0ef6457bd99c9cd5e6721e711196490959f8b1f5ce091a4a,2025-07-08T16:18:53.607000
CVE-2025-5361,0,0,63ed55da0a8819c3072e9ae5cbf20f6ad96bd8fa3415071144a15d946aef0cb0,2025-06-03T15:35:09.950000
CVE-2025-53610,0,0,156dd78a0c1b31a38abe89aaf6d0ce2631a27f0548bb6395c2827bca8600bd0d,2025-07-08T03:15:29.617000
CVE-2025-53611,0,0,bfd482962f5103cd0aa9fa24e86320a1b2a415984fe058e01ecfaf089a3342d6,2025-07-08T03:15:29.727000
@@ -299599,7 +299745,7 @@ CVE-2025-5368,0,0,9330ec771717069f27ceda5473a12198f97847c6ad28dab99e3c2364851c8d
CVE-2025-5369,0,0,8c4e55fbb8d45d713061ee556ffa7273cbb4542497249daf924357fd6840ed9e,2025-06-09T18:59:49.330000
CVE-2025-5370,0,0,d7c535f6840fb8738b07147f1830fce26e5802820d60a561b6d2888f8dde3788,2025-06-09T18:59:58.197000
CVE-2025-5371,0,0,16f45a240979d3e28a1f7ae1c207a37bd22e9e5d64cb4ee381668bed7ebf71f7,2025-06-04T14:31:41.573000
-CVE-2025-5372,0,0,d752ba9eff094370bd7c25c81edca82e8869f178134a04492d8b67f9647e6d73,2025-07-04T06:15:24.930000
+CVE-2025-5372,0,1,7e3b7c0b48218287c2ae9bdb27bc1c7ffcdf43c6488b71e32b860e2a73cb89da,2025-07-08T16:18:53.607000
CVE-2025-5373,0,0,c749a6b1c61526825a3ec95e76f4d6286fc94a99723ecde6b20b472fbeaf94ea,2025-06-03T15:31:55.267000
CVE-2025-5374,0,0,08ec0fbe437c75568e797a6883653990f3916903b217127f6e162f78c26a7157,2025-06-03T15:31:45.257000
CVE-2025-5375,0,0,79ab6f61d55d13152e6cea237408e960f1fbc5f1ab43084ee7b9d3d96e5ce6a0,2025-06-03T15:31:34.527000
@@ -299664,19 +299810,20 @@ CVE-2025-5444,0,0,2bdd03d16168890a76d628b7e1ae67a954e89be452c722e478e2135aa0988d
CVE-2025-5445,0,0,48ecb9ed962bffb0d51cf3a0f453cb2062332faabc3f4707bcde0f91fbc8a125,2025-06-10T15:15:02.610000
CVE-2025-5446,0,0,e5b8442225b2596d4e485375bec906c695e65ec084b20c8f1887efd794228e69,2025-06-25T17:24:47.440000
CVE-2025-5447,0,0,b48376ecfe2b08edb6956c77815c7714ff97e9cabd629e0b7d61c068b2578472,2025-07-02T01:07:18.147000
-CVE-2025-5450,1,1,96217cc3b882b4ef147674678608e39a4449044ecb39091ff1d6a5ac87e4e394,2025-07-08T15:15:31.103000
-CVE-2025-5451,1,1,b4189cb19294eaf260bd8c62cc1e2097e0e344251de7f0d7c25a0d81966ef885,2025-07-08T15:15:31.817000
+CVE-2025-5450,0,1,18c4d21cb47321269ca586b7a7c0e6391b2229352a7d8cc45ef87b95a28468a8,2025-07-08T16:18:14.207000
+CVE-2025-5451,0,1,ec552eef63b316441509db5c8ac6b5886645fd339ddd217c6eafe4295e0562ad,2025-07-08T16:18:14.207000
CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000
CVE-2025-5459,0,0,bfef67fb6bc5a0d62d15f9ee68a0d9240ec3720f0fb55d24a02c5d3644fba822,2025-06-26T18:57:43.670000
-CVE-2025-5463,1,1,bf0d1b2fe866b3f8903fbdb71e44c864f352691717db844ea55a6803c112661c,2025-07-08T15:15:32.010000
-CVE-2025-5472,0,0,55eaaf5a87aad78c4ffc41fabcd4c3cb9952754e5860fc78a428b87287d41350,2025-07-07T10:15:28.873000
+CVE-2025-5463,0,1,45cd5a35134c5e08f7f81f9230582b88f97f69413140b243432f01e06d6b6d40,2025-07-08T16:18:14.207000
+CVE-2025-5464,1,1,0542d86d3a7df875d28b9564f108c5e91d2965f5ec631aaa414dea6c4673150b,2025-07-08T16:18:14.207000
+CVE-2025-5472,0,1,3fbf60624459f5a60d25942a14491624e9a062e97a6db52080ef6b6086af5eb3,2025-07-08T16:18:34.923000
CVE-2025-5473,0,0,71e9a0d8879b30e10102aac4dbfd9c373861b74ea445d6f4d1c1466cb063c6e4,2025-06-09T12:15:47.880000
CVE-2025-5474,0,0,ff56ae6d33a817b3b5972773cb7c3e3407b0f73c6768464aca7201e3d55867a2,2025-06-09T12:15:47.880000
-CVE-2025-5475,0,1,4979d4c3ee2147d07e9129970ba91c083cf6d4c91316446a1b1dceb7d7112c51,2025-07-08T14:30:38.823000
-CVE-2025-5476,0,1,a5595525d6f434e5db7ef172355c8c452a60b9d92336ea56dd245c1a6f979cbd,2025-07-08T14:30:24.420000
-CVE-2025-5477,0,1,3f748714f14b4caaf85493b6969c604a5749eb0b91ed48b04d44e746e5cff542,2025-07-08T14:29:50.553000
-CVE-2025-5478,0,1,dc2bc17ba70cb8faddca9273eed1feeb921e7e003ea6ea123b929c5d852ca4c0,2025-07-08T14:29:23.690000
-CVE-2025-5479,0,1,1ee68cda6af6621c4bdfe95d69a37bc9ed144a92ab5a1d09c130de5d908d77f0,2025-07-08T14:29:05.903000
+CVE-2025-5475,0,0,4979d4c3ee2147d07e9129970ba91c083cf6d4c91316446a1b1dceb7d7112c51,2025-07-08T14:30:38.823000
+CVE-2025-5476,0,0,a5595525d6f434e5db7ef172355c8c452a60b9d92336ea56dd245c1a6f979cbd,2025-07-08T14:30:24.420000
+CVE-2025-5477,0,0,3f748714f14b4caaf85493b6969c604a5749eb0b91ed48b04d44e746e5cff542,2025-07-08T14:29:50.553000
+CVE-2025-5478,0,0,dc2bc17ba70cb8faddca9273eed1feeb921e7e003ea6ea123b929c5d852ca4c0,2025-07-08T14:29:23.690000
+CVE-2025-5479,0,0,1ee68cda6af6621c4bdfe95d69a37bc9ed144a92ab5a1d09c130de5d908d77f0,2025-07-08T14:29:05.903000
CVE-2025-5480,0,0,b6157243f7fdbaf5769c8c248be5113b7a9538f2054411dc814924ab031c7b6a,2025-06-09T12:15:47.880000
CVE-2025-5481,0,0,0df5112d76a8e502ef89d6f4c9ab47a4ed6ed40f8c8ec4607ebdb9cb6b4ab86a,2025-06-09T12:15:47.880000
CVE-2025-5482,0,0,010176165dc064c9d0f5c42c228b3c1b03d533e2fec3bc43624fb7ad3f4bc0b3,2025-06-04T14:54:33.783000
@@ -299723,7 +299870,7 @@ CVE-2025-5533,0,0,2dfcccaae175c59c944126a99e8f6d8f65e21d5c385b8c2ddbbe92c2ba47ee
CVE-2025-5534,0,0,d8177fc111cd48f21043a561bc59a4a7b9cde04803cd4201428282cfb06e0a32,2025-06-06T14:07:28.330000
CVE-2025-5535,0,0,a7818bef1709aa482ae74724baff1a67c45fa2916d5a65f27323a13d0490ed33,2025-06-26T18:57:43.670000
CVE-2025-5536,0,0,7df71d1dab0ddadc1cf40e48870e67453a2cbb15d8332fa14fab505e504c5a57,2025-06-06T14:07:28.330000
-CVE-2025-5537,0,0,c58d66f67b7e6b22f6a3101a91f886d14db2b9fc6ecec5c418587840cb1d2562,2025-07-08T05:15:30.420000
+CVE-2025-5537,0,1,4a0e7b1ec12214736af0f8c01f2436351cc453d6d15aec3ad56590e5e7482d99,2025-07-08T16:18:14.207000
CVE-2025-5538,0,0,762f67a9ba2152c03c8ac60e588d19c417662c15009fd5c6802487e853ce4da9,2025-06-06T14:07:28.330000
CVE-2025-5539,0,0,5f3c15177d18ed772de6d63d48eacb9684fe228baa189f897784f5e945ccc17b,2025-06-04T14:54:33.783000
CVE-2025-5540,0,0,e49bd4a72fa7910724ed7b963345a8ee9fe8cb1a4e3ad1e04c066cb4335f7fd4,2025-06-26T18:57:43.670000
@@ -299752,10 +299899,10 @@ CVE-2025-5563,0,0,abd05332a66da82c0a84bbcebb55ce866c616ee358de4033b1bc944eee92c5
CVE-2025-5564,0,0,7809e1fdf6de89ef637777fde783c5f5ed408a93fc9e8800ee881fa5f62b3fb1,2025-06-26T18:57:43.670000
CVE-2025-5565,0,0,69057d9fcda3a9d391a6fdd2d36028e43e46d962e75d2a96d0e0e06e8f6deb95,2025-06-06T14:07:28.330000
CVE-2025-5566,0,0,779c860a161eb64dc6f40dd7f0ca399f4546b6e4ee22bf38748c51ae144c439c,2025-06-10T15:10:27.370000
-CVE-2025-5567,0,0,da23b4ba25131dd28d32f4d0fb99f3359181dd06bd95a7ecaf592a778a36fae8,2025-07-04T03:15:21.040000
+CVE-2025-5567,0,1,65b0d6100042f4b5951c7fc6b3789cec3d1e1689925fcab8653a46e25aeacf7a,2025-07-08T16:18:53.607000
CVE-2025-5568,0,0,3985b2b3c56041cfacfc47ea29b5076a771839690445a0941918b66a37c31945,2025-06-09T12:15:47.880000
CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000
-CVE-2025-5570,0,0,4d00f47ecd2b611a14b258e837d2ce9ee5cf2a39afcfba71ea3f9783a041339c,2025-07-08T03:15:30.423000
+CVE-2025-5570,0,1,d6a46de5ad532b5ed7b6b6559a919e69167e93b6df364164671875d3f672325f,2025-07-08T16:18:14.207000
CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000
CVE-2025-5572,0,0,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000
CVE-2025-5573,0,0,6e69e3f6614bb634486e032f3753cb8f537723c56a38d21eec74aa1f5111ea31,2025-06-06T18:48:46.463000
@@ -299770,7 +299917,7 @@ CVE-2025-5581,0,0,c54747d4f47de2d53a0450ac3d2803f6b1ce7f3a8f3dd0d32c7ea29ca0ea8b
CVE-2025-5582,0,0,d2f1baa22f55fc38a8f865d0e99938121f7ce9bfb4e6584060e61c164943f9d6,2025-06-04T17:44:37.780000
CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991ad,2025-06-04T17:44:26.393000
CVE-2025-5584,0,0,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000
-CVE-2025-5585,0,1,f7aa0005acc45739703fa601ed988122de7dfa6f8678fc554dfebbcd05ac73f4,2025-07-08T14:54:51.113000
+CVE-2025-5585,0,0,f7aa0005acc45739703fa601ed988122de7dfa6f8678fc554dfebbcd05ac73f4,2025-07-08T14:54:51.113000
CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000
CVE-2025-5588,0,0,f2de2123ce661e18a253375b07ab98eae21f0a928f6ef4ce36082985c7370c49,2025-06-26T18:57:43.670000
CVE-2025-5589,0,0,6c79a04993e971b42452f3a0ae16618b76eb63bb362b0f3291c861226ed4734d,2025-06-16T12:32:18.840000
@@ -299965,7 +300112,7 @@ CVE-2025-5813,0,0,cd46b62d3d908778d35675b466ba82ee8dd96b497366599fc4a9680ca39a9b
CVE-2025-5814,0,0,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000
CVE-2025-5815,0,0,3c63e526b28352a674f2d0faaef2707920143cb75a4277d3e7f975593f6cf816,2025-06-16T12:32:18.840000
CVE-2025-5817,0,0,79f77157f922272fdfd131fe6a4742fc78813ad09e6f90755d48481c7fc27a3d,2025-07-03T15:13:53.147000
-CVE-2025-5820,0,1,b12bffc84567b7bf9cad053cf073f30453f69a454124851de696feecabd9b925,2025-07-08T14:28:29.520000
+CVE-2025-5820,0,0,b12bffc84567b7bf9cad053cf073f30453f69a454124851de696feecabd9b925,2025-07-08T14:28:29.520000
CVE-2025-5822,0,0,2d52c9ef7f3da9b420a97ba779a5d173a8646b73b1293ad3cb4cc444ac55b60e,2025-06-26T18:57:43.670000
CVE-2025-5823,0,0,18b34d2aa79ad8e9bc060291fec5d0b3f8830e1df880645505b2d47119000220,2025-06-26T18:57:43.670000
CVE-2025-5824,0,0,4c56880f227f62e11acb61419c4555ae0867da6a656f259455cbbb057c98ded0,2025-06-26T18:57:43.670000
@@ -299975,9 +300122,9 @@ CVE-2025-5827,0,0,f319ab09e017bd98300af6fcf8a417802e646ec75dec5f362e7bb2f977ab58
CVE-2025-5828,0,0,aeab175399b429b474fbf74628c9c5345d3180d32a4e32973c96a1ca5fac5526,2025-06-26T18:57:43.670000
CVE-2025-5829,0,0,804641730bf8366db413143c2d0c564d912e4b6814a9e8c125bc97bcf24ac376,2025-06-26T18:57:43.670000
CVE-2025-5830,0,0,f3d68e628232b63f7c89590d2306918ef66cee448f93424c49476e14bac2b48f,2025-06-26T18:57:43.670000
-CVE-2025-5832,0,1,6bd5950d86f819d12454e9671800b2f6b811c3a961044ec988616ce44c7d917a,2025-07-08T14:52:30.267000
-CVE-2025-5833,0,1,cec12c76ff06b523c8c03e7643c742bd06ed393153aceeda79abc289dcfddbd9,2025-07-08T14:52:15.600000
-CVE-2025-5834,0,1,dc41745f0a4ed9a3b150d1d75c72bfbfe911bb594502e4ba9a64bbed06f217a2,2025-07-08T14:51:29.567000
+CVE-2025-5832,0,0,6bd5950d86f819d12454e9671800b2f6b811c3a961044ec988616ce44c7d917a,2025-07-08T14:52:30.267000
+CVE-2025-5833,0,0,cec12c76ff06b523c8c03e7643c742bd06ed393153aceeda79abc289dcfddbd9,2025-07-08T14:52:15.600000
+CVE-2025-5834,0,0,dc41745f0a4ed9a3b150d1d75c72bfbfe911bb594502e4ba9a64bbed06f217a2,2025-07-08T14:51:29.567000
CVE-2025-5836,0,0,d80bb6457241c6112de58f50d5f8d524854cb0ce4d9b0e26a6df5eac567f78ac,2025-06-09T19:07:49.417000
CVE-2025-5837,0,0,85c1936a3a1142d6d72d779afcb63f2a00a18b124b5cff42b89badcdc2313d9c,2025-06-09T19:07:41.590000
CVE-2025-5838,0,0,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b08,2025-06-10T14:56:21.530000
@@ -300056,21 +300203,21 @@ CVE-2025-5915,0,0,f4817e3f541276db8764595bab47239f1072f31f9c3d32c2caaee3b4950d68
CVE-2025-5916,0,0,77a227907bb56f71f2bfd1bf497899ff1c8f6eb6d2e97956e9c7ee1b79bfbd3d,2025-06-12T16:06:47.857000
CVE-2025-5917,0,0,0b15f8cb6694a25438c80b55bb7a5b265e6faccf484d04cd7c6d5563268713ff,2025-06-12T16:06:47.857000
CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d2b,2025-06-12T16:06:47.857000
-CVE-2025-5920,0,0,5a520c028531cb4155061b510476cf6466ae7ddb66a0dfae81f013209212e61f,2025-07-04T10:15:24.223000
+CVE-2025-5920,0,1,0902d8651ad5f1520921533048e02b677fefeb0346f91da9e42c7b275d504415,2025-07-08T16:18:53.607000
CVE-2025-5923,0,0,bd32fa6b95a8f310c6b07918d04b1a4cdef7f962ecfa8c2518b68d11b4b0741e,2025-06-16T12:32:18.840000
-CVE-2025-5924,0,0,c72f8c1be755b4ba13764b8ca61e5780f947517bec719900d505f12b0a0a0b46,2025-07-04T03:15:21.240000
+CVE-2025-5924,0,1,1e0410010add3fb12f15bcba25aa0b1ca33a0b31298295b4ef1a2ef96e5b14d1,2025-07-08T16:18:53.607000
CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000
CVE-2025-5926,0,0,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000
-CVE-2025-5927,0,1,eed1e2da4fd1e07e1ab2082ed43631c56c04f807cb9ac6c4583d4e6eab81ab78,2025-07-08T14:54:00.810000
+CVE-2025-5927,0,0,eed1e2da4fd1e07e1ab2082ed43631c56c04f807cb9ac6c4583d4e6eab81ab78,2025-07-08T14:54:00.810000
CVE-2025-5928,0,0,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000
CVE-2025-5929,0,0,22ddf18d1b5be0427bfffe06c7c342a3ee4be212fd6ecf814d57608fd0af56fb,2025-07-08T11:32:50.840000
CVE-2025-5930,0,0,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000
CVE-2025-5932,0,0,2139f6b06237b79e72d4532bc8219346e6dc94ec5de4cc7ea77426914ccc3bb1,2025-07-07T16:03:18.250000
-CVE-2025-5933,0,0,4ab1a4e0a3eb3d84beabd54254ef79ff81b64f59138d24e8a3ed5570a379ad13,2025-07-04T03:15:21.407000
+CVE-2025-5933,0,1,ce6d1ebf802529ba83ecad621fb5d3f6bcd8bcbd4e838658e3e86ed5f78b4039,2025-07-08T16:18:53.607000
CVE-2025-5934,0,0,2b04aea49be1b2e817d664c8d52ff126b146b95757a60bd9875f5715a4755cac,2025-06-20T13:11:11.560000
CVE-2025-5935,0,0,c15a5d20553ffc7a7c30ae68f0e5f38be384091a8a588ccb546a6d6a87a9c526,2025-06-12T16:06:39.330000
CVE-2025-5936,0,0,5a2ef8dc5560fbcce6b1c9ab3c63719c3155e5810fde1167bb928311a7001c38,2025-07-07T15:55:10.410000
-CVE-2025-5937,0,1,8269f1fd9403aed02b69c22a75c58e803b4a6db6a3917a4c10c6b4989ac0ce02,2025-07-08T14:46:09.287000
+CVE-2025-5937,0,0,8269f1fd9403aed02b69c22a75c58e803b4a6db6a3917a4c10c6b4989ac0ce02,2025-07-08T14:46:09.287000
CVE-2025-5938,0,0,de6ba49470711279279f27a904465957f8293ec15c3176c20b2597289d4c7b40,2025-06-16T12:32:18.840000
CVE-2025-5939,0,0,fae4e42cb7ec096d2eda48ac42042deaadc4d81bda29462ec7008261e2cabbf5,2025-06-16T12:32:18.840000
CVE-2025-5940,0,0,e934f4521d5519f04066b506472b3c339ac469931fdceb7d8db7faecdce1d721,2025-07-07T15:54:17.250000
@@ -300080,9 +300227,9 @@ CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c5
CVE-2025-5950,0,0,760fa6d42f3c866c98b5e3438e6c6f00bd5fd5520537943b3e544b07838ccbee,2025-06-16T12:32:18.840000
CVE-2025-5951,0,0,8284d36183b5c5a20ce1ccc5cb7415a68b49193aca2a0e8df993129c1d1d98e3,2025-06-28T23:15:21.963000
CVE-2025-5952,0,0,80f5810e94a735443b1add4b87f50d30096f6ed0c46ddf37bebc56b27e945b75,2025-06-12T16:06:39.330000
-CVE-2025-5953,0,0,0a65ba7dad80d78c00297bacfefe05191d971aa2d5c6a2f1f6cb79a4378a67e4,2025-07-04T03:15:21.583000
-CVE-2025-5956,0,0,20b46444f81cce9e023e10b8442889f698b8542b93f82d33b929ea695203acdd,2025-07-04T03:15:21.747000
-CVE-2025-5957,0,0,014a3217902beff8d9659ceab173a87dce13308a02a1b50f04ebce831e0bcf37,2025-07-08T05:15:30.660000
+CVE-2025-5953,0,1,2b68b114d1323265c4573732eafe776026f5d2e8ef685c5c6cc3c90bded6d322,2025-07-08T16:18:53.607000
+CVE-2025-5956,0,1,182a3818c8370b1913069f7a040f95c39899648d069318f20ce61deaa07bf236,2025-07-08T16:18:53.607000
+CVE-2025-5957,0,1,e0ce057a69c31c1a0e9954b748f53f9e249946af7ebe4038ea1eb122e7f228bb,2025-07-08T16:18:14.207000
CVE-2025-5958,0,0,a36b78799dbbd1551f96c1bff1614591c13905c454c0b07d9b02e19316c76c99,2025-06-16T14:50:15.493000
CVE-2025-5959,0,0,a39e129e58512bcee45e4710589bda0209f85db251e85a57b71fd6de1e661083,2025-06-16T14:49:13.623000
CVE-2025-5961,0,0,eaa27bb56089b7fa09f99a32ff7b37f6b2fc66a8070612fab137e64cf5236dfe,2025-07-03T15:13:53.147000
@@ -300107,7 +300254,7 @@ CVE-2025-5982,0,0,d9487128b71b64381d82a652f7a1122df97e22510aec0c066c9d874bcd0cf9
CVE-2025-5984,0,0,9c065cc4f1bf71f29d217205fa1a3017b01589309492c87e21e29320e0443497,2025-06-17T20:34:36.177000
CVE-2025-5985,0,0,6bc7c20833bbb87d89e08ff2c433a1431f6002ad9972fe39c1f3aa9dac9d18ca,2025-06-17T20:34:19.473000
CVE-2025-5986,0,0,5cad509000c0831e557b68272b8d7dbc9b1f9f855a32309ac32da79f6d8d3b69,2025-07-02T16:07:00.620000
-CVE-2025-5987,0,0,a22b8db48a3bd06981dbec5d9a92427040d43e37d53d5bbb66b3d5f64b6c35ac,2025-07-07T15:15:28.180000
+CVE-2025-5987,0,1,1fce1cd7feacc52f8dbe8254f3516e6fbba6f953398ca03a0802cc4f6c693656,2025-07-08T16:18:34.923000
CVE-2025-5990,0,0,3b1aca804ea6c0f6e9294e1b2529898db8d219cf683bd44dfcf13644214951d4,2025-06-16T12:32:18.840000
CVE-2025-5991,0,0,2d56ef31c39d49ebda5cce54941d2d07bc366906f8f2e10ec12b1264a4709a15,2025-06-12T16:06:20.180000
CVE-2025-5995,0,0,e0a95e1875ad143ee49273c882884536a042b40281445da0f88771ec39f3e3b5,2025-06-30T18:39:09.973000
@@ -300131,14 +300278,14 @@ CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a
CVE-2025-6031,0,0,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000
CVE-2025-6032,0,0,f67e1ca89d1ad9336fecdae2d68d83e9b02b8f60c5d6e81682efbe05551b8c71,2025-07-08T03:15:30.727000
CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000
-CVE-2025-6039,0,0,54678a3c3f873d8ba1f08ff048f062b795fa075b8a73a104c49bcf010b698d72,2025-07-04T03:15:21.910000
+CVE-2025-6039,0,1,6b84c21907e40cd684bcb033e3b9f89fbbdd3d87aa6c728045af124524704dc4,2025-07-08T16:18:53.607000
CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000
-CVE-2025-6041,0,0,461a9acce32b4ccf27c73262e7998c2eb65e22ff890deeac8b30d0c34cad2b7a,2025-07-04T03:15:22.080000
-CVE-2025-6044,0,0,82e45569c148914a016dadee1447797878658ce31a86d75f87ff1d51d29e71b7,2025-07-07T19:15:23.920000
+CVE-2025-6041,0,1,badfbc363966712654f0b1003b7bdd31a116fa19d6631eae2317fc8409f3f851,2025-07-08T16:18:53.607000
+CVE-2025-6044,0,1,415757f0843488fdca8e2ed795957989099fcd1c41fe6677f58514c83ff4f6f3,2025-07-08T16:18:34.923000
CVE-2025-6050,0,0,d47183ee5e3fda427920d7ad78ff4ae3678a9feeabdcb745cd0f696af706f042,2025-06-17T20:50:23.507000
CVE-2025-6052,0,0,f7b8f6bed96346c732cfe3c58915aaa99b04704580ca581c3769d9ac03c1036c,2025-06-16T12:32:18.840000
CVE-2025-6055,0,0,a1414c05d6a8565eece9cbd85c74aae5128e8846318652e194e65bb36ec8b3a2,2025-06-16T12:32:18.840000
-CVE-2025-6056,0,0,6e2b54c90bf9a14e675e0a469c1983bded7ab2e36e44712169fd3edcc9d2ea8d,2025-07-04T12:15:35.407000
+CVE-2025-6056,0,1,bc2705ca3585bd4d5766e849b896969704957db7cef44a363352d2d185a81525,2025-07-08T16:18:53.607000
CVE-2025-6059,0,0,84d0ce35ead1515ece8397572c27c6a293b39d090719f8fde70ea6fa5e96acd4,2025-06-16T12:32:18.840000
CVE-2025-6061,0,0,1e4ad2c51e11b85a0411cc0ba0a247fef015fe294ab3ff30c502f60f1836c736,2025-06-16T12:32:18.840000
CVE-2025-6062,0,0,5bf9e4ece70cbb53a8f33b39f23213ffcbb9e338a70925ebae7177b4c0441131,2025-06-16T12:32:18.840000
@@ -300147,10 +300294,10 @@ CVE-2025-6064,0,0,979f98e59c93c3db1b1e3d8ca32b91237e3a41952bd15c0b929b60ca805f9f
CVE-2025-6065,0,0,b54a72f9a0b99c16c66aef6c3f604cf5fb2ce5dc53cfc18dad9d67742adfbf62,2025-06-16T12:32:18.840000
CVE-2025-6069,0,0,0f007db3fd10778e4e1329010274d3b3eb06f3b20784f9447cb9e7427701e0c3,2025-07-07T18:15:29.150000
CVE-2025-6070,0,0,c5bf4414dfa4d281aa3a990feec25cc21fddd34f58ddd67c6eaf8ae460160cc5,2025-06-16T12:32:18.840000
-CVE-2025-6071,0,0,dbf7438d662f98ec62edc3158b935e1c49f9bf93bdffaaf3704baa08bbb26972,2025-07-03T17:15:40.373000
-CVE-2025-6072,0,0,e60e47e83404371b7fa20db61c7332097e8c00ead78c80ec918203b6a5d77a6a,2025-07-03T17:15:40.567000
-CVE-2025-6073,0,0,271765a6c9ad1ea04ba3a89dc1d69c71ad625836cbb07bda73db606aee817134,2025-07-03T17:15:40.750000
-CVE-2025-6074,0,0,0a3a0063e5d7db899b6c3dece08abe5ad2226503902ddace154b04f3d016963b,2025-07-03T17:15:40.920000
+CVE-2025-6071,0,1,5a2f1c37d2d27a51af48fa91ca5d3cdc66d7e8a21cc0b9d4147668b931579f4d,2025-07-08T16:19:11.700000
+CVE-2025-6072,0,1,c404ef56b8d7c95a44a5ea20a1ffadee7a90f2312922176828cc4347c44b4b31,2025-07-08T16:19:11.700000
+CVE-2025-6073,0,1,59aa2c7268ef1b1e834caf9432d42406e93210052d682b4dfbc8879d14a36fcf,2025-07-08T16:19:11.700000
+CVE-2025-6074,0,1,4e606a83df0a0b396f77e3189dbc96d079ead52f274d9bbf667a51c66e418ac5,2025-07-08T16:19:11.700000
CVE-2025-6081,0,0,1392e63485f5340f9ebbe3280ccff994df6ebed7ffeba0a6bfe7122906780321,2025-07-03T15:14:12.767000
CVE-2025-6083,0,0,b33f55da80da8b54015e6694bf27d7fb64e15676e9297ecd61b06510d2a00a90,2025-06-16T12:32:18.840000
CVE-2025-6086,0,0,5fe71f700a5db4748b73456874508af7453c8bbdad176612b1ae063647fd5c71,2025-06-18T13:46:52.973000
@@ -300247,17 +300394,17 @@ CVE-2025-6196,0,0,ebd0476f8627cd400d4a2990bf388e707195c795d8a7681502291e5ed83c18
CVE-2025-6199,0,0,27de73d7bdfbcb0d047107c059b4fb0beddf1f77ad32bc36681bc8884ca65c55,2025-06-17T20:50:23.507000
CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a85,2025-06-23T20:16:59.783000
CVE-2025-6206,0,0,c66ee500876bc4abb021bb9d77aeda45e0e42d83e894cdd37485d8f28334b052,2025-06-26T18:58:14.280000
-CVE-2025-6209,0,0,4d194405f99de3505fed4fbc7baf9d82092f31b0c10e81656b4ad21d616433ac,2025-07-07T14:15:25.287000
-CVE-2025-6210,0,0,14d31ee2b00a58e0d63a7ab89552e4950b1424b800527d9bb45e7fdd7c86ee97,2025-07-07T10:15:29.040000
+CVE-2025-6209,0,1,db3c19135bac6aaaf95e8c246dd684e62c700c77a0b4192115788191a8fc6512,2025-07-08T16:18:34.923000
+CVE-2025-6210,0,1,092e2fb383b733e1cadefbb5ad49e00dfbdb68e34f33893feee357b52d340aac,2025-07-08T16:18:34.923000
CVE-2025-6212,0,0,9eb0c977d92e30e2e67efcaac7f25f50243836e669a2d22cb477be6116fc0bde,2025-07-08T11:35:01.817000
CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000
CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000
CVE-2025-6218,0,0,0e265a89cc2a3bd08feb5d5cbdea0ea20f815a5e3a21352ce4021a3ae0596bec,2025-06-25T19:03:33.817000
CVE-2025-6220,0,0,70ba2b5176193b00d7c5791b5a8342d63e62622f52556ab6ab22db00bbc1458d,2025-06-18T13:47:40.833000
CVE-2025-6224,0,0,c2476a14c43ef31967d89288ff41b75746283c187c9c6cdc794d96fe44a26458,2025-07-03T15:14:12.767000
-CVE-2025-6238,0,0,43536995b122e8c09fc85415169b6ce2705e742ae7515aa376619850727f57b7,2025-07-04T03:15:22.237000
+CVE-2025-6238,0,1,70e8544f27b2c647ed75133c57e9501fbdebb41e79fc43e2c23c74ed4d734482,2025-07-08T16:18:53.607000
CVE-2025-6240,0,0,ba4da5fd605eca3c919532cf0a8a1661ebda5a87c35d4010c4dddeaa23d93e9a,2025-06-23T20:16:59.783000
-CVE-2025-6244,0,0,d19de841906576e8324a3c92e6164494344d5067aac942ccb32f69872f61c68d,2025-07-08T03:15:30.947000
+CVE-2025-6244,0,1,31f1f32676eb84ea1757af431f283c34c918ea93fac9a83e29e34f1a930b8f9c,2025-07-08T16:18:14.207000
CVE-2025-6252,0,0,04266fde32de91a19cd75afe711753a0e9f9154bece1418589e4e14bad3b2599,2025-07-07T14:51:20.410000
CVE-2025-6257,0,0,cc91b7557b526c88672e08add1b684bde89a65ab4dd7fa052a99a1c1c9c823b5,2025-06-23T20:16:40.143000
CVE-2025-6258,0,0,a4b6be5935c4432c7a129304f469494da82c625050798afddedddfa563a7fe1e,2025-06-26T18:57:43.670000
@@ -300274,8 +300421,8 @@ CVE-2025-6274,0,0,d1c56c73fd2ed1a2abccafe1b4d838b5dae80f1e1020fdb3cb0cfa7fc119ea
CVE-2025-6275,0,0,6847ddb53c428ab782b5bb5144510fc9c30ff8873135f2b57a95ea2880350651,2025-07-02T18:34:42.377000
CVE-2025-6276,0,0,ccb81ed6c0bd85a63d78fd4d2a38a1b018d0dc69b6dbbfdd1314d8ec4b6bfe0b,2025-06-23T20:16:40.143000
CVE-2025-6277,0,0,f3138c5bf160fb9cc92ef2790899f67376501f52199dbecebe88985f0053453c,2025-06-23T20:16:40.143000
-CVE-2025-6278,0,0,e0058a2f6852ef7743c549ea6e593fe0d952f0b04e52d5c4b82d675c0be592ff,2025-06-23T20:16:40.143000
-CVE-2025-6279,0,0,a4bb97b75438a607846adf6cd189610901b11ed54c3690eee358bc633fe14110,2025-06-23T20:16:40.143000
+CVE-2025-6278,0,1,44923e7b2795e6a195297e1518f85b85079ab11dddd7b8e2ddb5d199fab37ee5,2025-07-08T16:38:18.260000
+CVE-2025-6279,0,1,b89b8ce1e69df8ae429a0742a5e246a886aaf918d1c420fff02945c45ea2eb9b,2025-07-08T16:36:41.900000
CVE-2025-6280,0,0,c7888e03743eb650df883600ee462887fc9db7a5b6ee96f5c7484bb7380a7d85,2025-06-23T20:16:40.143000
CVE-2025-6281,0,0,25aa7b9dfe081c112d8d58e4ce5efb1b8be42368bc102fb60103d61db49b7134,2025-07-02T18:37:11.983000
CVE-2025-6282,0,0,0c2da46a89cbbe9026c79b3c6cf10427703bbd3c6e9eb8bd217b26455bfc69f6,2025-06-23T20:16:40.143000
@@ -300367,7 +300514,7 @@ CVE-2025-6379,0,0,a573d0789f74e2940a233e26e5770bd43ee83276728b28e7918a6f6c0e9e28
CVE-2025-6381,0,0,bcb772a2599dc7010241cc7bbab88371a6f4c6ca137948aff05aab6ef1ed3e85,2025-07-07T15:24:28.070000
CVE-2025-6383,0,0,d4983baed15d1793d27d210c93a94db5a7e163abe77193a900e62847d2cde376,2025-07-08T11:31:13.823000
CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000
-CVE-2025-6386,0,0,b2a078e22a659d4d88f448dea0064464b20c22ed2491c180557e36b6a04d2807,2025-07-07T10:15:29.187000
+CVE-2025-6386,0,1,36273686c966a96e6687737cbcaf18f7573e7dd2a4ed9617fdf7c38b7cac9900,2025-07-08T16:18:34.923000
CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000
CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000
CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000
@@ -300407,7 +300554,7 @@ CVE-2025-6433,0,0,32eef07a3ae4522820165d0c9de136b011470ab9863d1530fafe3e7189cb6d
CVE-2025-6434,0,0,202011e542eb4cf24fd67c68bcf43978c442e14154021242b1585464291001ff,2025-07-03T16:04:52.800000
CVE-2025-6435,0,0,3fc735ad04c67c5baa7a196b565b257c92ed054bc90bafeaff087edaec7ae8f4,2025-07-03T16:09:39.497000
CVE-2025-6436,0,0,da632e16745b883a0177ddbc6da8c672a6b51f9a70e315b86fbe9399675f3844,2025-07-03T16:09:47.610000
-CVE-2025-6437,0,1,76c42fa9baf77301080cf733d12c398f2bba551c741c5b4cfac9d81547ba7471,2025-07-08T14:10:13.767000
+CVE-2025-6437,0,0,76c42fa9baf77301080cf733d12c398f2bba551c741c5b4cfac9d81547ba7471,2025-07-08T14:10:13.767000
CVE-2025-6442,0,0,0c375e5c3a1bc0a69229d6c6f1f25c625ba6ba0948068e1aa74cee3a131b76ce,2025-06-26T18:57:43.670000
CVE-2025-6443,0,0,234c9867f25d85d44fc506bbf75440155c7227dc8656924121bdfd34971fe1ce,2025-06-26T18:57:43.670000
CVE-2025-6444,0,0,37705057457fe7179db85da84838ca3b56fe8ff63e8fcdb240ff0b993581938c,2025-06-26T18:57:43.670000
@@ -300425,7 +300572,7 @@ CVE-2025-6456,0,0,31edf54365c40ca692dc828ecd2cae22754fd4157ef8b7b05f96d0280c2dbf
CVE-2025-6457,0,0,ec2a9dd42c1bcf669254ec6afca5da44ae8e8abdf8ae4d1d4071cff11bb8a640,2025-06-27T17:02:36.347000
CVE-2025-6458,0,0,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000
CVE-2025-6459,0,0,b36a0faeb7f0fe117204679b1cb776e2c6545b75baddc60f4c84c3c6b62d044e,2025-07-08T13:55:50.920000
-CVE-2025-6462,0,1,0710838e8f78117419b33500a8bc67eead66ca50903ddc9d90e6c727dd8f9d4a,2025-07-08T14:40:49.613000
+CVE-2025-6462,0,0,0710838e8f78117419b33500a8bc67eead66ca50903ddc9d90e6c727dd8f9d4a,2025-07-08T14:40:49.613000
CVE-2025-6463,0,0,e81d8f021da6b8c9b716bbee8f9b01e2e5056280dd82770aedf546ee5971feb2,2025-07-07T14:28:51.123000
CVE-2025-6464,0,0,57a826213e944e28737944d653608fc09e5099c7124b5b98ecdfb0c135832466,2025-07-07T14:22:31.690000
CVE-2025-6466,0,0,02dda139ebc87521cef69d237c47fae4cb16f9d5a4fcba111e2a9a76c60a2e10,2025-06-23T20:16:21.633000
@@ -300495,7 +300642,7 @@ CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaf
CVE-2025-6546,0,0,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000
CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000
CVE-2025-6550,0,0,c0a691cea8a5ed699b0d12b82357599196c16b195f2af32ef4c55625a42b68d0,2025-07-07T15:38:38.413000
-CVE-2025-6551,0,1,2a94174e2614ca3546b6a5e525dcaf472420d11762377d8f50c13a66a36f8364,2025-07-08T14:26:00.507000
+CVE-2025-6551,0,0,2a94174e2614ca3546b6a5e525dcaf472420d11762377d8f50c13a66a36f8364,2025-07-08T14:26:00.507000
CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000
CVE-2025-6554,0,0,890362c519a4357d98514f62cd39fc9e4bb37403cd00a1b3ef610614d19dbf03,2025-07-03T14:36:33.257000
CVE-2025-6555,0,0,f4d795313bf162cf12535912f4855954a037cdfadea7619dfbb980dbbe1e4399,2025-07-02T17:15:52.943000
@@ -300518,7 +300665,7 @@ CVE-2025-6580,0,0,14c9a21bff52d8562deb8a5ff102203adfe298df563381633ada51bbda9d23
CVE-2025-6581,0,0,9eb16713b89b10d47a3355e63f223e1d1babaf81dbe3bf267fcf583104bec561,2025-07-02T17:11:46.147000
CVE-2025-6582,0,0,06b49d50890d886846d052750b63a829a4a61d16f96e10b0780325588b187412,2025-07-02T17:04:36.247000
CVE-2025-6583,0,0,30d0558eb9467ec1d68b23c75a699e90fa70f2c3c0ad5646089f1aba65b21e55,2025-07-02T16:46:47.320000
-CVE-2025-6586,0,0,1845e5586fb34f5b253f07b953dde0e39965e19df11326450c87754c497a56d0,2025-07-04T03:15:22.407000
+CVE-2025-6586,0,1,19f6eb9ee70e733632488d02490a341e0799f465a4251bc55fbfe7a9b7ccc7c8,2025-07-08T16:18:53.607000
CVE-2025-6587,0,0,94e040daa08ba5c9e3932753930ce394b84353f61fda95c1801a18e9a0bd6347,2025-07-03T15:13:53.147000
CVE-2025-6600,0,0,0112972e1e9176f69319f72a7472c90ba6839f66bf6753048a883b2df6ce423f,2025-07-03T15:14:12.767000
CVE-2025-6603,0,0,94e8918af653fece9803c6dda129968de5b58a553aefbcdcb849847b69658ab4,2025-06-26T18:57:43.670000
@@ -300565,13 +300712,13 @@ CVE-2025-6659,0,0,b2432dcc4b5318b459306d075f65f7fe414d1aa89824597c8295bcd4f8f557
CVE-2025-6660,0,0,e6ccd579035a2f0f32c58e538fe09d88a2651f044f4007f76581f8781f52099b,2025-07-07T17:37:13.450000
CVE-2025-6661,0,0,fd8b0d49c07db3c6a53b199ebdb73fdd4cb7b2ba605aa1b301d1aa8a4ccb614c,2025-07-01T19:16:39.160000
CVE-2025-6662,0,0,f2a3ee41e239004b48fa7d4e486cb8eda1d4f024ab4a2f1f6cd63d323901fd9a,2025-07-01T19:11:55.183000
-CVE-2025-6663,0,0,52fbcef2dccc108f1590caa9a9d32b98e0796918d2d07fe049f49d8e8110be67,2025-07-07T15:15:28.480000
+CVE-2025-6663,0,1,395a14ec9da74b133b74f0d51eb63ea09085ef8ccdd7510f5732998ae7604b36,2025-07-08T16:18:34.923000
CVE-2025-6664,0,0,255c7bbda244ee1c6cb8ea0927bfc65b2c2f80bee216e706a66f1a5aec92db63,2025-06-27T17:57:43.810000
CVE-2025-6665,0,0,819e0fbbba720c6c224657e5e3d234dfe09f50d6f19ea31a4a8557c46f9ecfaf,2025-06-27T17:56:25.200000
CVE-2025-6667,0,0,f7249d0ce2242cc1fb55502e78a9d1851a88aea1d56705388779a71c32d97776,2025-06-30T21:15:32.063000
CVE-2025-6668,0,0,2c668ab21380ad28d26e4a71eb753799465f7ccb1ef8018c5159319921192efe,2025-06-27T17:49:20.193000
CVE-2025-6669,0,0,910a314b076194cb451db40c00cbeb61d557257d78d120caf65549dfd156af45,2025-06-27T11:15:25.547000
-CVE-2025-6673,0,0,aab28c64bba268152bc42aafab358cf6d75d4a6881d75f7cec498d59637588cf,2025-07-04T08:15:25.950000
+CVE-2025-6673,0,1,ce2caded9e63c2cb7b5c112d9b94a3f3090ff6a566948daa6f5c2a769c4e4883,2025-07-08T16:18:53.607000
CVE-2025-6674,0,0,d32ad0df1132cadb38008cb78ee85b01e2302fd895f5f05d27f083e37c151134,2025-06-26T18:57:43.670000
CVE-2025-6675,0,0,0de2d91f209e42eb7f75c0139bbe9427479426b001a898438230fd824e6c2d2d,2025-06-26T18:57:43.670000
CVE-2025-6676,0,0,ac782ce50af3871765bdc6db85e42945925f65bc3a9a783e280262721507bcea,2025-06-26T18:57:43.670000
@@ -300580,7 +300727,7 @@ CVE-2025-6678,0,0,015887ea893979c5601a9a5730f4adfb06aac901dd851eeda9fa3abff97629
CVE-2025-6686,0,0,f7f48a047afe7ba6917b5b6f9718bcd1b2ceea4d6b927d051b780677faecb991,2025-07-08T13:51:15.403000
CVE-2025-6687,0,0,539b6bc666b3d8f7165f76a15394f1f82fca270b81ce85abf8ade35978b3fe59,2025-07-08T13:46:45.833000
CVE-2025-6688,0,0,5925361c4f277402b4d05594242f77bf2b7c8299cc751a0e160b50223b3f53a3,2025-07-02T17:49:42.750000
-CVE-2025-6689,0,1,cca58c0a0c9cc2053b716e4cc05dc6fdfcdb0e147fd73d3131e0c8d7a843a74a,2025-07-08T14:49:57.463000
+CVE-2025-6689,0,0,cca58c0a0c9cc2053b716e4cc05dc6fdfcdb0e147fd73d3131e0c8d7a843a74a,2025-07-08T14:49:57.463000
CVE-2025-6693,0,0,9be9763bb7fc997d64f91e352fcfdf0f938356018981543692fcb1e55b2868cf,2025-06-26T18:57:43.670000
CVE-2025-6694,0,0,2000140ddaf445d1408c35f7669e0d0a9fa86bae15b257b52f10bad5fb18c963,2025-07-01T19:03:59.900000
CVE-2025-6695,0,0,5a80e5ed8186c52dc4a6a049e87510cf6c4856278596cca9613176ffd164e49b,2025-07-01T18:18:08.297000
@@ -300597,12 +300744,12 @@ CVE-2025-6706,0,0,f03487ea2f7d1a5732fb4f51e4ca2c790eb579835cfc91b9c45cdf286a45f5
CVE-2025-6707,0,0,14c73d68a98b746593e8bc174ab911da35592c0257c3e73af6fd070f01c8c9f2,2025-06-26T18:57:43.670000
CVE-2025-6709,0,0,ce3375defd141f50a441bec507fa56a57be29472c18c6330b419dc2bf776df80,2025-06-26T18:57:43.670000
CVE-2025-6710,0,0,e2944d7980958a37152e00cd92dce387f65d6a5085b6deeca1df15f1c33947ee,2025-06-26T18:57:43.670000
-CVE-2025-6711,0,0,e23f00487c2f45f5c18b9b7efa1b580ebdde913c361d92a48aab651df03a6eed,2025-07-07T15:15:28.703000
-CVE-2025-6712,0,0,acbeba7162b4ab2a700652aec7c48a9a7bffb6072514ccaa32e6b019baa4bc9e,2025-07-07T15:15:28.890000
-CVE-2025-6713,0,0,b3856304dd6e2d27a25ca90bd7d0af496913132f9cbb5e1aec5b36f0debb7c73,2025-07-07T15:15:29.090000
-CVE-2025-6714,0,0,607d4f1e621ae1879eb6567bd0b3b4e0e0f35bbb63f16c644ccee71d8a820c96,2025-07-07T15:15:29.263000
+CVE-2025-6711,0,1,0831cc874b459c06cfca8ece835823d179418bb15c2e14be516f4421589ee4a9,2025-07-08T16:18:34.923000
+CVE-2025-6712,0,1,1a6eeacc065d5dc638fd34753a6f5148322b83beefa9c83fe2b1d48c580ff749,2025-07-08T16:18:34.923000
+CVE-2025-6713,0,1,6df24da1ede42c9e1c1fb2de46d798de5ef8524072c45ae4a007a20b2c03f18b,2025-07-08T16:18:34.923000
+CVE-2025-6714,0,1,fa5c01fd118de874e2b356a2f2228df289b17c762e4bd348dab244cfb060610d,2025-07-08T16:18:34.923000
CVE-2025-6725,0,0,a2520bcd148ac768abbb97089f3d98d6281e55b56fe1591d0610425b8362a99d,2025-07-03T15:13:53.147000
-CVE-2025-6729,0,0,456f32ebf7af6d6cbb448c2943d7146af2ab06fd22b170e760510c0f9f3c1283,2025-07-04T03:15:22.577000
+CVE-2025-6729,0,1,ad2da893078f3c64d780085eb57dd2c10298d18cf6cb9e26327034ac5d34e4f2,2025-07-08T16:18:53.607000
CVE-2025-6731,0,0,372cdc09b88b76ae1a3439cacc26558b9d3793f6aabb288d1732baf08077c5eb,2025-06-30T18:38:48.477000
CVE-2025-6732,0,0,8fbae11e85db6326dce69c03fc40f9211057f9c0c6b79145f0a15d2bc6b0f7f7,2025-06-30T18:38:48.477000
CVE-2025-6733,0,0,29112c27c8fa4f85be74fdc3843a414c0b31c464c139e7c2f4cb2ad60f19d16d,2025-06-30T18:38:48.477000
@@ -300610,11 +300757,11 @@ CVE-2025-6734,0,0,af9d11ca1e3694eed90555abd94388c3d1b00018f30b0a440d9a21f5de02d1
CVE-2025-6735,0,0,8734d70a00401da0ff9abed01b375db63bfe1b857ecd09eeb97e4130c9f85bb1,2025-06-30T18:38:48.477000
CVE-2025-6736,0,0,25903f9d1406c60f622962611fc5443a5d32d3cdb912833a9ad0899ef2f7c32d,2025-06-30T18:38:48.477000
CVE-2025-6738,0,0,3259930ec98b59546eeaeace9fb84641bae60a8fe1ea462b5fb5b4147d4fd671,2025-06-30T18:38:48.477000
-CVE-2025-6739,0,0,bd154751d866345fec59da65321a383a12e1d3bc94957e355ab825597d37c48a,2025-07-04T03:15:22.740000
-CVE-2025-6740,0,0,4df025ce77d1adfe2573d12dc431280049a6a66b06d7c4a694ba8dc72df73175,2025-07-04T12:15:35.570000
-CVE-2025-6743,0,0,1a2f8644f53e75d6c8b80fff15734043e2ec6a57d7ca239c2f4e32f989444480,2025-07-08T07:15:26.410000
-CVE-2025-6744,0,0,b5f9cafc355fb33653432dc11abcd11bb57a79884e7e009d43a5e54dab2f595a,2025-07-08T10:15:22.947000
-CVE-2025-6746,0,0,2cee8b5f62f2740e58418e06d7d18549cb6c59f308feeb8d07ef0e27b444984f,2025-07-08T07:15:26.587000
+CVE-2025-6739,0,1,296b68698d678885796e02fdcabfa1fd4cd82d98ac6928cc81223bf01ab4af40,2025-07-08T16:18:53.607000
+CVE-2025-6740,0,1,f2a5c7930b3c8f30608fd6048a089234b7bc7d41c3644daae934f36b331998ef,2025-07-08T16:18:53.607000
+CVE-2025-6743,0,1,3f346ed23c27b98a856876208e70020f9d60ac6851a4c052b8dba3971e508e1f,2025-07-08T16:18:14.207000
+CVE-2025-6744,0,1,663d1d999272cf9db0ee4c4b904e07c7e3ed5bc7e4f0cf81d04cd905bde5b621,2025-07-08T16:18:14.207000
+CVE-2025-6746,0,1,8dde306b804f2c8eda4cbf0bc2c08f4626710286c005d98fa0a38b9240dedb16,2025-07-08T16:18:14.207000
CVE-2025-6748,0,0,7f8f18ce472108822cda61d00f4ec9b1169d30c9d958ea970ce7bf174900b6ff,2025-06-30T18:38:48.477000
CVE-2025-6749,0,0,d1c491f56475f9982f91a0af7dbfe7ca7d1db32da1110cdac506d65ba7fc1676,2025-06-30T18:38:48.477000
CVE-2025-6750,0,0,f1b454f50a80614e8eea516f2449d507837abfd24769c351c9d643bb9f9983b5,2025-07-01T17:44:05.567000
@@ -300627,10 +300774,11 @@ CVE-2025-6761,0,0,e4aa62f203d4ba34beb7bc7552005e1ee7d628b1642e253cda9ca26ecfa6cb
CVE-2025-6762,0,0,75cd4b1572c25c8bfa181120ae91b7aedff91bf82d0f669f47b2f3f4fec5cad2,2025-06-30T18:38:48.477000
CVE-2025-6763,0,0,79011f757887077a09a36e14edcb0426409f6ce627f1762247315cb51e05c1de,2025-06-30T18:38:48.477000
CVE-2025-6765,0,0,abceb4e5d9b5d2270f3e300414cbfaa20f4eb30afbfb22c47cb90cb9cdf5c939,2025-06-30T18:38:48.477000
-CVE-2025-6766,0,1,dc8dd49cc3478788f2b2f5f3647aeb593b15e2c272283b6154073b2ca528315b,2025-07-08T14:48:43.857000
+CVE-2025-6766,0,0,dc8dd49cc3478788f2b2f5f3647aeb593b15e2c272283b6154073b2ca528315b,2025-07-08T14:48:43.857000
CVE-2025-6767,0,0,e66ee7c71d93f8d2844485a2c1655d3a47e6e7b08298639468ba1bccfddf04d3,2025-06-30T18:38:48.477000
CVE-2025-6768,0,0,37bb926d8b990c60ea5e5d0c65280f9be4688e1392481628e368413efd42599f,2025-06-30T18:38:23.493000
-CVE-2025-6770,1,1,ee4099e4ff23e8fbdf95505dc2eeb0571729b1b579d50944a53938c52d918ad6,2025-07-08T15:15:33.287000
+CVE-2025-6770,0,1,eafb70c54f4a78d5a68f8fb4e09e339f8337afb67d02c176d7814dd11bdbb420,2025-07-08T16:18:14.207000
+CVE-2025-6771,1,1,5efed52f673d7ad567f7acbcefe2bbcdbe76950234fdbc0301699259ab103914,2025-07-08T16:18:14.207000
CVE-2025-6772,0,0,da65060d5c4bba26a2e915836ce248e69e0cbde008603030822179818529823d,2025-06-30T18:38:23.493000
CVE-2025-6773,0,0,b6a587abbf4dba4ecd28c01fd0527caef4923164c66f4f713e09297bdcfe3f36,2025-06-30T18:38:23.493000
CVE-2025-6774,0,0,a82f53ac403b88d5954f3718e556e0f7b7aebae4ff925b3b66cd145254e56982,2025-06-30T18:38:23.493000
@@ -300638,42 +300786,42 @@ CVE-2025-6775,0,0,8844e93591b9f8f71933b4490a51dbe07d217bfd77f147a80f371490cffe99
CVE-2025-6776,0,0,a4afdc2a1b97ae313dde86d53b3dc2e793c44e826a62632b061ac5f515e063ef,2025-06-30T18:38:23.493000
CVE-2025-6777,0,0,b19ce5f2a44d2330af0f7c5aa52c8d9c24e188055a96f0c37063cc7b10898a5b,2025-06-30T18:38:23.493000
CVE-2025-6778,0,0,efd918246e6175788e5114ae56147b96154a3a7e0d246be8911df75c921c4aae,2025-06-30T18:38:23.493000
-CVE-2025-6782,0,0,821695b2228a990404d5b6a0b3225461b5f1f8f75f4df0bfca16c9bf09f3378d,2025-07-04T03:15:22.913000
-CVE-2025-6783,0,0,a8b17e099a3c12bd5674dedb676e1e9f3629c56e3d735bede6d3dc0fd6c3e32d,2025-07-04T03:15:23.077000
-CVE-2025-6786,0,0,2c6b6cd89ffc7638f53aae175be76bd1ca753dbf9627ab89ce7cee614973d3fc,2025-07-04T03:15:23.237000
-CVE-2025-6787,0,0,ac5669632f0e784ec656a74a94c9129ed904e0f16a44fee2fa3c0de6089296e2,2025-07-04T03:15:23.403000
-CVE-2025-6793,0,0,7c5be1eba4bb7ff8001061e18ff82440ad0da852d2ce63cb199c383241065121,2025-07-07T15:15:29.637000
-CVE-2025-6794,0,0,e4e4fa4f9fa1667788d0032f641bc7fda00ebe2f542efcebfd735eaaeb284d38,2025-07-07T15:15:29.793000
-CVE-2025-6795,0,0,fcd252622aa63286b28f77be9d79861da829c62169b1e1225aef62cb47e7e46c,2025-07-07T15:15:29.967000
-CVE-2025-6796,0,0,015cab5641f863cedddae1b208bf1619e5d6c25eb2bd4f80def59dcb6cd7246c,2025-07-07T15:15:30.283000
-CVE-2025-6797,0,0,d5e00a9cf3a5ddc9600e5f2b0371ff11abc8d438241132bb102c138a0392afc8,2025-07-07T15:15:30.430000
-CVE-2025-6798,0,0,ee78d011a8e87919416b0a4f03004a48bd1cdad2c777c4c86fcc4b2109459a77,2025-07-07T15:15:30.563000
-CVE-2025-6799,0,0,19fdc3c8ae904a6f1e3f8c6eb4f0c658de7fb7f0158d216cb0b974859d068b58,2025-07-07T15:15:30.710000
-CVE-2025-6800,0,0,22ab489015e46bebf343782e9522b885b0c25f0050ebfed615eac29c778cc107,2025-07-07T15:15:30.847000
-CVE-2025-6801,0,0,87cddc193f2a08842e67775d607c69c2a23e281456de58a21c5901047044bc1d,2025-07-07T15:15:30.987000
-CVE-2025-6802,0,0,d9a14b4c758a4685cb0875a75db22e42196f22fec656d7bcefbcba5d60307829,2025-07-07T15:15:31.123000
-CVE-2025-6803,0,0,b3e54e7fa9f721a8a861a0b9e6c0d067a804a108fb47523f53b884bb06ad0b67,2025-07-07T15:15:31.270000
-CVE-2025-6804,0,0,11af759a40be67017f75a9459620509c4c7665757a07e51753b8deec818dffbe,2025-07-07T15:15:31.407000
-CVE-2025-6805,0,0,28b124f6713bfab462f153b6fbfb81efddca9c1d5b20e38def590f40f0cecde0,2025-07-07T15:15:31.557000
-CVE-2025-6806,0,0,1a4b03057d67a8e497caf8f5a2c2dc2bf2f55cdcbebefc2cf28efe32290d1fee,2025-07-07T15:15:31.700000
-CVE-2025-6807,0,0,913f01f7c5751de3e757f05af4a8ddf5a3970a7f55a8781f61693c3f9e259419,2025-07-07T15:15:31.860000
-CVE-2025-6810,0,0,47fc82f705b090e00c1bc6cf05acad8ed1aba3ea0cc9b20c7eb5b735050663ee,2025-07-07T15:15:32.020000
-CVE-2025-6811,0,0,35201a18fdf838fa47c1f498c77b06a506a679dd0db8f84e13e3b8c6cce3c48f,2025-07-07T15:15:32.173000
-CVE-2025-6814,0,0,cd522439232a66a54b2722ca889d57b343679ee6e9e888c8cab7fb06e5434dac,2025-07-04T03:15:23.580000
+CVE-2025-6782,0,1,0bc820b6fd030a8121703dd8764c0383a0610ecffb8379d766d0fa62a977af46,2025-07-08T16:18:53.607000
+CVE-2025-6783,0,1,e5337deb4ccc5de2d6b2bcc1c34816f49a2cd707c9910a3a80a4ed92cd0642e4,2025-07-08T16:18:53.607000
+CVE-2025-6786,0,1,114110aea89359fa5073bce534fd1a6e354736f2ab9a56eca60fc46743bec14c,2025-07-08T16:18:53.607000
+CVE-2025-6787,0,1,b5c0238b6ecb45161291562df15bdbbd437e22200876fed7a498695c736aff55,2025-07-08T16:18:53.607000
+CVE-2025-6793,0,1,0ffb84917a861b890f97cf63d33cd14ebb4bd8ece0f9df704592185ea84ee250,2025-07-08T16:18:34.923000
+CVE-2025-6794,0,1,d5307e3f28191529618277cee67319046cad1ac89308941abdc2cc1e1ab5e383,2025-07-08T16:18:34.923000
+CVE-2025-6795,0,1,0cf7c862a9f6c7d4971351d6c331220ac0c95d191025785f05b3dbeb5a327c48,2025-07-08T16:18:34.923000
+CVE-2025-6796,0,1,aa937066b14ca9150990036fc2abc7353dff1b05f9e1979394ff0c7e16238934,2025-07-08T16:18:34.923000
+CVE-2025-6797,0,1,20fdfc3da14500d03c616d1f27ab82792ed108af2baa8561408ca547bbc4b7ff,2025-07-08T16:18:34.923000
+CVE-2025-6798,0,1,5d73b979b7b8fde819c0a547cdf7d473793dcd5cd5a98d55aba44004d65a02f5,2025-07-08T16:18:34.923000
+CVE-2025-6799,0,1,d8ba6712b19d92ee1d675658debbdd882746760d3b1346c7c74dbe88ab9db7fc,2025-07-08T16:18:34.923000
+CVE-2025-6800,0,1,ebe7a6cad632e0591e2cd68c4c1757cf01648ffa0a8d0b05ae8e20ed8b2c6020,2025-07-08T16:18:34.923000
+CVE-2025-6801,0,1,8aca20cf069b1ef32a90649b919311d8535aa110e3b89faa819bd2105a568e90,2025-07-08T16:18:34.923000
+CVE-2025-6802,0,1,33c1c2683ac5dc7df4518940e0e23197a0e1d72d3b8aa2c624927a7a14e0278b,2025-07-08T16:18:34.923000
+CVE-2025-6803,0,1,5416f9197cfdba4099efc8504c36844a87bec0b1bc0ea6554e50f094cf2bd5dd,2025-07-08T16:18:34.923000
+CVE-2025-6804,0,1,a140eb249f0052058dccc68f8661dc1b09637355c31e979ed86e4e770c907229,2025-07-08T16:18:34.923000
+CVE-2025-6805,0,1,4ae2f4356413ebafc3e9de4622438fd163aea98c78796be3933bad1f95198c6c,2025-07-08T16:18:34.923000
+CVE-2025-6806,0,1,d8a0c7c87e317b12bd62d4abe90b07570ffdfea7ed2f5ef214ce89b1db45ca28,2025-07-08T16:18:34.923000
+CVE-2025-6807,0,1,fd0f9927e51b28e16b7b080dc5bdf57155404e433887108ee2618a7d8e10a92b,2025-07-08T16:18:34.923000
+CVE-2025-6810,0,1,7541e243c8f545502ddfffc870741d00b197f6e491eadc300d6d62c484e7dcd5,2025-07-08T16:18:34.923000
+CVE-2025-6811,0,1,a42c2fbc043636f06103ac7bff1f5b0aab3ac8ad03f5da273da43ea5a5cb48a8,2025-07-08T16:18:34.923000
+CVE-2025-6814,0,1,8694c31619e25765fa369f4f4b0f69dc0a7558712f4abb8dd46b47d7d99a7261,2025-07-08T16:18:53.607000
CVE-2025-6816,0,0,5e9e5e2b35582b9f79370f11aa6db1969ced2cc7c6592e7f435aaffb84197923,2025-07-01T17:32:51.163000
CVE-2025-6817,0,0,f566ef24b61618394adfc182824a9952f225ff540b64bfe9d61b2edac708b720,2025-07-01T17:30:53.610000
-CVE-2025-6818,0,1,aae751ae756f9029bdcc84cd8d6800afca0af17fa672e7a1395915f1c42df56f,2025-07-08T14:45:44.340000
+CVE-2025-6818,0,0,aae751ae756f9029bdcc84cd8d6800afca0af17fa672e7a1395915f1c42df56f,2025-07-08T14:45:44.340000
CVE-2025-6819,0,0,e5cff8a314ef7355184a3e68a17ad7bfe78a5b2c67c9ea0e11e66ed016a44e29,2025-07-01T18:57:42.687000
CVE-2025-6820,0,0,2f942b65bd928b1d31ceaa9dd4deaa385aaafedbc8c0029ea5904af7c948bcb3,2025-07-01T18:49:29.030000
CVE-2025-6821,0,0,97d56bef9103ca728fd7d3ab9fd16c8f4b90ae6bc71dff92b7ea552be5c206c8,2025-07-01T18:42:57.140000
CVE-2025-6822,0,0,3b89a9e447bff353ca3d98f9e95ddcc2db5e98c1f28bc7080796fd81aca8fcd5,2025-07-01T14:10:47.767000
CVE-2025-6823,0,0,fe849fde5a2fa9a1520f4df8c7b7c7e73d2be3a28f56793b69f77c66ff33ba01,2025-07-01T13:58:38.780000
CVE-2025-6824,0,0,996d4667715d3db5326a58fc60b209742994cbc814600cca4969efc54193b8e4,2025-07-01T00:33:14.560000
-CVE-2025-6825,0,1,ad45361a92987a1002447ae4799597b1b1b17b5834867c2f6b1ed2d624adef61,2025-07-08T14:44:21.627000
+CVE-2025-6825,0,0,ad45361a92987a1002447ae4799597b1b1b17b5834867c2f6b1ed2d624adef61,2025-07-08T14:44:21.627000
CVE-2025-6826,0,0,bf7085f24d3c888ae85ee6f68469710f261fc8414b23064565399f7c71c0507c,2025-06-30T18:38:23.493000
CVE-2025-6827,0,0,d1722ba5b9b20a1749d5e77557ab341b473b7d74409fbaa60f4b659081c523d2,2025-07-01T18:41:53.040000
CVE-2025-6828,0,0,7070a0d246872926f5045c91c2547535f9621733cd74253ac0264bf8b6082f52,2025-07-01T18:37:44.973000
-CVE-2025-6829,0,1,98ab67475a052acfee18609a8f79353645c0a6528d173d8e7c19bc3c86df649a,2025-07-08T14:41:05.270000
+CVE-2025-6829,0,0,98ab67475a052acfee18609a8f79353645c0a6528d173d8e7c19bc3c86df649a,2025-07-08T14:41:05.270000
CVE-2025-6834,0,0,9a833b1cad31fc127aa706eb342d5feacfdc4ed45b0e47a6294dc76e584822ed,2025-07-01T18:27:48.017000
CVE-2025-6835,0,0,d2814afb3c5f2a9f692c1be02993ef271ee26c4b23084076d71148ee31ef36f1,2025-07-01T13:51:34.580000
CVE-2025-6836,0,0,27201307512d35dda5e6fa03fbb5db44b6eb59c1a73763a821ea34ec4c969011,2025-07-01T15:33:33.943000
@@ -300689,14 +300837,14 @@ CVE-2025-6846,0,0,f4874fb208c744d9b428a787f074a0d93b49be1928de201bf112a7e7ec17f2
CVE-2025-6847,0,0,71bd4bfe20f3730a9db23adf419d7dd9c794d21526228ac19cab2f9b6dfadcd6,2025-07-01T00:46:11.677000
CVE-2025-6848,0,0,1054a56136bb3c54d51849d7f8924098a0929429f93228a13dda6d471896c54b,2025-07-01T13:44:44.923000
CVE-2025-6849,0,0,405a011fd62aa5c46497421f5038d0b3b399b8459af87b506050a60e902bb18f,2025-07-01T18:25:17.570000
-CVE-2025-6850,0,1,541a9e2f8c965ed276fe534faae5f10168a2a7130693b430f1606a8d47945c56,2025-07-08T14:40:08.473000
+CVE-2025-6850,0,0,541a9e2f8c965ed276fe534faae5f10168a2a7130693b430f1606a8d47945c56,2025-07-08T14:40:08.473000
CVE-2025-6853,0,0,fee32ce4d19c82eed8b80d6ee4531046c88837d2caf5527964506be1b55db239,2025-06-30T18:38:23.493000
CVE-2025-6854,0,0,a5d1cdc0e3b9d604bc4433cc2319ea6cdbf0bcab031b21d6ee253649f78be7ba,2025-06-30T18:38:23.493000
CVE-2025-6855,0,0,fa39b6ec837adf41e469ee51c161df22f82dd20c62109d4929066a17597ac5f1,2025-06-30T18:38:23.493000
-CVE-2025-6856,0,1,ee853320d2f15e74eaf4d33304a2589b0bd0e84f36ac4c5985770ad9cffb9ac7,2025-07-08T14:39:33.110000
-CVE-2025-6857,0,1,9584226ac029b4610f2adf75bb5dfb0cade70646f9de7e12e7d11506cbb4fcb3,2025-07-08T14:39:20.493000
-CVE-2025-6858,0,1,70099656df143b78cbd734cbbc351df2456d0ecf486e6e905db0059beb22a609,2025-07-08T14:38:35.413000
-CVE-2025-6859,0,1,8937fdef20bfd230a48ae9a01a2e5b5e68ed8d069db0412eb599f007733c51cd,2025-07-08T14:38:13.577000
+CVE-2025-6856,0,0,ee853320d2f15e74eaf4d33304a2589b0bd0e84f36ac4c5985770ad9cffb9ac7,2025-07-08T14:39:33.110000
+CVE-2025-6857,0,0,9584226ac029b4610f2adf75bb5dfb0cade70646f9de7e12e7d11506cbb4fcb3,2025-07-08T14:39:20.493000
+CVE-2025-6858,0,0,70099656df143b78cbd734cbbc351df2456d0ecf486e6e905db0059beb22a609,2025-07-08T14:38:35.413000
+CVE-2025-6859,0,0,8937fdef20bfd230a48ae9a01a2e5b5e68ed8d069db0412eb599f007733c51cd,2025-07-08T14:38:13.577000
CVE-2025-6860,0,0,d25d599b6927c4e75a9d8f1259896fcf6e45a3173f1f080bc329a01df096d256,2025-07-01T13:30:43.580000
CVE-2025-6861,0,0,be9a41517fa26865cca6f963a22166f83e0adbf38b21fe27341f0eeda72afe42,2025-07-01T13:13:44.863000
CVE-2025-6862,0,0,25bfe83db91c2b02ef22d3dc830498fdcecc67838b4e4a43fc7f40dac5c7c874,2025-07-01T13:07:05.527000
@@ -300704,8 +300852,8 @@ CVE-2025-6863,0,0,d317db2625f5a7c22ff476ce877a878d954ce34eb4a29b168bfae9c23792d2
CVE-2025-6864,0,0,0d105a5f54b9f2d5731d37ed368c0b419fb99fd3c533d938f0bd25019c75ac48,2025-07-01T12:27:47.473000
CVE-2025-6865,0,0,3661be516a9e5e23dcd11227295dae05a51dadb3b4dfd3d05e4e48f18b21c923,2025-07-01T12:16:01.777000
CVE-2025-6866,0,0,f850614134e413eef544ae790b5507f7a4bb4f3e37bcebeee7db49f2cc8caa62,2025-07-01T12:14:15.277000
-CVE-2025-6867,0,1,797b38742e0fc520138f51ad1844034c0d48fc54725c8fa00d928041c3c92109,2025-07-08T14:38:01.107000
-CVE-2025-6868,0,1,17290be7b72aa7d2885fdcb973d1501e74c815ea60ed28515c77c383732515d3,2025-07-08T14:37:18.003000
+CVE-2025-6867,0,0,797b38742e0fc520138f51ad1844034c0d48fc54725c8fa00d928041c3c92109,2025-07-08T14:38:01.107000
+CVE-2025-6868,0,0,17290be7b72aa7d2885fdcb973d1501e74c815ea60ed28515c77c383732515d3,2025-07-08T14:37:18.003000
CVE-2025-6869,0,0,7e12e555dd28a68013ea5484b8b922e4ec2710a034a6b827652ee41f6a3e94a0,2025-06-30T18:38:23.493000
CVE-2025-6870,0,0,33b4ee3bc6c38a76acd1cde73247b685579503cd97259ec7089c0d68dd6fdfce,2025-07-01T18:22:04.620000
CVE-2025-6871,0,0,f4648c2a15a35b77fb72a8d99236478d2f0c7650ac12a9c4b4cabf98124da666,2025-07-01T18:46:42.920000
@@ -300718,42 +300866,42 @@ CVE-2025-6877,0,0,c1fedf29ade370d3015734dfa24b6c325a708521827436ddb9e65f6944c5a5
CVE-2025-6878,0,0,1b56d14fd6a438f26341bdbf095f0b126d640a6d0d85ce0c32cfe4a7140a1691,2025-07-01T19:10:21.643000
CVE-2025-6879,0,0,19c3ca75ac2e2d31998693552a9d248c2f26675d6417f0e2050da967b73d46f3,2025-07-01T19:10:55.130000
CVE-2025-6880,0,0,c4c89ba9b550f55acc7b692ea426f33fcb626a228408ac2fe60832aca3497d15,2025-07-01T19:11:30.937000
-CVE-2025-6881,0,1,032f4e239c6c28f3d2813361c1662ee4c3ba3d42dc41f80d6936f782caee44f1,2025-07-08T14:18:32.693000
+CVE-2025-6881,0,0,032f4e239c6c28f3d2813361c1662ee4c3ba3d42dc41f80d6936f782caee44f1,2025-07-08T14:18:32.693000
CVE-2025-6882,0,0,960d27c451bb47d1067731acafb5ecfbc602f0a653e0cacfa34da3aaea5e6fdf,2025-06-30T18:38:23.493000
-CVE-2025-6883,0,1,c9ca4d3ea1ee62e4aff04e38d610cf4365ea276564e8e3e5b52ce5c0bc932fcc,2025-07-08T14:18:19.600000
-CVE-2025-6884,0,1,aa0968053e95fa51ae9935fb93aa3035bfa27426531bc7a3f6272560446c0ddc,2025-07-08T14:18:11.347000
-CVE-2025-6885,0,1,d73e9361c9a612ba2603d0c62a825d02943ac5f22eb6416fb90dbf4824b1dedf,2025-07-08T14:17:03.797000
+CVE-2025-6883,0,0,c9ca4d3ea1ee62e4aff04e38d610cf4365ea276564e8e3e5b52ce5c0bc932fcc,2025-07-08T14:18:19.600000
+CVE-2025-6884,0,0,aa0968053e95fa51ae9935fb93aa3035bfa27426531bc7a3f6272560446c0ddc,2025-07-08T14:18:11.347000
+CVE-2025-6885,0,0,d73e9361c9a612ba2603d0c62a825d02943ac5f22eb6416fb90dbf4824b1dedf,2025-07-08T14:17:03.797000
CVE-2025-6886,0,0,089dd5bb8c84b68c62e3a8ce9ba92ca23b9088b9e037ae1f4bcf87c8aaa6cbce,2025-07-01T16:47:02.973000
CVE-2025-6887,0,0,0656b6ee9ba104d94809bd9eefd3587b07c6ca9425e274546d0622a0b326c138,2025-07-01T16:42:48.927000
-CVE-2025-6888,0,1,ebfff5b8fb8652185e1a819ba00600ebf8891d0ff627d6b2e12dff194c23ff46,2025-07-08T14:16:55.400000
-CVE-2025-6889,0,1,6f569d9f9b1c5da57ac7cadf9ed632a19ae0b252198393b4f8efd46f692773c8,2025-07-08T14:16:47.070000
-CVE-2025-6890,0,1,8db20c6175b487641d18393ba08486d4fad6dbf65fb288661551be659d28e5b3,2025-07-08T14:16:41.300000
-CVE-2025-6891,0,1,914d543b74f2d684ac513ed38c45f9a88b79b6b0ad004b5c5ad19078930c44cd,2025-07-08T14:16:33.023000
+CVE-2025-6888,0,0,ebfff5b8fb8652185e1a819ba00600ebf8891d0ff627d6b2e12dff194c23ff46,2025-07-08T14:16:55.400000
+CVE-2025-6889,0,0,6f569d9f9b1c5da57ac7cadf9ed632a19ae0b252198393b4f8efd46f692773c8,2025-07-08T14:16:47.070000
+CVE-2025-6890,0,0,8db20c6175b487641d18393ba08486d4fad6dbf65fb288661551be659d28e5b3,2025-07-08T14:16:41.300000
+CVE-2025-6891,0,0,914d543b74f2d684ac513ed38c45f9a88b79b6b0ad004b5c5ad19078930c44cd,2025-07-08T14:16:33.023000
CVE-2025-6896,0,0,38a3190effa91bc2dc5df45b8885ad001670af74ec912f7cb1360526c6d5a5c9,2025-06-30T18:38:23.493000
CVE-2025-6897,0,0,7ab88296081d7d3537ebf81c172e2dff8cbb4d2a71b20706f9aa971b3838f452,2025-07-01T16:30:28.957000
CVE-2025-6898,0,0,172dcfb1ca62d9642e75e922b0ed4db64b9f7d2406ead6903ce8dfd0c72f3213,2025-06-30T18:38:23.493000
CVE-2025-6899,0,0,b2b10c6bb4d11f4a2a10b6e1400671323c432b2955d5fcb07d9cbe51b7a825a1,2025-06-30T18:38:23.493000
CVE-2025-6900,0,0,6fc0a5d866230db10e33019b807b1bbe9fd654af8d637ec9422b0e6110d7a0cb,2025-07-01T16:21:48.767000
-CVE-2025-6901,0,1,24cc630e9f6d5773dd992bbca0b317771fe58312671ec8507b7d5df103575542,2025-07-08T14:16:24.390000
-CVE-2025-6902,0,1,46232341ae3e8c3ba6dc74aa01204b9258f31cbda9f22a866b27f67ab61dad33,2025-07-08T14:16:12.293000
+CVE-2025-6901,0,0,24cc630e9f6d5773dd992bbca0b317771fe58312671ec8507b7d5df103575542,2025-07-08T14:16:24.390000
+CVE-2025-6902,0,0,46232341ae3e8c3ba6dc74aa01204b9258f31cbda9f22a866b27f67ab61dad33,2025-07-08T14:16:12.293000
CVE-2025-6903,0,0,2abd9f63d67a47fd1a2ff263f63770d2a134ab5031a84f24b497d61714b92fc0,2025-06-30T18:38:23.493000
CVE-2025-6904,0,0,99be3ba5a327d7756da1a188129507756810408c94c1dc84bd89b60f648fa7aa,2025-06-30T18:38:23.493000
CVE-2025-6905,0,0,a752c657154b03adbb57a57ec1fb2a0b4c534fdc659c293d030313d836528c83,2025-06-30T18:38:23.493000
CVE-2025-6906,0,0,6462dd992cbc421e7df58568c6bb51c77936c418bccd7d7be5e8f9706fc22f9c,2025-07-01T16:15:18.367000
CVE-2025-6907,0,0,d6330a0e0f52762f09d8d31f0719cf562c6225f7def8b0f8bcf776bc6b14c7f4,2025-07-01T16:11:15.027000
-CVE-2025-6908,0,1,f88f723cba23bd520ecea74db5944a7bd2df4cd2986600182bc5f1a7f88a11c2,2025-07-08T14:15:57.870000
-CVE-2025-6909,0,1,a09daa398df904bf0006a6270f820a1156659b307a42bda04c38f784c3ec5dd0,2025-07-08T14:15:29.440000
-CVE-2025-6910,0,1,5ab4a284944718de28766e6b7a9af268500f0f6bac88aa41e9c3d75dabdf4524,2025-07-08T14:15:16.237000
-CVE-2025-6911,0,1,3b1bce276e63256013e833ae136522099b3252ae090c91f446ddc1b55d0bb882,2025-07-08T14:15:05.867000
-CVE-2025-6912,0,1,ab43aa3473d171bc9fc9a041bf797ea48fcf3017e4423440a85142848581e0f5,2025-07-08T14:14:24.530000
-CVE-2025-6913,0,1,61269f961b9e93c4a970a087acaae525fcc37862a063c6d4f488bac308e2bf66,2025-07-08T14:14:13.950000
-CVE-2025-6914,0,1,98acf4e34b1f1ec230bbcde7e3f6ed58c272f93106e4956762746429e8c9656f,2025-07-08T14:13:59.330000
-CVE-2025-6915,0,1,a4c41fe4ef72f1169294ccef645962163e2e6d9c74ea1c7ef890b3e5258530cb,2025-07-08T14:52:37.427000
+CVE-2025-6908,0,0,f88f723cba23bd520ecea74db5944a7bd2df4cd2986600182bc5f1a7f88a11c2,2025-07-08T14:15:57.870000
+CVE-2025-6909,0,0,a09daa398df904bf0006a6270f820a1156659b307a42bda04c38f784c3ec5dd0,2025-07-08T14:15:29.440000
+CVE-2025-6910,0,0,5ab4a284944718de28766e6b7a9af268500f0f6bac88aa41e9c3d75dabdf4524,2025-07-08T14:15:16.237000
+CVE-2025-6911,0,0,3b1bce276e63256013e833ae136522099b3252ae090c91f446ddc1b55d0bb882,2025-07-08T14:15:05.867000
+CVE-2025-6912,0,0,ab43aa3473d171bc9fc9a041bf797ea48fcf3017e4423440a85142848581e0f5,2025-07-08T14:14:24.530000
+CVE-2025-6913,0,0,61269f961b9e93c4a970a087acaae525fcc37862a063c6d4f488bac308e2bf66,2025-07-08T14:14:13.950000
+CVE-2025-6914,0,0,98acf4e34b1f1ec230bbcde7e3f6ed58c272f93106e4956762746429e8c9656f,2025-07-08T14:13:59.330000
+CVE-2025-6915,0,0,a4c41fe4ef72f1169294ccef645962163e2e6d9c74ea1c7ef890b3e5258530cb,2025-07-08T14:52:37.427000
CVE-2025-6916,0,0,3ddb4b54a83fdfd89a9563fa673fced3928b7b90fa03b6e7407b43c77ee4d641,2025-07-07T14:41:39.973000
CVE-2025-6917,0,0,6cd11cceca206c91d8d3b66086170825c6b2ae3c019cef6e0718141d30597e9d,2025-07-07T14:42:17.613000
CVE-2025-6920,0,0,92f153f201754cb01ae808c528460cedb35114cf4759cf0d03fac580d4198aee,2025-07-03T15:14:12.767000
CVE-2025-6925,0,0,23d66804026324f5cffe9dd2a037d5ec45183557a83e7c9567bd54f711f98138,2025-06-30T19:15:25.920000
-CVE-2025-6926,0,0,6427da64a31c87959f0b90bc48cde9f58757abf9013765e48ad819f0d7ae3ead,2025-07-03T18:15:22.797000
+CVE-2025-6926,0,1,fc04d48bf969b5ea54e8d491c1b549b8729d5bc61cc339119f0553198846710b,2025-07-08T16:19:11.700000
CVE-2025-6929,0,0,6413e6647749a4fe7bbfeb37e8c5d8bce2c4b4f4fdb0294336fcc95835f5b57c,2025-07-07T14:46:35.950000
CVE-2025-6930,0,0,f5447838e9850f22f0ccaef5294e35a277657cb1a698f9d1d1f8ecc25ba5e027,2025-07-07T14:46:23.903000
CVE-2025-6931,0,0,ea2ff5a0469a3df9ef65d87bf71684c0690aa2650e532d6b10eadd6580773a20,2025-07-03T15:14:12.767000
@@ -300767,7 +300915,7 @@ CVE-2025-6939,0,0,5308ec5e92166f2b8bfe7a8110beec54738af3cfc7b7ea0b88931ed3b123cd
CVE-2025-6940,0,0,bf5da5562f44dccd1466a99a2ea2d2d393b8a0540d67fb05df1f694fbf081644,2025-07-07T14:41:12.100000
CVE-2025-6942,0,0,ce17090e9af93141dbee0b9e4a07d73c52cfd336a45382f6ec1d10b523f6b0dd,2025-07-03T15:13:53.147000
CVE-2025-6943,0,0,5dcd978aca60bde8e7659603a9d3b22fafdd87d6a11934f15fec14a78f7c69d4,2025-07-03T15:13:53.147000
-CVE-2025-6944,0,0,6d1c97c87df69857e609151c35ff1ba4da9f47c731949eb75447b8af0543adb0,2025-07-04T06:15:25.203000
+CVE-2025-6944,0,1,cd76b115fd7f359ccb790195d23f72b54c96a11e15da86773a169e7312518130,2025-07-08T16:18:53.607000
CVE-2025-6951,0,0,5a3caa7d073f89ca081c6926241b422cc722827fe163f031d9790b1237798b83,2025-07-03T15:14:12.767000
CVE-2025-6952,0,0,709bf298cd3a7382a18a3723dc3d183c8c753d6d79ec97c33ee461f9719c03c2,2025-07-03T15:14:12.767000
CVE-2025-6953,0,0,fdacae0d630bb6af09d824ad6fd187b2ac6c84ff40724304fdc55ee79e6e1077,2025-07-07T14:38:29.763000
@@ -300781,129 +300929,133 @@ CVE-2025-6960,0,0,f267b66c02cdac1c8ce85dbc8f2a5c2f1982bd1f7a6624958926337b8bcbf7
CVE-2025-6961,0,0,86911d453c9a6a116c781e665e12bb055c6c1dd460457b2abad560088ff88b0f,2025-07-07T14:40:04.140000
CVE-2025-6962,0,0,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0edf,2025-07-07T14:40:21.120000
CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000
-CVE-2025-6995,1,1,4033d3e87d54f7760105a304a4269cc1e25e78bf55300635e1a250deb53d0a25,2025-07-08T15:15:33.707000
-CVE-2025-6996,1,1,8093cd13ba16f3524ec2f483f34a46a43b7428c177a3fcb4817b443377b299e3,2025-07-08T15:15:33.860000
-CVE-2025-7037,1,1,9cc930a6456e3a634840c908cba0ac7fc6bd4aae723f0ae16bb232c1c5a96be6,2025-07-08T15:15:34.010000
-CVE-2025-7046,0,0,94d36e6f9d9ceb20ef9426662a51fc4bc68475dc7a5b51164a5349a20b58da44,2025-07-04T03:15:23.743000
-CVE-2025-7053,0,1,8a8546e2c315fd0f09b1144ecbb0e3a3936deab585cdd05c2406934dd15aa737,2025-07-08T14:15:29.430000
-CVE-2025-7056,0,0,887354ad4bf4ab3237edc71bf6f5ae1221a09a81ffa56c8607b24e19987ce81f,2025-07-07T15:15:32.377000
-CVE-2025-7057,0,0,1c39a5b40640ade5918b38a1489466712b4b14c70c0f0ecb6624256ffa115464,2025-07-07T20:15:28.577000
-CVE-2025-7060,0,0,ea887b65cf046ad6772dd0cd0e58df14fcbe6e15ef8a40aee1cd3998fc17ef43,2025-07-07T17:15:31.427000
-CVE-2025-7061,0,0,f6d414ab167114a6d5515c0d0e72116f8b1a04d4e9e4ff05f8b50036c19d1294,2025-07-07T17:15:31.597000
-CVE-2025-7066,0,0,998f6b55a42342a8b0f4fda5076c6090356f0a52d1edd36c9bb39b315048f315,2025-07-04T12:15:35.740000
-CVE-2025-7067,0,1,a254cb41e92c85ee9751f06f593a0b8e986f163f8f2cba4072c19474c9f717d2,2025-07-08T14:15:29.597000
-CVE-2025-7068,0,1,9f198e62894aa98a5fb2c897df31dc1527ff56e3380deed32ef359ebcf14c6b0,2025-07-08T14:15:30.160000
-CVE-2025-7069,0,1,78e48551b2054c7baa3538c6d81fe61f5300a6e74290db634bc2e2497d1ba237,2025-07-08T14:15:30.420000
-CVE-2025-7070,0,1,d7b86623b8befac4ab5682b9922bd21415736aa8f105b588ca436e89f50e93d2,2025-07-08T14:15:30.593000
-CVE-2025-7074,0,0,2abfa6cbeb777bc51a43a1e220aee157241724a8d412c29b35af64d6af93ca58,2025-07-07T16:15:26.250000
-CVE-2025-7075,0,0,604dd4e6f1baafdd3532513d4d9a99f67848a2afc7a88556af0414101b5a60a0,2025-07-07T16:15:26.400000
-CVE-2025-7076,0,0,7d6d1108769b5364b947887b42cb483910d4aa93671881a610516f73fcccca1c,2025-07-07T16:15:26.560000
-CVE-2025-7077,0,0,f961cd5003da2c260ecba733871126530a276b9857f886deea93067aa9242657,2025-07-07T17:15:31.753000
-CVE-2025-7078,0,0,9432491095f4972e78c6f717ea9a22662d7eebc88226413425cc49f2538e83dd,2025-07-07T17:15:31.903000
-CVE-2025-7079,0,0,811a0dc618f8c4d6ff47615a566beb64b868137f4711024af45b27b51dbe22f6,2025-07-07T17:15:32.050000
-CVE-2025-7080,0,0,637383681feddc007064d5c773e2ecdc2763a7e8819b7c75e7a8e6950cd8d0f2,2025-07-06T14:15:28.203000
-CVE-2025-7081,0,0,6c8bd52e845482f1b88dc0cbdb6f78246c5bad3e6784ea061f1794a3c5302ff0,2025-07-06T14:15:28.413000
-CVE-2025-7082,0,0,cca3e65ca63007e25bfeff7e6b685a6960407f03f55a50eb28c8d1eb6affdb8f,2025-07-06T14:15:28.607000
-CVE-2025-7083,0,0,b0ff6aaac6129f8bae07cd12ba1aeaa7ac339e4cceec107ea989339c3ff7b485,2025-07-07T16:15:26.727000
-CVE-2025-7084,0,0,ba08b8701d5627b65b81b1344d3cc178ec32c00bf41d7a8601c61b15a75468b4,2025-07-07T16:15:26.873000
-CVE-2025-7085,0,0,e8f030e83fb961a1abc6b01bc320b8690660f88c6e399bba5b3285df5a9197fb,2025-07-07T16:15:27.007000
-CVE-2025-7086,0,0,1f8b8e3721da07379f5a9594643da4c95c3ec4fee906e01834bd004fb513ebeb,2025-07-06T17:15:24.003000
-CVE-2025-7087,0,0,cef5ca4ba21a674fe8abae493974a59acfd3925ff07f03b7867cfa6dedd9db88,2025-07-07T16:15:27.140000
-CVE-2025-7088,0,0,cc28973767f16eb1d600530829b13c17d7dbb342aa6a2e56b27a4ca8b317f068,2025-07-07T16:15:27.267000
-CVE-2025-7089,0,0,26357a5fb79269f8506fd23797742bde07f0e742215a7238f39599d51916af98,2025-07-07T16:15:27.437000
-CVE-2025-7090,0,0,1e7fd911ea2e48a66d10013fed56fdf1940532f31273f79cf623746ddaff6e92,2025-07-07T16:15:27.590000
-CVE-2025-7091,0,0,f9b274bf7efd9299c1b005af1d60f813520defc71a7f271f18916f1c8d38f67f,2025-07-07T16:15:27.727000
-CVE-2025-7092,0,0,96c90a9ec7691d399e8c2c2b67ac61a6831904627b105c0124393edb6ec0b04d,2025-07-07T16:15:27.860000
-CVE-2025-7093,0,0,081cd9cea904d3af0894490d15c86408af4c22fcf698ffebb8b38488e5b5e83a,2025-07-07T16:15:27.993000
-CVE-2025-7094,0,0,b7e0818848a20834db3ee0200a35a1430be729b2b7c0f9a7bb3b2a8b8f26775c,2025-07-07T16:15:28.120000
-CVE-2025-7095,0,0,6a54a361346256c2ffe965825095524fd0e12ad3dfd9159eb592960673b87b0a,2025-07-07T16:15:28.253000
-CVE-2025-7096,0,0,18fb9ef889de0edf77804f792e67aa5f8e3017a5a8c60aef96a88a0067d52d8c,2025-07-07T16:15:28.390000
-CVE-2025-7097,0,0,5dd8c0c31d2c1494dff01d9b8f04a47fc9bb216a12358307c53ad0f4615f97c6,2025-07-07T16:15:28.527000
-CVE-2025-7098,0,0,1b2217223b82ba281ef588381f81252ba4e9aa1f7a336fa2f6b00faa46aa11eb,2025-07-07T16:15:28.647000
-CVE-2025-7099,0,0,d0ba6eede706334fb4fcb3178818ea896aa6c83baf94cc79e1c127731435fb97,2025-07-07T16:15:28.783000
-CVE-2025-7100,0,0,43d3b2382ef4676345e1255cd63907f50e001f45d740885d5a6fe76c85677e12,2025-07-07T16:15:28.920000
-CVE-2025-7101,0,0,4216e2bde5edab81bdf226355c1234027553b6aa035872e45faf94ab4fffed51,2025-07-07T16:15:29.047000
-CVE-2025-7102,0,0,0e758d228258d3c66a27511adaba25c96ca7ea38a452ff94858a88c4ccb378ab,2025-07-07T16:15:29.177000
-CVE-2025-7103,0,0,85f26d901ba27d81f6f625a39cdb80ea93ade2994bd0b5d0c6aa1c498d30aa3e,2025-07-07T16:15:29.303000
-CVE-2025-7107,0,0,ab72b7e78fbf89339e98329f6d1ace7a0e151530f1a2b8fa216d292f19401aad,2025-07-07T16:15:29.440000
-CVE-2025-7108,0,0,353e8beef98a86d7bfdff1615dfedaa981808297131fa9f6ea783c47e8f130ff,2025-07-07T03:15:30.547000
-CVE-2025-7109,0,0,5a0461fe092f685ba4d419f22522908f148069f52e91c15895d5bd37eef750d8,2025-07-07T03:15:30.730000
-CVE-2025-7110,0,0,78e84cd184214c8de0a1ada602f4b00187384264313ccdbcb09a6e1337e3d331,2025-07-07T04:15:31.707000
-CVE-2025-7111,0,0,0bb458236d4f2833e2afc9ee2a0409849ac32b5fc5d42632aa727ab512e0958a,2025-07-07T05:15:42.367000
-CVE-2025-7112,0,0,c72213c346cc2670b45f717f2184ee8ba3c7c3d3c0c85dd55deb4c8343ae0400,2025-07-07T05:15:42.607000
-CVE-2025-7113,0,0,378c791a391810b24ec13a0a39c0ddad93df0fc0fc96459e7c5a0fbfb93a18f9,2025-07-07T05:15:42.853000
-CVE-2025-7114,0,0,9d06a1babc2fc64b84b5f67f39ccb61a42d8da4c9464746f9e7739bb6c3e23c3,2025-07-07T06:15:30.230000
-CVE-2025-7115,0,0,a27187f501d5b24d8e7d6eaf0ef282b8ac25689fb83bfe16b7f5d432aff3cba9,2025-07-07T06:15:30.590000
-CVE-2025-7116,0,0,cc5179054b7f8edc49775a1e5decef8897db32cec0c77104e2cab64c15ab718a,2025-07-07T07:15:24.313000
-CVE-2025-7117,0,0,455a2b4b9fc464fde36d6a44b78e44e87fde0a0848f99ff1630ba6a0b0dffb2a,2025-07-07T07:15:24.563000
-CVE-2025-7118,0,0,e4d79629f51a9edcc0bbe4a8c178b2de8e9b8588aa684f600d751924fbf7390d,2025-07-07T08:15:25.603000
-CVE-2025-7119,0,0,b16a4f864769be4b66582abb99e7b71db1e4a258dd69d5f0d6b278c8aea660d3,2025-07-07T08:15:25.787000
-CVE-2025-7120,0,0,f25a21d5a89a8851fe91016c0f04a2e392d5690316ddffea1337e8c150af23e2,2025-07-07T09:15:27.097000
-CVE-2025-7121,0,0,f98592b90bae8673a1acf1562a82f201f4107122965f0fa7be2fd44e609ee989,2025-07-07T09:15:27.290000
-CVE-2025-7122,0,0,adf256896ed5cbb8629aa9cde7fbd52d5f1bfa96f6bba07e9740464a39062f0c,2025-07-07T10:15:29.333000
-CVE-2025-7123,0,0,d658a23f3c64568d145a25898383fe8c81303a99ce38c2feb3ec256ae1454ce8,2025-07-07T10:15:29.580000
-CVE-2025-7124,0,0,522137e44a576022dd9df4ff44053e0ecc7e9aaf32ee911cb3298096b5ac7633,2025-07-07T11:15:51.483000
-CVE-2025-7125,0,0,59f93cf32a698e88cf044a3660694b286567d551d42af1e40f12df4e30bf0d62,2025-07-07T14:15:25.823000
-CVE-2025-7126,0,0,9726a8f94a9ad7a97e828a70599c64184ea3eee62b56521708a62559045fdaa3,2025-07-07T14:15:25.993000
-CVE-2025-7127,0,0,f6ff5bbf0ecaee432bb4da0dacc7537a0ba5630485a64999552e7e9360f181f7,2025-07-07T14:15:26.130000
-CVE-2025-7128,0,0,6874dcc162b213e4bfdbd4c99c0199c19b5bbcb7227926a078e1d6d257fe5189,2025-07-07T14:15:26.267000
-CVE-2025-7129,0,0,1ce081672d0ef0b0a36b71fe144638ccdb4a7560f34cdca6bd46c5edcd55c510,2025-07-07T13:15:29.627000
-CVE-2025-7130,0,0,a5f4c7f7f4ee94ae9b7e7be25febb0dc41851a88e92ec3e358a28f9463b9a26f,2025-07-07T14:15:26.497000
-CVE-2025-7131,0,0,aceed0620d47efbff01af24a13ffd8b2c55ea72678559fcbfa38c60669f71087,2025-07-07T14:15:26.707000
-CVE-2025-7132,0,0,dda6d41e0bd6fa85e316f1708480909a7fdb596dbee40ca861eadc372c400abf,2025-07-07T15:15:32.937000
-CVE-2025-7133,0,0,56734892909aeb9bce01be40fe5007a986cf1855b2bb1a92aea182b285c6104b,2025-07-07T15:15:33.210000
-CVE-2025-7134,0,0,8ab0e8d277d7b2f480ebe0b283bf88cc88a100a22503b8061bab0975ccce739b,2025-07-07T16:15:29.800000
-CVE-2025-7135,0,1,ef6269c7226ea6c0bdcc8ff654659b0710f6f86ac30d1977db05e0f240e92b08,2025-07-08T14:15:30.760000
-CVE-2025-7136,0,0,949f44de95cc97e0635501d7a8d21b7af347f5fa18a5fab09e5ed082b5befdbe,2025-07-07T17:15:32.693000
-CVE-2025-7137,0,0,8cbf392339092f6caa3591a162fda6d83a6c6778a2bbde630a3700637af316bf,2025-07-07T17:15:32.903000
-CVE-2025-7138,0,0,9420882905d97614268ae952e32a124b0af644edb03370d1f9c7346bde634fb7,2025-07-07T18:15:29.603000
-CVE-2025-7139,0,0,2fc948e2723cf9b9aa3c9a4a38497d569235d7fe5a7204a7c480d988a230ca83,2025-07-07T19:15:24.023000
-CVE-2025-7140,0,0,c5876dc00dd82d3600423184229c8ffc8d3e37340ebd1833a913f435d05a7d40,2025-07-07T19:15:24.160000
-CVE-2025-7141,0,0,49c2ef2f15ac76ae69135cf2e365eb8438efd5762bd65b62efb47823edc28054,2025-07-07T19:15:24.353000
-CVE-2025-7142,0,0,960c733c5d78dc534f46715948164cd98d18a21f0c8d4024e18875007a782497,2025-07-07T20:15:28.787000
-CVE-2025-7143,0,0,441a473db5cda09d82dbc5979193f84fa710d47454b8ae4677353bd10912f319,2025-07-07T20:15:28.973000
-CVE-2025-7144,0,0,3a3f7e613c6b4721f9d407a0cae7ad541c6187fe8ca540eb529ba3f7de3b744e,2025-07-07T21:15:25.987000
-CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000
-CVE-2025-7146,0,0,a7c6ba2bffaec4d9e671683ddf3f31d6ff033dcb7ed7c37d75dbdb7a67497fc5,2025-07-08T02:15:22.367000
-CVE-2025-7147,0,0,36fb7d2d81135c9ac916fbf4d35323ae340d8c03e69ce3da100c81c97b562e84,2025-07-07T21:15:26.187000
-CVE-2025-7148,0,0,fdd19e0d59a74004f00a2708d969a7d930d66906c39a8978c5f58893af295960,2025-07-07T22:15:27.227000
-CVE-2025-7149,0,0,ad9d73cf832c7ebd837d39ea1fe909f87836f7cdc3f8f0ff995d4a33ff766e76,2025-07-07T22:15:27.460000
-CVE-2025-7150,0,0,b77fe5f832cdc2282a603bb6e72f3afbcd6c075b6d2bbdb84173fce9a56d61d3,2025-07-07T23:15:23.207000
-CVE-2025-7151,0,0,e82251d7fe83a1332b07026c390af5ec1aa1c1e0d2d58d9e016eca5cf7deba86,2025-07-07T23:15:23.813000
-CVE-2025-7152,0,0,b0ead946247ac6343a0ade2c5e0f7cbb077e4de4f4c5032b861f243aebf010bd,2025-07-08T00:15:22.443000
-CVE-2025-7153,0,0,da301161fc245318be20b04dc3fd4bdfe29fcc0f9c8a67e241a00dbb990ab636,2025-07-08T00:15:23.237000
-CVE-2025-7154,0,0,1a8533e879ab30d649d5fc250b936c00821e4e6c5eb1a6831ec7843a20c7863b,2025-07-08T01:15:26.200000
-CVE-2025-7155,0,0,18f65f6bc617669b8e2e10d2a7c547bbba3f724f23c4fc3a98eafbf5453296a3,2025-07-08T01:15:26.400000
-CVE-2025-7156,0,0,69691b32841b06123b32c66248b7e50cfd2b28e05c59a46703f6823598b1a316,2025-07-08T02:15:22.580000
-CVE-2025-7157,0,0,fb0ab6cdcd483ee5ab2507f21ed657ed272b448e55adaa21678064387511c835,2025-07-08T03:15:31.123000
-CVE-2025-7158,0,0,d801401be7bfca9ce7b35bab72bb2a194c85030fa8a4a8a6df2185522ff79cd7,2025-07-08T03:15:31.373000
-CVE-2025-7159,0,0,e94c92ddd35c79d1bb4bca41d4c7fa36ba523f9dbab019a68a36db8f883b8350,2025-07-08T03:15:31.590000
-CVE-2025-7160,0,0,811243df4eb29c9cf9908e03481e5417b2075050ec94b2673ed1cc734c331569,2025-07-08T04:15:49.817000
-CVE-2025-7161,0,0,467d3c8c759f8b848912be396a9ff12fd2c66364968e7eb0c84516c9ec188e91,2025-07-08T04:15:55.210000
-CVE-2025-7162,0,0,ca7f7267d6abd001dea308b614ab744e993f80cc6ca7454325881ee182c6b2af,2025-07-08T05:15:30.837000
-CVE-2025-7163,0,0,6c57a17cb92e35a024bf2e98d222b66576c61218c39440535ef7ce892fd102df,2025-07-08T05:15:31.040000
-CVE-2025-7164,0,0,8d98866f9ff941dcf1d5368040d34d26da7d068cb61dbec8e36d2c25d7a47d22,2025-07-08T06:15:23.040000
-CVE-2025-7165,0,0,81e0312c17d7e6aa177ff46a5153ebba82f6184909c7b5c996a38f7990401222,2025-07-08T06:15:24.513000
-CVE-2025-7166,0,0,aace25dc354d2484e73e9aecc6dec28a284773282ee58ca2bfecef576bf55ae7,2025-07-08T07:15:26.770000
-CVE-2025-7167,0,0,c3279b90c72edddbb3f2437b841bbecf3ec7435b7e931acecf262d7a408a3e53,2025-07-08T07:15:27.007000
-CVE-2025-7168,0,0,fb880b5317c6035c05e262a96bd2de7e7adf297b4e6d918e4be4ba830aa9111b,2025-07-08T08:15:21.993000
-CVE-2025-7169,0,0,184c902a0d97c4e02337c915d2da886f21abd036d6a49c2e82f628964ea5f387,2025-07-08T08:15:22.270000
-CVE-2025-7170,0,0,d631825d5bab89ac42aa3b35d7a966fe06c83c27748d1e2260e5125e1237edd6,2025-07-08T09:15:22.540000
-CVE-2025-7171,0,0,06a2f67a05d60ed4fd07ed9c6047f56a41f41014333d700280eee3959c419329,2025-07-08T09:15:23.017000
-CVE-2025-7172,0,0,f41fecf7b2118461549a8a9d9d0a0be0da977c67a024b1cbd4b88f73a77b994a,2025-07-08T10:15:23.140000
-CVE-2025-7173,0,0,6e0c73472c557bd1341bd35c16c4bea5f3973b49196db66ae55cebbd70d1caf8,2025-07-08T10:15:23.370000
-CVE-2025-7174,0,0,6bc9e552f0f271a604fda837ba2f94bb6d920ef116b8a8d8ae4186082e519696,2025-07-08T11:15:31.717000
-CVE-2025-7175,0,0,0efdf066dc3fd1e3eadc405c80607fa3a80dd3f56ce3f6d0f662297b052c8b8c,2025-07-08T11:15:31.920000
-CVE-2025-7176,0,0,028a49e296cc1cca3ce5a3793def030c4d3852f9887bdc2e382ca1dfadda22cf,2025-07-08T12:15:23.560000
-CVE-2025-7177,0,0,2795cde7504183e29a06098f73c38dd18411b4bb5c1f5ccf03a48faaac6cbd8f,2025-07-08T12:15:23.773000
-CVE-2025-7178,0,0,99767d32ffc8786918433b712ca18f378937261e7ded47629c2a8958da607b5e,2025-07-08T13:15:33.940000
-CVE-2025-7179,0,0,7704d4cc3a1b1c308eed2487d0a325882bce7f647059b92a4758e8fff3521c37,2025-07-08T13:15:34.487000
-CVE-2025-7180,1,1,cf1cd256aef6a13b089a3e66be48f05640465716f79d2babaa8966125bdc8c13,2025-07-08T14:15:31.970000
-CVE-2025-7181,1,1,5d0db0afdf9eb2a33e62c36698dc6071e12337f0eb6655387e8d7de2b83c1ae5,2025-07-08T14:15:32.177000
-CVE-2025-7182,1,1,896d2ccedc214109a24ad24408bfb438623cdfc1d33382f39ba10c64b14f0cf5,2025-07-08T15:15:34.230000
-CVE-2025-7183,1,1,6d86efd60f9e5a5bdede0832d0765d9bef56c7ae87b33ec9d02dafbc96daf52b,2025-07-08T15:15:34.430000
-CVE-2025-7259,0,0,92aedb6a5e38fb030175a289364c754cf67f487a6a25e9d17c23717610f38507,2025-07-07T16:15:30.440000
-CVE-2025-7326,1,1,13b9f68e18b79dbfa170c99775d6cee0c7516b40c459a4aa2824e91b8ee91b25,2025-07-08T15:15:34.623000
-CVE-2025-7327,0,0,f8b1188e4f7cc5573c9ecf71a12200117edf4fd74dc9f9fae96673aaeccbf801,2025-07-08T06:15:24.730000
-CVE-2025-7345,1,1,5eae45e0f4a2b67c01b42857989e4c6fb6e8220fdc44e95f9ef35e3b20f63945,2025-07-08T14:15:32.397000
-CVE-2025-7346,0,0,cb21a649388e1e53857cfea094e0a78c37a218b32465f4276a51b680f561d62b,2025-07-08T08:15:22.460000
+CVE-2025-6995,0,1,7b13a5a39a513866404553a42360b13c7cd18804a396552daf573ce610d37414,2025-07-08T16:18:14.207000
+CVE-2025-6996,0,1,bb768e06b01467d03128b27855e07bfbcba0271eecc64a64b2276cf474cfed86,2025-07-08T16:18:14.207000
+CVE-2025-7037,0,1,b07b90cf71f9637ef298c4a50f0e88d414ddf0e08711f7a76696405dc6fcd56c,2025-07-08T16:18:14.207000
+CVE-2025-7046,0,1,59780b11937d03ed4ccc5b0e229eb16ce78f2772f010122dcf4771e66748fb6e,2025-07-08T16:18:53.607000
+CVE-2025-7053,0,1,fd9c537260c66ae5a5eee80d5c89e14a4b3e6e9926df22af4c5ebd179b63f858,2025-07-08T16:18:53.607000
+CVE-2025-7056,0,1,78da0694704f7da67fe886cba16424f2a5ca5eede4aaa28903295f55d2597545,2025-07-08T16:18:34.923000
+CVE-2025-7057,0,1,e2f9c19e4661b85c7a5bf55f13c57738f22f2258f6bbfd2a99b1c5738711e689,2025-07-08T16:18:34.923000
+CVE-2025-7060,0,1,eb55f7799cc1661bcbee3ba191bb92d2a24a54d9b2be27633bcedcb834eaad23,2025-07-08T16:18:53.607000
+CVE-2025-7061,0,1,11041542aa586f2577ba30e0e5a7a28704f0c9fb8cfed4ef507cf205bc6209b8,2025-07-08T16:18:53.607000
+CVE-2025-7066,0,1,3aa31881446d948e2d4067c3c0225db70f642932e24cdd74e524ebf3761853fe,2025-07-08T16:18:53.607000
+CVE-2025-7067,0,1,5392f3c0eb683b77335fbab35d31ce2f6c872dce492bdd5e95a4e4285ffbeacf,2025-07-08T16:18:53.607000
+CVE-2025-7068,0,1,795e0e60ed437358a62a5a94f89e028c8e2054cf21898f9331c2677a568fdc34,2025-07-08T16:18:53.607000
+CVE-2025-7069,0,1,98f5fd85c7c796de0a2287f19ce964ecb845c057d8e8284b3f6b10dd293c9f5a,2025-07-08T16:18:53.607000
+CVE-2025-7070,0,1,0d9b84c6b3f2a36d586ff488402bed9907708758c83319b366d898a7bc506fb6,2025-07-08T16:18:53.607000
+CVE-2025-7074,0,1,9dbd464587914e63eea01ffb591ac961bd881fdfea6642ffeffc60dfda29cb9e,2025-07-08T16:18:53.607000
+CVE-2025-7075,0,1,09a66139bebc11726c49858bd4df486a9808a88c45c936cc4928b55ee6fb8110,2025-07-08T16:18:53.607000
+CVE-2025-7076,0,1,6dc2d88e77907ce0d3ea6fa3f8da79586d813cf49fea8ac1b70048859510133c,2025-07-08T16:18:53.607000
+CVE-2025-7077,0,1,e4aa7b20452a5a19ec4f5a7010c25b2764548f87c59850e7008cc50b538cdc77,2025-07-08T16:18:53.607000
+CVE-2025-7078,0,1,69cb5bdf3ef2b5afe0de5c48bba1c018899446b8ad99d3507a4b90d88f1f1c61,2025-07-08T16:18:34.923000
+CVE-2025-7079,0,1,2684af786c7f077c2ee2415cd5019b22dfc38f4f07e142067615665b0690c8c7,2025-07-08T16:18:34.923000
+CVE-2025-7080,0,1,ab12314744d209ec062f1a741781d52476430cdde61041b8d102ffd4541fdc39,2025-07-08T16:18:34.923000
+CVE-2025-7081,0,1,1893be45ecd47a288c5c239aab2ea608201a339554c7855a4bcf5ad307019d92,2025-07-08T16:18:34.923000
+CVE-2025-7082,0,1,6f69f18df6f93551bc95330df861ec31603de14b07ad90477b4d88c889fb0b16,2025-07-08T16:18:34.923000
+CVE-2025-7083,0,1,bb9779fe9e2afd8be112b61daddb6f11391045405b4629c10e89acccd6d6ec2e,2025-07-08T16:18:34.923000
+CVE-2025-7084,0,1,4871354ea158d125acbb6f0316270c6d26359b14968afba9af0180b2edcde0ff,2025-07-08T16:18:34.923000
+CVE-2025-7085,0,1,b64c1eec9e93edb08ba93181f002421439e89f7bd6d72403264db1ace88e683b,2025-07-08T16:18:34.923000
+CVE-2025-7086,0,1,2f38eb940431821bc749ae5c757df20fd28e3ecaf2f544bccb1fc1bee45cd3c2,2025-07-08T16:18:34.923000
+CVE-2025-7087,0,1,6770fc10da8a562e8449a38dbe4c12721d6115d1645f03f7bb9004767505f272,2025-07-08T16:18:34.923000
+CVE-2025-7088,0,1,e5e5aaf3a9d35e5e155468d568f2e9e92aa33ef16ee6367a7dc704d8c54e27c1,2025-07-08T16:18:34.923000
+CVE-2025-7089,0,1,bab2128be79a65fe404cc93ef8bc9cc39b5e2d06a338e07e562de597e7e13cb7,2025-07-08T16:18:34.923000
+CVE-2025-7090,0,1,13851c1d26dc9cf14c7afb5f3db870130b37ee8b43fdad02a3b3c0286665172c,2025-07-08T16:18:34.923000
+CVE-2025-7091,0,1,9b8736b944d6860eca7e6377068135a746cf38fdf3d9a041bcd8a0dfef21c0f4,2025-07-08T16:18:34.923000
+CVE-2025-7092,0,1,78f55c4094970afd9beeb63e6881b755d284ec92bbde7cabd44e20b918b77a57,2025-07-08T16:18:34.923000
+CVE-2025-7093,0,1,f773f3475ea941c7b40d6521b7f3c7fdd2d886b0ef94265415628e355374c409,2025-07-08T16:18:34.923000
+CVE-2025-7094,0,1,c2502cccb537c6d1dcdd4fea4f275e38320fa92ef82171552b94181194e57a3f,2025-07-08T16:18:34.923000
+CVE-2025-7095,0,1,1a2f48b0e7cdd49211f503fe9f9e63628cbc74b211d7543ea923cfd77256f081,2025-07-08T16:18:34.923000
+CVE-2025-7096,0,1,60babd6ae95ba08582002b5cde355483b0ec9a1b5ffefce7800b8f9214739667,2025-07-08T16:18:34.923000
+CVE-2025-7097,0,1,6e62c0aa15e2c1a4d0020e44bf708c2d5f8b247d8a9445fb0929bb79a396f529,2025-07-08T16:18:34.923000
+CVE-2025-7098,0,1,cd6b0718a6794b17f870f6c75d6915d6c92fc8211652bb3bb6d3055420983edb,2025-07-08T16:18:34.923000
+CVE-2025-7099,0,1,326451f72a5d36fa6f18e69917cfe5ac14d27c599b8802c88e3443de4c308224,2025-07-08T16:18:34.923000
+CVE-2025-7100,0,1,84a62fc108d597cc7e48dfa87cd61c32a571cb8ea5353242edd628f2c902544e,2025-07-08T16:18:34.923000
+CVE-2025-7101,0,1,d2fd96b088f95a34878566ee789daf762adba79d679532957d0a7a53a8d6b70c,2025-07-08T16:18:34.923000
+CVE-2025-7102,0,1,222c7fd56fa4ed9e553e98789855a2b79b98a0d8908b1c296401fcbbd90b96e9,2025-07-08T16:18:34.923000
+CVE-2025-7103,0,1,c4e3e0a99480cf6465955c23431b97bc7fbebe3ffd32e1bd448e663aaa06576d,2025-07-08T16:18:34.923000
+CVE-2025-7107,0,1,8d2900b7e449392e3b3440dd91000034343fd14019110cc4e6e2da4e93e5a741,2025-07-08T16:18:34.923000
+CVE-2025-7108,0,1,c4cb38b8e4f73285a4bcd915b80f55f9c8526c8b1549da9e5878136d1f30a1b0,2025-07-08T16:18:34.923000
+CVE-2025-7109,0,1,225606802d6d2b56c2fb242a3e5b9e9bada84a7069444e29895449c9ca37ad43,2025-07-08T16:18:34.923000
+CVE-2025-7110,0,1,ac5a077e022b35c74709e287f6fc60883fe2c582c19c25181f50e1df2c5d4271,2025-07-08T16:18:34.923000
+CVE-2025-7111,0,1,67be30ea32b4b0cf44fdcc94e1cc2953210dd890b35d9aeb68a435490a3756e1,2025-07-08T16:18:34.923000
+CVE-2025-7112,0,1,79255c566855353564224c9617e839884071f277b5f1e2793622f21ae311e842,2025-07-08T16:18:34.923000
+CVE-2025-7113,0,1,07830555e1619000b29c6e138b09804e4cc3b120321df72fd0a18f8c51dc003a,2025-07-08T16:18:34.923000
+CVE-2025-7114,0,1,8859ae9a8a24e8d212fd75c02ea4afe1ee46231f6c204b6d8f7b5850a0d15c3d,2025-07-08T16:18:34.923000
+CVE-2025-7115,0,1,d1360db2a7d019943dec40b4ae1cd274cf31f932a5bcc6517b1438f7946e011f,2025-07-08T16:18:34.923000
+CVE-2025-7116,0,1,3b84cbe6de82588af2701d62d5be2ae7f7b714d0505d729be945f7ffa04b2d20,2025-07-08T16:18:34.923000
+CVE-2025-7117,0,1,f773227bbe8bdfda9177d212e29d113f4396a5f47c7935d1c0208c86e6cd989c,2025-07-08T16:18:34.923000
+CVE-2025-7118,0,1,0d52f5a0875b5a0f638ef7151fbd2460a1631010329160b8f7e16f32240543c7,2025-07-08T16:18:34.923000
+CVE-2025-7119,0,1,ed6e8efc4eb4aa5119baee595e39b064334638459b5f4c9fb12c608fa9f0d88d,2025-07-08T16:18:34.923000
+CVE-2025-7120,0,1,6d56989cbb1a75cb8cd65f1aa2f143e51193ac5b9e640d03f3ea3bcbaed21a03,2025-07-08T16:18:34.923000
+CVE-2025-7121,0,1,9de9dec5a3dd0c490b6876cd5a9c21c7ca25b70990f7aaacc06f973c93e62e2e,2025-07-08T16:18:34.923000
+CVE-2025-7122,0,1,9310fd7fd44e139faa32eaf42c0788ac37f28d85be5b159b142982de53d0069d,2025-07-08T16:18:34.923000
+CVE-2025-7123,0,1,94ff91d3a28eeb8b36796c9f08ba8f155e84cb20cc62ea9c2156887fe7eb23fa,2025-07-08T16:18:34.923000
+CVE-2025-7124,0,1,06c8e0590ad032b2237f3d44e14fbeaebac6c24b6841ec2e2d0fa5555c440814,2025-07-08T16:18:34.923000
+CVE-2025-7125,0,1,6c3edeb39ba1f00eb4bff15f05f8ac212b84d19cca6e67f1adf974f5f752a33d,2025-07-08T16:18:34.923000
+CVE-2025-7126,0,1,38092ab1a11c9e74a1af0ad06142f49c64b6f01867e3543f0423a926be39917b,2025-07-08T16:18:34.923000
+CVE-2025-7127,0,1,7e2e07eca0070590e55e8f5a0a59891459b0f58e55cfa58509ba7d8223290383,2025-07-08T16:18:34.923000
+CVE-2025-7128,0,1,e88b0fe0ceeedb1e1fdd5030d8811cac020964377014a64e3d7f9ddf458678fd,2025-07-08T16:18:34.923000
+CVE-2025-7129,0,1,5e48923f02017f2e3f66d8e54f3e044b8936315f192d4ee5137092bc5b8e9496,2025-07-08T16:18:34.923000
+CVE-2025-7130,0,1,1357e61e20cbdfe0c85b436fc2567d609ef765e73b738282959cbe63344c97ca,2025-07-08T16:18:34.923000
+CVE-2025-7131,0,1,5e3dc8e82efac598b86cfbfe82f1284ef4a2f0ecc56818e019fa596fd26540f9,2025-07-08T16:18:34.923000
+CVE-2025-7132,0,1,9a96f7d944c1bbc3cced499a8ee21ae8da32c430556794faf4eeb2389cd56f5a,2025-07-08T16:18:34.923000
+CVE-2025-7133,0,1,991588cc9d893d0cdf1192072b00aa651521418de82987d3411555ff8ddb6ff2,2025-07-08T16:18:34.923000
+CVE-2025-7134,0,1,f8a98630eb68e1197d3efbf13b0cc44fd1216fc8162ce3eff1c1f2c42885e72c,2025-07-08T16:18:34.923000
+CVE-2025-7135,0,1,41e1371001b0c9ef44085404a200e473649f01c3deac2b86a0172c6dbc4db2b0,2025-07-08T16:18:34.923000
+CVE-2025-7136,0,1,45646fd785818c71a478aed83adf45c1a4cb565720937384a9a078d615616dc5,2025-07-08T16:18:34.923000
+CVE-2025-7137,0,1,8983e1bf8f43863ce4f3f3d6f23024ad00aebb51f44c9e8edbd10012f2c687aa,2025-07-08T16:18:34.923000
+CVE-2025-7138,0,1,ae8525b701f55d58f0bde6f3ef93def87c220f38764214ee2dec062f5e03c07e,2025-07-08T16:18:34.923000
+CVE-2025-7139,0,1,5974606ad6695b4cd0807fe600a627598e553b510292b30a15346a03a3610524,2025-07-08T16:18:34.923000
+CVE-2025-7140,0,1,4c8e05ee0ba561be6b7ba5517700f2b32cb536b7bebe90cdfedfd7d295e0d480,2025-07-08T16:18:34.923000
+CVE-2025-7141,0,1,91bf30706d80178a64d73ad4398d761f9bfe48a3924768f5bbdc2462c5938cca,2025-07-08T16:18:34.923000
+CVE-2025-7142,0,1,f3c4612d75128afaaec302137d96e08fc71bd22932973c9685675017b248699e,2025-07-08T16:18:34.923000
+CVE-2025-7143,0,1,d46fdb4db53a461dacbcdd92c4ff8e70d63a184f1ab1012d00779e40a993a88f,2025-07-08T16:18:34.923000
+CVE-2025-7144,0,1,4a838bc9443f9954fd5ce07bebfa826af44107cd2c0151d98ec8a4f8643ffe1f,2025-07-08T16:18:34.923000
+CVE-2025-7145,0,1,f23a6abe9ee91bf327047a5646fd46bd6ebe3d3fd2e0c356723d58f28175eb7c,2025-07-08T16:18:34.923000
+CVE-2025-7146,0,1,638c7729a530d780a31a04422b11c82b6d91f8fa46f4f9240650edec94b5621f,2025-07-08T16:18:14.207000
+CVE-2025-7147,0,1,021f03d37684dbb6aa814091861efc10cfc4822508e3b0431afdb9a262daa57a,2025-07-08T16:18:34.923000
+CVE-2025-7148,0,1,004c748c2eb135aa459011e3f784e052707494e929bdf0250b572031d5537c4f,2025-07-08T16:18:34.923000
+CVE-2025-7149,0,1,d0981015b4dbb38bf608d43e74c754f21e5fa9c17a535ca9a9ed1c859874dbbe,2025-07-08T16:18:34.923000
+CVE-2025-7150,0,1,2a7e4aece845b549f58de0c99d871de3a12913e39e4080df564c71d73c684e60,2025-07-08T16:18:34.923000
+CVE-2025-7151,0,1,06bea7255258ee318b3eca5711a1fc8a6d91bdf4ba8ddcc1a9a8380b633b903b,2025-07-08T16:18:34.923000
+CVE-2025-7152,0,1,2092acf6bad96e49de8fbb3618ffc406f388c73ae115c034f246506747c027dc,2025-07-08T16:18:34.923000
+CVE-2025-7153,0,1,05084582c638c054d2b3e49180c1490f1d21d605778d67a9e0125d180df27f05,2025-07-08T16:18:14.207000
+CVE-2025-7154,0,1,2299aa206bbc4f8d93f86128263120c257f2298fc6125efe3203f9afed36f50c,2025-07-08T17:16:04.893000
+CVE-2025-7155,0,1,58e370e7ec7988674d77a511a3ff36b5467daefbad49af1d9fa200a15415ab00,2025-07-08T17:16:05.053000
+CVE-2025-7156,0,1,c9f9f5ddb7fd9ddfb4311cb647b3794a82654b2d90d22e935c7083c26b3f936d,2025-07-08T16:18:14.207000
+CVE-2025-7157,0,1,ed3e80ee2fb97e05ba4f3438864972377f8da77f77a0508f0bce20df6f1e01cf,2025-07-08T16:18:14.207000
+CVE-2025-7158,0,1,17b4a589bb3086fe76bf0d9328b0eb95a4c93a36a41f0bb7fcf20658389a1a3d,2025-07-08T16:18:14.207000
+CVE-2025-7159,0,1,c9b13860e0a629efde4384a514f8367f9fbea3766bde841e50cbc5fba7bf22d2,2025-07-08T16:18:14.207000
+CVE-2025-7160,0,1,0a96e36e0df846848d7566ff5ef62a9c77366ba93d07032d813cc997f581cd40,2025-07-08T16:18:14.207000
+CVE-2025-7161,0,1,cc6bc9840b197bee88df77d8faba4cf23ad47cea0c9a791291e489681097183f,2025-07-08T16:18:14.207000
+CVE-2025-7162,0,1,90b2f73d26f682f7cee18646a0143d7390bb10c25310197eb5639998b06b969c,2025-07-08T16:18:14.207000
+CVE-2025-7163,0,1,93e6589fb5ad8f884d8da93aa6b077efaf2c5a0c70cf7cf17392ac98c7a1a0fa,2025-07-08T16:18:14.207000
+CVE-2025-7164,0,1,287b846fcf953fe8592d03634755b02aa18255841882ea946f2234c72b17c577,2025-07-08T16:18:14.207000
+CVE-2025-7165,0,1,8de9845c22c6c6381da0c597cef9b39ace6aa609a6b079fbc23b11fbeb53c7d4,2025-07-08T16:18:14.207000
+CVE-2025-7166,0,1,bc9ebf3b335c7fdc7b70a0a7ac6fb710f89d50c11241cf0367b79f4538ea36ba,2025-07-08T16:18:14.207000
+CVE-2025-7167,0,1,880b852ba5fba7f190ff654cb7138f849a5ee424ea4fcf87f14b7e1894f51a2a,2025-07-08T16:18:14.207000
+CVE-2025-7168,0,1,620ee3f8442160918282988681b7d0090fce9b52642e1764980c995724879dd5,2025-07-08T16:18:14.207000
+CVE-2025-7169,0,1,e456290914a8833027d80cbaa0a36dc25bfec6f4245e26db7db69ce96a12070d,2025-07-08T16:18:14.207000
+CVE-2025-7170,0,1,9a24d32ac6d2b74a7fd27638f86e55519cc35a33f38bc61b6ccef34a18a68a6e,2025-07-08T16:18:14.207000
+CVE-2025-7171,0,1,4eecd9580c80046579789154979a37316d07efc4d837652b0978958a75dadb43,2025-07-08T16:18:14.207000
+CVE-2025-7172,0,1,8ed2e1a4363975256117b1c08b08d16a3d4461e5a582120297a43c43aba9f9a3,2025-07-08T16:18:14.207000
+CVE-2025-7173,0,1,b9fe9bd21c3e1044433e59b36d788a627f155849cec3b41b775f37335b6b7fc3,2025-07-08T17:16:05.297000
+CVE-2025-7174,0,1,0fffb63b12e8cd7b29a4e6bdc07f7ef283528555a4c02a8aa7de0892656e6d6c,2025-07-08T17:16:05.513000
+CVE-2025-7175,0,1,77c96d2871db63a9111999f3af82672955ef2a730d171826befc21de2c2902f5,2025-07-08T16:18:14.207000
+CVE-2025-7176,0,1,e00268c3e1c538517a3ba2b8b7ed8ed5b6a4b0548846049d98b2653e47f23273,2025-07-08T16:18:14.207000
+CVE-2025-7177,0,1,d07ee1e86e660a9e8ee1035c1eed870e453125ed17dd1e87ef41bb449a018df6,2025-07-08T16:18:14.207000
+CVE-2025-7178,0,1,c2bcc11e492fb18a89db7b178043274043490fbcd9d914e1963aed33cb4939be,2025-07-08T16:18:14.207000
+CVE-2025-7179,0,1,a82cd06612652f65030a8bdd817ddc701bfae9a1299efeb39329692fee8e2f44,2025-07-08T16:18:14.207000
+CVE-2025-7180,0,1,cca72d19592dcea7a28e44329e4235b4aa24db3027d9660edb37ec845e372dab,2025-07-08T16:18:14.207000
+CVE-2025-7181,0,1,fc87f6aacdfb3ce6144eb4928cfda3a3eabb9e40115b3eb80d61ea528d56026c,2025-07-08T17:16:05.673000
+CVE-2025-7182,0,1,816761ee708d90c23f2101cd81755c9bccd46a8c07c0a43143b9cfce455d4b57,2025-07-08T16:18:14.207000
+CVE-2025-7183,0,1,ccdd5d58c142202b58daa539c0628044ad27426c083019a60c5ec2ba302d2f31,2025-07-08T16:18:14.207000
+CVE-2025-7184,1,1,b36192440b04372f0b76ab86332bc5e9fbd387fb3afec205f2754cf12b8a49e8,2025-07-08T16:18:14.207000
+CVE-2025-7185,1,1,efb55944b7fb1e5594e9b0b3d82e4737318c9f596e1a66fa8c18cd50c9df8e7b,2025-07-08T16:18:14.207000
+CVE-2025-7186,1,1,3e6decafa53bdd3c2b6eb7bcfd93b74d01c2d323b5f7694cb6fa567d6e716537,2025-07-08T17:16:05.833000
+CVE-2025-7187,1,1,c62bae007d51dfb9ccba8b5f7344f3ff8a6b9f74d232eb4fcb14b6aad63a7b13,2025-07-08T17:16:06.057000
+CVE-2025-7259,0,1,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000
+CVE-2025-7326,0,1,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000
+CVE-2025-7327,0,1,a0fb7d73224d0b20e5509ef1c0447ce978b71b86006dd59d1e903714c73ecb3c,2025-07-08T16:18:14.207000
+CVE-2025-7345,0,1,e15e76873bb3b168f71a5d766c4cd2e1bed2b8ba3fb754b723996140dde704f6,2025-07-08T16:18:14.207000
+CVE-2025-7346,0,1,0fee3d68122e9af468e47512e4d9d848586d1a84e0ff7cd695bcb12ab8e33bea,2025-07-08T16:18:14.207000