diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3054.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3054.json new file mode 100644 index 00000000000..b7c416ddff1 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3054.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3054", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-05T06:15:25.833", + "lastModified": "2025-06-05T06:15:25.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this requires the 'Private Message' module to be enabled and the Business version of the PRO software to be in use." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://headwayapp.co/wp-user-frontend-changelog", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/989f0e0b-8a57-4435-95b0-21fec215112d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3055.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3055.json new file mode 100644 index 00000000000..36821372ebb --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3055.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3055", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-05T06:15:26.300", + "lastModified": "2025-06-05T06:15:26.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_avatar_ajax() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://headwayapp.co/wp-user-frontend-changelog", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eeb71c31-9e56-4b58-9cfc-a97f6892cc2b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4332.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4332.json index 6844df6b167..8b9f480e59a 100644 --- a/CVE-2025/CVE-2025-43xx/CVE-2025-4332.json +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4332.json @@ -2,13 +2,13 @@ "id": "CVE-2025-4332", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-06T08:15:17.990", - "lastModified": "2025-05-09T13:36:24.223", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-05T06:15:26.503", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visitor-detail.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + "value": "A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visitor-detail.php. The manipulation of the argument editid/remark leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", @@ -210,6 +210,18 @@ "VDB Entry" ] }, + { + "url": "https://vuldb.com/?submit.564729", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.568338", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590559", + "source": "cna@vuldb.com" + }, { "url": "https://github.com/Pjwww13447/pjwww/issues/1", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2025/CVE-2025-45xx/CVE-2025-4598.json b/CVE-2025/CVE-2025-45xx/CVE-2025-4598.json index eb952a5f7d0..4cbb8956000 100644 --- a/CVE-2025/CVE-2025-45xx/CVE-2025-4598.json +++ b/CVE-2025/CVE-2025-45xx/CVE-2025-4598.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4598", "sourceIdentifier": "secalert@redhat.com", "published": "2025-05-30T14:15:23.557", - "lastModified": "2025-06-05T03:15:26.833", + "lastModified": "2025-06-05T07:15:23.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -63,6 +63,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/06/05/1", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/06/05/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5639.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5639.json new file mode 100644 index 00000000000..73b84a359ff --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5639.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5639", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T06:15:27.063", + "lastModified": "2025-06-05T06:15:27.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Notice Board System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/40", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311126", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311126", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.589812", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5640.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5640.json new file mode 100644 index 00000000000..b9267099cb7 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5640.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5640", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T06:15:27.293", + "lastModified": "2025-06-05T06:15:27.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PX4-Autopilot 1.12.3. It has been classified as problematic. This affects the function MavlinkReceiver::handle_message_trajectory_representation_waypoints of the file mavlink_receiver.cpp of the component TRAJECTORY_REPRESENTATION_WAYPOINTS Message Handler. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 1.7, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PX4/PX4-Autopilot/issues/24915", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/PX4/PX4-Autopilot/issues/24915#issue-3091040552", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311127", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311127", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584889", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5641.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5641.json new file mode 100644 index 00000000000..0523b7cca2f --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5641.json @@ -0,0 +1,156 @@ +{ + "id": "CVE-2025-5641", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T07:15:23.317", + "lastModified": "2025-06-05T07:15:23.317", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Radare2 5.9.9. It has been rated as problematic. This issue affects the function r_cons_is_breaked in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and \"crashy\". Further analysis has shown \"the race is not a real problem unless you use asan\". An additional warning regarding threading support has been added." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:P", + "baseScore": 1.0, + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1oG5IC7qhL_SJsIHpnWp7MZlWJGYt8qWZ/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24230", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24230#issuecomment-2919612676", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311129", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311129", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586909", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json new file mode 100644 index 00000000000..97ef339b890 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json @@ -0,0 +1,156 @@ +{ + "id": "CVE-2025-5642", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T07:15:23.583", + "lastModified": "2025-06-05T07:15:23.583", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in Radare2 5.9.9. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and \"crashy\". Further analysis has shown \"the race is not a real problem unless you use asan\". A new warning has been added." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:P", + "baseScore": 1.0, + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1joXpofhKSeb3uJ034ayVuWIoJj08gm_9/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24231", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24231#issuecomment-2918848163", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311130", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311130", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586910", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json new file mode 100644 index 00000000000..5b10f6cc892 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json @@ -0,0 +1,156 @@ +{ + "id": "CVE-2025-5643", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T07:15:23.780", + "lastModified": "2025-06-05T07:15:23.780", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and \"crashy\". Further analysis has shown \"the race is not a real problem unless you use asan\". A new warning has been added." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:P", + "baseScore": 1.0, + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1XsoyD7lMC-9a9Cxhld8sdEE-0PF3lxvB/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24232", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24232#issuecomment-2918841776", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311131", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311131", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586912", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5644.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5644.json new file mode 100644 index 00000000000..b8fad3c7ec0 --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5644.json @@ -0,0 +1,160 @@ +{ + "id": "CVE-2025-5644", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-05T07:15:23.990", + "lastModified": "2025-06-05T07:15:23.990", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Radare2 5.9.9. Affected by this issue is the function r_cons_flush in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to use after free. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and \"crashy\". Further analysis has shown \"the race is not a real problem unless you use asan\". A new warning has been added." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:P", + "baseScore": 1.0, + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1VtiMMp7ECun3sq3AwlqQrU9xEPA45eOz/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24233", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/radareorg/radare2/issues/24233#issuecomment-2918847833", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311132", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311132", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586921", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5683.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5683.json new file mode 100644 index 00000000000..cf2346bc0de --- /dev/null +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5683.json @@ -0,0 +1,70 @@ +{ + "id": "CVE-2025-5683", + "sourceIdentifier": "a59d8014-47c4-4630-ab43-e1b13cbe58e3", + "published": "2025-06-05T06:15:27.517", + "lastModified": "2025-06-05T06:15:27.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When loading a specifically crafted ICNS format image file in QImage then it will trigger a crash.\u00a0This issue affects Qt from versions 6.3.0 through 6.5.9, from 6.6.0 through 6.8.4, 6.9.0. This is fixed in 6.5.10, 6.8.5 and 6.9.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "a59d8014-47c4-4630-ab43-e1b13cbe58e3", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "references": [ + { + "url": "https://codereview.qt-project.org/c/qt/qtimageformats/+/644548", + "source": "a59d8014-47c4-4630-ab43-e1b13cbe58e3" + }, + { + "url": "https://issues.oss-fuzz.com/issues/415350704", + "source": "a59d8014-47c4-4630-ab43-e1b13cbe58e3" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3ed05580f78..239998419ba 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-05T06:00:22.492921+00:00 +2025-06-05T08:00:20.696209+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-05T05:15:24.640000+00:00 +2025-06-05T07:15:23.990000+00:00 ``` ### Last Data Feed Release @@ -33,28 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296543 +296552 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `9` -- [CVE-2025-1793](CVE-2025/CVE-2025-17xx/CVE-2025-1793.json) (`2025-06-05T05:15:23.690`) -- [CVE-2025-5632](CVE-2025/CVE-2025-56xx/CVE-2025-5632.json) (`2025-06-05T04:15:40.417`) -- [CVE-2025-5633](CVE-2025/CVE-2025-56xx/CVE-2025-5633.json) (`2025-06-05T04:15:53.537`) -- [CVE-2025-5634](CVE-2025/CVE-2025-56xx/CVE-2025-5634.json) (`2025-06-05T04:15:54.897`) -- [CVE-2025-5635](CVE-2025/CVE-2025-56xx/CVE-2025-5635.json) (`2025-06-05T04:15:55.470`) -- [CVE-2025-5636](CVE-2025/CVE-2025-56xx/CVE-2025-5636.json) (`2025-06-05T05:15:24.230`) -- [CVE-2025-5637](CVE-2025/CVE-2025-56xx/CVE-2025-5637.json) (`2025-06-05T05:15:24.440`) -- [CVE-2025-5638](CVE-2025/CVE-2025-56xx/CVE-2025-5638.json) (`2025-06-05T05:15:24.640`) +- [CVE-2025-3054](CVE-2025/CVE-2025-30xx/CVE-2025-3054.json) (`2025-06-05T06:15:25.833`) +- [CVE-2025-3055](CVE-2025/CVE-2025-30xx/CVE-2025-3055.json) (`2025-06-05T06:15:26.300`) +- [CVE-2025-5639](CVE-2025/CVE-2025-56xx/CVE-2025-5639.json) (`2025-06-05T06:15:27.063`) +- [CVE-2025-5640](CVE-2025/CVE-2025-56xx/CVE-2025-5640.json) (`2025-06-05T06:15:27.293`) +- [CVE-2025-5641](CVE-2025/CVE-2025-56xx/CVE-2025-5641.json) (`2025-06-05T07:15:23.317`) +- [CVE-2025-5642](CVE-2025/CVE-2025-56xx/CVE-2025-5642.json) (`2025-06-05T07:15:23.583`) +- [CVE-2025-5643](CVE-2025/CVE-2025-56xx/CVE-2025-5643.json) (`2025-06-05T07:15:23.780`) +- [CVE-2025-5644](CVE-2025/CVE-2025-56xx/CVE-2025-5644.json) (`2025-06-05T07:15:23.990`) +- [CVE-2025-5683](CVE-2025/CVE-2025-56xx/CVE-2025-5683.json) (`2025-06-05T06:15:27.517`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `2` -- [CVE-2025-3231](CVE-2025/CVE-2025-32xx/CVE-2025-3231.json) (`2025-06-05T05:15:23.977`) +- [CVE-2025-4332](CVE-2025/CVE-2025-43xx/CVE-2025-4332.json) (`2025-06-05T06:15:26.503`) +- [CVE-2025-4598](CVE-2025/CVE-2025-45xx/CVE-2025-4598.json) (`2025-06-05T07:15:23.047`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0ce86230a04..9a4cb362fb8 100644 --- a/_state.csv +++ b/_state.csv @@ -283750,7 +283750,7 @@ CVE-2025-1786,0,0,ad5ad2cc482ea0e990ccfde4284bed8bd985e906e2b3d6d5c46c5b7aa325f6 CVE-2025-1788,0,0,eea96ff8d7571aa32dee65283e84ed9282f70445eccb027f53ff2ff5b53af011,2025-03-03T21:15:16.263000 CVE-2025-1791,0,0,b51ec6e3363933841ca9d89f35b1f043f0875f3be451d26be83ec61e44a02997,2025-03-03T21:15:16.433000 CVE-2025-1792,0,0,052cf26c416513749ae6f2dfa6dbfb1aac320f022ebc69c1bdb7fe944b3ee240,2025-05-30T16:31:03.107000 -CVE-2025-1793,1,1,b0e3e03f890bc5fde5469ccd0137cf9eef2b6e28e6d3a297f08692e292f3e03b,2025-06-05T05:15:23.690000 +CVE-2025-1793,0,0,b0e3e03f890bc5fde5469ccd0137cf9eef2b6e28e6d3a297f08692e292f3e03b,2025-06-05T05:15:23.690000 CVE-2025-1795,0,0,733c5474719ba514128cb1d7a904c28895ad9709317e8c3f67851a90e83a7a8e,2025-02-28T21:15:27.570000 CVE-2025-1796,0,0,b56442463abaa60ded322137d2a828b4bcb342d5b444159eb490456b451e3ff7,2025-03-20T10:15:54.157000 CVE-2025-1797,0,0,21932d476b45bdfb45af7756ea9c313776c862e5d32503d17ac7b8ec47d6a277,2025-03-03T21:15:16.557000 @@ -290748,6 +290748,7 @@ CVE-2025-30536,0,0,cd09a59065c6886ec9cd83ed9561b5d4102270859dd556edbd1e4f1d188ce CVE-2025-30537,0,0,22904260c281f0bc31582ccd1e36689d41cf60d040e1d1725301ad5d5a39b5ee,2025-03-27T16:44:44.143000 CVE-2025-30538,0,0,cfa78066677c690bdfe4b0f0f0a8876fdb53fc1b8b368cc82b255d280b9aef93,2025-03-27T16:44:44.143000 CVE-2025-30539,0,0,63b1e9fb2c0a30045fd53780334a4941721f0331d3df8521c505112548788685,2025-03-27T16:44:44.143000 +CVE-2025-3054,1,1,bf48c504d3192d68ca9e9383366746d45986fd47fa4e477b03ae4337ab6425eb,2025-06-05T06:15:25.833000 CVE-2025-30540,0,0,027ad62303196b2408a12b619a7e82a7eea9f2d76f6ec953f52cd9b0249556ad,2025-03-27T16:44:44.143000 CVE-2025-30541,0,0,c9ccc98d7f873fc7ac86e04f81077705c5cbbc92cc2c3985346a5525a21731c5,2025-03-27T16:44:44.143000 CVE-2025-30542,0,0,52bce21f108ce1978b39b8b0c66a657f959f5438a178c25fef8782cd688ff94d,2025-03-27T16:44:44.143000 @@ -290758,6 +290759,7 @@ CVE-2025-30546,0,0,1047a478f20c90c432b62448475883ab92d6d3e414334fe3093939208ac18 CVE-2025-30547,0,0,b5dc99d925ae51433091b45bce10dd3c06529e627265c4d78d0989f88f0cedd4,2025-04-01T20:26:11.547000 CVE-2025-30548,0,0,1f1c4d7c0cd9c8a0569a9998002c5af52cbe1c56bbe2d2605cb7acfed07b4f3f,2025-04-01T20:26:11.547000 CVE-2025-30549,0,0,b2b1de6341113f4fbb9d879074548b0dc8cc7edd63dc810da06bf5336f97af6e,2025-03-27T16:44:44.143000 +CVE-2025-3055,1,1,9ab83331a84257bb42f9d63082113650be1c52109f51290da0a498b7dc9076e4,2025-06-05T06:15:26.300000 CVE-2025-30550,0,0,41b5245fcd0b617f004ff2ce804a57dea117699496544bd6b4a90f8d3444caaf,2025-03-27T16:44:44.143000 CVE-2025-30551,0,0,9aaa7b60d24447e720a2920b3348a8170045c09e9e2e6a155d49167a18ee4d9a,2025-03-27T16:44:44.143000 CVE-2025-30552,0,0,10ed263523896eb93d810582771213a81669cb1e0727e2f025c6e97496e4f2ea,2025-03-27T16:44:44.143000 @@ -292205,7 +292207,7 @@ CVE-2025-32302,0,0,2efcb7e95fdb3fade31cae3ee8ddc064ac4fe27d73d1b8e48b58173c690ec CVE-2025-32306,0,0,0076f54feb6c98bae8c2148e126a770f8952e35f714caf29e3a0e5e2cbff7390,2025-05-19T13:35:50.497000 CVE-2025-32307,0,0,a0ca4b40d93bc485abc5353416cc449272433546ebe27b7ec60abfb5a278a669,2025-05-19T13:35:50.497000 CVE-2025-32309,0,0,72e524edceb2da5dc017c83bf8ab60e46c6fe45eb184ab0349a1ba415921a900,2025-05-23T15:54:42.643000 -CVE-2025-3231,0,1,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b16e,2025-06-05T05:15:23.977000 +CVE-2025-3231,0,0,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b16e,2025-06-05T05:15:23.977000 CVE-2025-32310,0,0,c3b2568a49d7a011e3cbc9748557e58f0519995b3a6735845f843c0d6b6482d9,2025-05-19T13:35:50.497000 CVE-2025-3235,0,0,bf02e56a9b2acdd9197c016e355d3cdfc496d77110cbd9f5fcadcef4a0003d66,2025-05-16T15:43:09.640000 CVE-2025-32352,0,0,14a2251916c9246fc3d185746736b75fd36a375e4aafcddd19d832e612b92a9a,2025-04-07T17:15:37.147000 @@ -294285,7 +294287,7 @@ CVE-2025-4328,0,0,e8bdcc0bd3fa88242159a44c5ca54793c131dd6edc873e6391897450ed26b8 CVE-2025-4329,0,0,f1d879305600d1c851583b5c74d0d1aabeddb925980971909508f84a0c2f2037,2025-05-07T14:13:35.980000 CVE-2025-4330,0,0,84e75ef63f996c57f2bc5a8781a2570e6b916f66000c210b824b7672d1ad3000,2025-06-04T14:54:33.783000 CVE-2025-4331,0,0,620e0da85354d81a367a41b7f2e39eeaeb31d846f9c0b35d1175b07ed628b224,2025-05-17T15:15:46.090000 -CVE-2025-4332,0,0,db3fe613c2dc0144a41ad5ccdf0f64634590f7b602471c6e9907c2e2377073ab,2025-05-09T13:36:24.223000 +CVE-2025-4332,0,1,f51566d2c2117f4ce873997a23ff694b3ee5f9b5aad203a2e1da6e04a305fea2,2025-06-05T06:15:26.503000 CVE-2025-4333,0,0,df346cc767abe9739cdcb38e3128deec2b82a2cef52e4ce255a43a7764d0a6a8,2025-05-07T14:13:20.483000 CVE-2025-4335,0,0,ab91d891d4885edde448eb60f8fb4e6853bc982358f87a0b04b64a0f12c1f76e,2025-05-07T14:13:20.483000 CVE-2025-4336,0,0,2e09e9c7f36f335133de8594c5c6fd52aee442ec37ac35149b98164c79dc716d,2025-05-28T14:58:52.920000 @@ -294774,7 +294776,7 @@ CVE-2025-4595,0,0,8c9eae3fccd68f9f83bf2fd987d9af2bca72931783e3baab23483f1a584b35 CVE-2025-45953,0,0,4ae22ace1fa79622bebb714ee3a1b2bc44139600b15fc188f0269a639daf29ec,2025-04-30T18:03:25.497000 CVE-2025-45956,0,0,5c4c4370cebea5362e52ff80785ad75271a9ace1cfcc698a1fc7b6e2a3193f1f,2025-05-14T21:01:22.690000 CVE-2025-4597,0,0,187dad561f92b725f4e94f11621cd8f7fb4eea5ade3c9c9e2bde9c8ced3f4e7e,2025-05-30T16:31:03.107000 -CVE-2025-4598,0,0,43582817dc4e574adce2adaf7b74ab01ac64252c1d20949a3d68f73a307a87e0,2025-06-05T03:15:26.833000 +CVE-2025-4598,0,1,0afb48f5d4beb8ba717edab0a2c1dbaaa02bcad15f4563ef46c0692744ec8051,2025-06-05T07:15:23.047000 CVE-2025-45997,0,0,f11c8f31166b54035e7fdaa05978523638c1ab90c8a70d2cb9a802aeed8dc136,2025-05-28T15:15:24.900000 CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000 CVE-2025-46011,0,0,3fa2c27b3a8a9b71e91e5c9d82c6f03b3ef49b3bddace355d4418370f7ed311a,2025-06-04T21:15:39.370000 @@ -296533,12 +296535,19 @@ CVE-2025-5628,0,0,0656659ce4cd45353525f72d79c1ec7bac9416177bebc35b022a23c28c5992 CVE-2025-5629,0,0,01fcab60a60da467b2fa7a02dfc7c90d89076c38cc5421c3c1ea04c2a626cbf7,2025-06-05T03:15:26.960000 CVE-2025-5630,0,0,02efca4bfdcafc88f233affae928401cfffcc0ba11d11c8ca91ee624dac8b877,2025-06-05T03:15:27.170000 CVE-2025-5631,0,0,e6d1ac7964b9fb5079a8eac7c2dc72acd1fc4d84e8a4b54d964dcd3231164c94,2025-06-05T03:15:27.377000 -CVE-2025-5632,1,1,ac86e8d5aa4e50300a825cea5ef00b9a702c6e7db20e09a148f0f2809f71922f,2025-06-05T04:15:40.417000 -CVE-2025-5633,1,1,d2e9017d50dd697ab60ad31d715826e1b13cfe87be1228d833d08bc25b8bd491,2025-06-05T04:15:53.537000 -CVE-2025-5634,1,1,be2fd3a2c8063e24805aac3e1d94a30cbceac6584deb91c70a5c6a6eb998211d,2025-06-05T04:15:54.897000 -CVE-2025-5635,1,1,81dd83879f76c7af5913b3937d98c87f1b84e4d4d3d09bc3826e3ea459eb89ce,2025-06-05T04:15:55.470000 -CVE-2025-5636,1,1,145f83e30f16b95b280e634478f6e58283ec8d5715cf3b3136b137c733097775,2025-06-05T05:15:24.230000 -CVE-2025-5637,1,1,2b8300f02b592699ef78aeea6021c7de9b6a73fb4d10a95ba28e84f0bc056d40,2025-06-05T05:15:24.440000 -CVE-2025-5638,1,1,1e40d02dec86e29852b50d079a055878bcf269b48e2a3b8d4579fc6f3269d67d,2025-06-05T05:15:24.640000 +CVE-2025-5632,0,0,ac86e8d5aa4e50300a825cea5ef00b9a702c6e7db20e09a148f0f2809f71922f,2025-06-05T04:15:40.417000 +CVE-2025-5633,0,0,d2e9017d50dd697ab60ad31d715826e1b13cfe87be1228d833d08bc25b8bd491,2025-06-05T04:15:53.537000 +CVE-2025-5634,0,0,be2fd3a2c8063e24805aac3e1d94a30cbceac6584deb91c70a5c6a6eb998211d,2025-06-05T04:15:54.897000 +CVE-2025-5635,0,0,81dd83879f76c7af5913b3937d98c87f1b84e4d4d3d09bc3826e3ea459eb89ce,2025-06-05T04:15:55.470000 +CVE-2025-5636,0,0,145f83e30f16b95b280e634478f6e58283ec8d5715cf3b3136b137c733097775,2025-06-05T05:15:24.230000 +CVE-2025-5637,0,0,2b8300f02b592699ef78aeea6021c7de9b6a73fb4d10a95ba28e84f0bc056d40,2025-06-05T05:15:24.440000 +CVE-2025-5638,0,0,1e40d02dec86e29852b50d079a055878bcf269b48e2a3b8d4579fc6f3269d67d,2025-06-05T05:15:24.640000 +CVE-2025-5639,1,1,0574c855a59c6912290df612b6759073525b883c84c27cc6df3ba54a06e41d1c,2025-06-05T06:15:27.063000 +CVE-2025-5640,1,1,0a44d2717618bf0a46c88e7eba3b9b2d49b4870ec347415bc404a7a4edcf5d09,2025-06-05T06:15:27.293000 +CVE-2025-5641,1,1,c8b8d3bca818a7becef08e6b36639b90c5e27057202f0ffcc45129c6a66a20df,2025-06-05T07:15:23.317000 +CVE-2025-5642,1,1,528421914045159b8b3e5e1b139bbeed69ee32d429d13b5ecfeb7c038e4694db,2025-06-05T07:15:23.583000 +CVE-2025-5643,1,1,73930ae01cb8be7ac4fa838687eb1a706ac7c2dbb69c6b7c4c1bf2bbac46b053,2025-06-05T07:15:23.780000 +CVE-2025-5644,1,1,82d411bc49406cd9f47f899a97aa0ea90cda6c3eafc133408c20fe88bc454997,2025-06-05T07:15:23.990000 +CVE-2025-5683,1,1,ba4cab8ac4a992f679318045c0972e1d1d7a83c5101ea31565eb781d5696d00a,2025-06-05T06:15:27.517000 CVE-2025-5688,0,0,73bb641229fc7f0cc58d056bcd50b9204b2df12fec290a20f6d3344d9742580f,2025-06-04T17:15:29.330000 CVE-2025-5690,0,0,ac9502bdafeae675eb4593084c8644a2164e57d1b6a23446acd8173b20c2ef82,2025-06-04T22:15:26.470000