diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27709.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27709.json new file mode 100644 index 00000000000..22daf011813 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27709.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27709", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2025-06-09T11:15:20.807", + "lastModified": "2025-06-09T11:15:20.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the Service Account Auditing reports." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-27709.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json index 00be16a31a5..4384fb4f793 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2784.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2784", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-03T03:15:18.113", - "lastModified": "2025-06-04T04:15:47.827", + "lastModified": "2025-06-09T10:15:22.457", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -88,6 +88,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8482", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:8663", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-2784", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json index 62e16fcf0b7..db69d766916 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32049.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32049", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-03T14:15:43.410", - "lastModified": "2025-06-04T04:15:52.440", + "lastModified": "2025-06-09T10:15:24.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -88,6 +88,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8482", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:8663", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-32049", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json index e8d23a9b1c5..f022b8e6d44 100644 --- a/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32914.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32914", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-14T15:15:25.633", - "lastModified": "2025-06-04T04:15:52.977", + "lastModified": "2025-06-09T10:15:24.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -88,6 +88,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8482", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:8663", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-32914", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36528.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36528.json new file mode 100644 index 00000000000..e3cafb9cc3d --- /dev/null +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36528.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-36528", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2025-06-09T11:15:21.773", + "lastModified": "2025-06-09T11:15:21.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in Service Account Auditing reports." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-36528.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3835.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3835.json new file mode 100644 index 00000000000..55743375b74 --- /dev/null +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3835.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-3835", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2025-06-09T11:15:21.913", + "lastModified": "2025-06-09T11:15:21.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine\u00a0Exchange Reporter Plus versions\u00a05721 and prior are vulnerable to Remote code execution in the\u00a0Content Search module." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-3835.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-406xx/CVE-2025-40675.json b/CVE-2025/CVE-2025-406xx/CVE-2025-40675.json new file mode 100644 index 00000000000..4e23a4c19b3 --- /dev/null +++ b/CVE-2025/CVE-2025-406xx/CVE-2025-40675.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-40675", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-06-09T10:15:25.190", + "lastModified": "2025-06-09T10:15:25.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the parameter 'query' in '/search'.\u00a0This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-xss-bagisto", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-414xx/CVE-2025-41437.json b/CVE-2025/CVE-2025-414xx/CVE-2025-41437.json new file mode 100644 index 00000000000..bb994f0c880 --- /dev/null +++ b/CVE-2025/CVE-2025-414xx/CVE-2025-41437.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-41437", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2025-06-09T11:15:22.053", + "lastModified": "2025-06-09T11:15:22.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine\u00a0OpManager,\u00a0NetFlow Analyzer,\u00a0Network Configuration Manager,\u00a0Firewall Analyzer and\u00a0OpUtils versions\u00a0128565 and below are vulnerable to Reflected XSS on the login page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/itom/advisory/cve-2025-41437.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json b/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json index b83bf95db9e..98308c2a4b0 100644 --- a/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json +++ b/CVE-2025/CVE-2025-49xx/CVE-2025-4948.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4948", "sourceIdentifier": "secalert@redhat.com", "published": "2025-05-19T16:15:36.790", - "lastModified": "2025-06-04T04:15:53.497", + "lastModified": "2025-06-09T10:15:25.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -88,6 +88,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:8482", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:8663", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-4948", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5871.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5871.json new file mode 100644 index 00000000000..e8012d5fc86 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5871.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5871", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T10:15:26.030", + "lastModified": "2025-06-09T10:15:26.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Papendorf SOL Connect Center 3.3.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zeke2997/CVE_request_Papendorf_Software_Engineering_GmbH", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311630", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311630", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585459", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5872.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5872.json new file mode 100644 index 00000000000..cab75946918 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5872.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5872", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T10:15:26.370", + "lastModified": "2025-06-09T10:15:26.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in eGauge EG3000 Energy Monitor 3.6.3. It has been classified as problematic. This affects an unknown part of the component Setting Handler. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zeke2997/CVE_request_eGauge_Systems_LLC", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311631", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311631", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585486", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5873.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5873.json new file mode 100644 index 00000000000..3a24f3e22b6 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5873.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5873", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T11:15:22.240", + "lastModified": "2025-06-09T11:15:22.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311632", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311632", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.585733", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5874.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5874.json new file mode 100644 index 00000000000..2cc52bdb0f9 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5874.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5874", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T11:15:22.440", + "lastModified": "2025-06-09T11:15:22.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Redash up to 10.1.0/25.1.0. It has been rated as critical. This issue affects the function run_query of the file /query_runner/python.py of the component getattr Handler. The manipulation leads to sandbox issue. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 5.2, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-264" + }, + { + "lang": "en", + "value": "CWE-265" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/superboy-zjc/1f89d375e2408ed843dc2cf0bb1bb894", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/superboy-zjc/1f89d375e2408ed843dc2cf0bb1bb894#proof-of-concept", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311633", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311633", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.580255", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ed601f05e60..759ba85e147 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-09T10:00:21.251322+00:00 +2025-06-09T12:00:24.904043+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-09T09:15:22.500000+00:00 +2025-06-09T11:15:22.440000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297039 +297048 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `9` -- [CVE-2025-5867](CVE-2025/CVE-2025-58xx/CVE-2025-5867.json) (`2025-06-09T08:15:22.140`) -- [CVE-2025-5868](CVE-2025/CVE-2025-58xx/CVE-2025-5868.json) (`2025-06-09T08:15:22.370`) -- [CVE-2025-5869](CVE-2025/CVE-2025-58xx/CVE-2025-5869.json) (`2025-06-09T09:15:22.320`) -- [CVE-2025-5870](CVE-2025/CVE-2025-58xx/CVE-2025-5870.json) (`2025-06-09T09:15:22.500`) -- [CVE-2025-5894](CVE-2025/CVE-2025-58xx/CVE-2025-5894.json) (`2025-06-09T08:15:22.607`) +- [CVE-2025-27709](CVE-2025/CVE-2025-277xx/CVE-2025-27709.json) (`2025-06-09T11:15:20.807`) +- [CVE-2025-36528](CVE-2025/CVE-2025-365xx/CVE-2025-36528.json) (`2025-06-09T11:15:21.773`) +- [CVE-2025-3835](CVE-2025/CVE-2025-38xx/CVE-2025-3835.json) (`2025-06-09T11:15:21.913`) +- [CVE-2025-40675](CVE-2025/CVE-2025-406xx/CVE-2025-40675.json) (`2025-06-09T10:15:25.190`) +- [CVE-2025-41437](CVE-2025/CVE-2025-414xx/CVE-2025-41437.json) (`2025-06-09T11:15:22.053`) +- [CVE-2025-5871](CVE-2025/CVE-2025-58xx/CVE-2025-5871.json) (`2025-06-09T10:15:26.030`) +- [CVE-2025-5872](CVE-2025/CVE-2025-58xx/CVE-2025-5872.json) (`2025-06-09T10:15:26.370`) +- [CVE-2025-5873](CVE-2025/CVE-2025-58xx/CVE-2025-5873.json) (`2025-06-09T11:15:22.240`) +- [CVE-2025-5874](CVE-2025/CVE-2025-58xx/CVE-2025-5874.json) (`2025-06-09T11:15:22.440`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `4` -- [CVE-2025-26873](CVE-2025/CVE-2025-268xx/CVE-2025-26873.json) (`2025-06-09T09:15:21.717`) +- [CVE-2025-2784](CVE-2025/CVE-2025-27xx/CVE-2025-2784.json) (`2025-06-09T10:15:22.457`) +- [CVE-2025-32049](CVE-2025/CVE-2025-320xx/CVE-2025-32049.json) (`2025-06-09T10:15:24.673`) +- [CVE-2025-32914](CVE-2025/CVE-2025-329xx/CVE-2025-32914.json) (`2025-06-09T10:15:24.927`) +- [CVE-2025-4948](CVE-2025/CVE-2025-49xx/CVE-2025-4948.json) (`2025-06-09T10:15:25.730`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9a07cacb85d..1c93bc45985 100644 --- a/_state.csv +++ b/_state.csv @@ -288946,7 +288946,7 @@ CVE-2025-2687,0,0,e82d949c8e8faf8f2095b9e7808001f7f4f10627b483f5a22b60ecb356616b CVE-2025-26870,0,0,dc7e8848de50d3fd2d459905abc0347a2d7cdc448dc5af1a96d9e0ede8c31570,2025-04-16T13:25:37.340000 CVE-2025-26871,0,0,2a55e987f92fea9189ceac5ee41ddd6e7a4f8d03cc64f6910d3d32ce60f6d5f0,2025-04-10T17:53:34.280000 CVE-2025-26872,0,0,61ed43a6639c0b98bdfb2ac4ce60a5c0e9fbaf830357837f339126574ffd4baa,2025-05-21T20:25:16.407000 -CVE-2025-26873,0,1,d2be4af17ab93dc9a3e4061603b533262f8b353a47175752e1a9e3abd4a4b1da,2025-06-09T09:15:21.717000 +CVE-2025-26873,0,0,d2be4af17ab93dc9a3e4061603b533262f8b353a47175752e1a9e3abd4a4b1da,2025-06-09T09:15:21.717000 CVE-2025-26874,0,0,3906c541d3c2328f17b778a284f8d8b03cca5035667b064d99481ac9bbf55d5c,2025-03-28T18:11:40.180000 CVE-2025-26875,0,0,1eb25a80831e545b4298e6aed92aca9e86c317dc16ff78bda859574fde302510,2025-03-15T22:15:13.690000 CVE-2025-26876,0,0,22d5e3662987726006c8c5bdd9aefc0ed802e210686667cf89016011bdc03010,2025-02-25T15:15:24.180000 @@ -289619,6 +289619,7 @@ CVE-2025-27703,0,0,f41288ec5900955b0cf9466ed3e7f5c768dfb1d7c1369c8b047bdaee8bb89 CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000 CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000 CVE-2025-27706,0,0,366db5baaa6540a4830c30306563c995abcbb80dda2cc2e6aaf1e42c68352033,2025-06-04T19:59:30.750000 +CVE-2025-27709,1,1,3151dac52c56bb04a5541c9aac0632fde6a230c7b5dd16a3658326ff7d5ba294,2025-06-09T11:15:20.807000 CVE-2025-2771,0,0,669ee5eb97646afb82a0694c49c0b6d1df006accbc659c269487c2a90325f7e3,2025-04-29T13:52:47.470000 CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000 CVE-2025-27716,0,0,65bcc3c5b3482c33d19a88cecf33eda0c46f0e6a542313f4127f96639786d02e,2025-03-28T18:11:40.180000 @@ -289722,7 +289723,7 @@ CVE-2025-27835,0,0,bfd55bfd7467fd1074b48c9c5b6d2f6f88f9d233c37b427ef5473af1632e7 CVE-2025-27836,0,0,f465c8991d790bdb41314bcd1316c06a9f596110c7a85fa30ce1c38f1408796a,2025-04-01T16:35:25.050000 CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e550,2025-04-01T16:35:15.650000 CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 -CVE-2025-2784,0,0,c7c4808feb499cd702d0d960deffe60652f16bb117bf6bd01b028f137764cbe7,2025-06-04T04:15:47.827000 +CVE-2025-2784,0,1,a8f30d5bfa2d3cb94a268e478af752e8103b971e3168ec97fef63ef7d1d50bec,2025-06-09T10:15:22.457000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 CVE-2025-2786,0,0,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e17,2025-04-09T21:16:25.720000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 @@ -292124,7 +292125,7 @@ CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82 CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 CVE-2025-32044,0,0,a71de1cf666447c00a842f33f324ff6f1e1b8218897a24a1ab72a6777d44e851,2025-04-29T13:52:28.490000 CVE-2025-32045,0,0,b17bdb427633d487b0808a2e4ae8cc6c6c54291aabbf23bed11ce2ff7243e639,2025-04-29T13:52:28.490000 -CVE-2025-32049,0,0,73d8468a84b8496428d7f4fc1116aaa1b2c4cace7f5ca71142bce123875e6901,2025-06-04T04:15:52.440000 +CVE-2025-32049,0,1,8ce60c6bfcbf9933ffa2c4f6c8a3e4f1bbc46007033103b1f8f9283aaf242195,2025-06-09T10:15:24.673000 CVE-2025-3205,0,0,2fbe92de3997566680a1052e42bc5ae830a44caf727a733907db3320a0fb983b,2025-05-07T15:58:51.537000 CVE-2025-32050,0,0,d0a186287f84675d733fc8adf7b721e0ef8373d24cc78f737949580577a7a0c2,2025-05-29T07:15:22.560000 CVE-2025-32051,0,0,c5601bf30a2280db534481dc10ccb3d4bc49f5f6486729ed8c2da54db3bdca25,2025-04-07T14:18:34.453000 @@ -292837,7 +292838,7 @@ CVE-2025-32910,0,0,240d5c7ee2b4c85daa5f41c88c38a0b1ff00089c1fa83111393e2a6ccde41 CVE-2025-32911,0,0,3dd5d330e5c87cf21d952d6d2f4ac7061b9425e4a5d7e13fec51bbce59ac67e5,2025-05-29T07:15:24.783000 CVE-2025-32912,0,0,537b35ec8e3e7b56fc525d652e56f2627ca353a9690e505ad216d07c70358d3f,2025-05-14T00:15:18.100000 CVE-2025-32913,0,0,4c0909f1e764fc3bf7ac16dc571564afbd85a7a86a7370c78e55f528fa4db095,2025-05-29T07:15:24.957000 -CVE-2025-32914,0,0,18343f5bbe2e070f0a9225de22c1034e115bf7870525c51d2a25dbefe7a56dc1,2025-06-04T04:15:52.977000 +CVE-2025-32914,0,1,f111116292642a8d9075af57c1ff7064ec7337a57bd531d01793342b33c9f4d3,2025-06-09T10:15:24.927000 CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000 CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000 CVE-2025-3292,0,0,118c173f186dcc5720366632802764bcff206cc9d545c82cefbfbd5ae3208b31,2025-04-15T18:39:27.967000 @@ -293250,6 +293251,7 @@ CVE-2025-36513,0,0,40997ded6ccfa9f42a498c7fa3aba63677e185863eb779042a0e6b33a18b5 CVE-2025-36521,0,0,76dbe5c9e005eebc45d03f4e270884a68d88e62c1e707e433be80dfc20224dd6,2025-05-02T13:52:51.693000 CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed45ac,2025-05-08T14:39:09.683000 CVE-2025-36527,0,0,020ac4647f700215df1a929fd367ca00f7a928aa1186e2cc968570239b95437f,2025-05-23T15:54:42.643000 +CVE-2025-36528,1,1,84cb3ba222d2976820b8b63f77b97f7f6d9e786f4a48b4ae46a753a221ac30e9,2025-06-09T11:15:21.773000 CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000 CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000 CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000 @@ -293679,6 +293681,7 @@ CVE-2025-3830,0,0,3ca7fd35f12c00858d19906448614222a608b776fe97491b48d4786654ad32 CVE-2025-3832,0,0,4341ec7053cdfcd8a390d90346badb808517e6099d45c1d26164d2b6c67b7ee1,2025-04-29T13:52:47.470000 CVE-2025-3833,0,0,7f9efddc434c5a834e34f9b02819bab78b434bce69954c54e0066db06f0e9e6b,2025-05-16T14:43:56.797000 CVE-2025-3834,0,0,6daa411c17b2f18e4970a27b87df8b22246e211d6c3f0c02245d64a4e9f7a3a2,2025-05-16T14:43:56.797000 +CVE-2025-3835,1,1,325a4b4bbd7ae90a731b691596cf04dba1b50b650bbae52838262bdaede993ff,2025-06-09T11:15:21.913000 CVE-2025-3836,0,0,3d825a5448c3c664c47fd44654a8a7149f2c964d059aaec6aa397b77a376d670,2025-05-23T15:55:02.040000 CVE-2025-3837,0,0,5a47b33afdb7e1907c95a70c26ce3ac05141d02d9782062528ed4ee5ab63acd5,2025-04-21T14:23:45.950000 CVE-2025-3838,0,0,bb793984df5f3344ae8c93ea895951dc09f41cafe84f678ece4d6f95f3b2b330,2025-04-21T14:23:45.950000 @@ -294172,6 +294175,7 @@ CVE-2025-4067,0,0,dbc4fa5a3543fbd835e23dc834da9e648caa31287a34f63ada5ad254d564f7 CVE-2025-40671,0,0,434fcb0f85fca3f9d859442da381d4e1454f2c968132e3a6b8db7392906ce4f0,2025-05-28T15:01:30.720000 CVE-2025-40672,0,0,16bc6b87ff9caf15184dbd8991107d7b17c5beb8ff9d9c80bdf9b979ca591b75,2025-05-28T15:01:30.720000 CVE-2025-40673,0,0,b579e57f63d588753084335ab891fb47997b91677321939dfff9acbc408e6ab4,2025-05-28T15:01:30.720000 +CVE-2025-40675,1,1,e615c00d74c27a37f43fca862f9811ab3707789619e669102051f36c9b3f1b6c,2025-06-09T10:15:25.190000 CVE-2025-4068,0,0,3e3326c67789178a2e89dd2c7182f86f8b00ff853809cd66d0d99e3251986e87,2025-05-28T17:27:28.983000 CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f25,2025-05-28T17:26:13.450000 CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000 @@ -294283,6 +294287,7 @@ CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17 CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000 CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000 CVE-2025-41433,0,0,f6273c3cc0a212df803e85bf8ba3fed5695ff63848595dbd80f25b739ca0954c,2025-05-08T14:39:09.683000 +CVE-2025-41437,1,1,6c6681b37c65d506133f6f652ea4a4550aad857521bf4230242b07ead60c9ae7,2025-06-09T11:15:22.053000 CVE-2025-41438,0,0,11ba6504cbbbf79eb2cd396e9c090ab75fa4dee3d0b15e980e071c03e0563d88,2025-05-30T16:31:03.107000 CVE-2025-4144,0,0,ed44a24e80e1487d547bfe32499c8ba4450309e0e9d0acd2df7ebfcd519c74a9,2025-05-12T19:39:31.053000 CVE-2025-41441,0,0,3b51a802d5e876ef5e3db952c79744bda892bc6a2133cce8cddd52ad9c2cfab2,2025-06-03T15:42:40.710000 @@ -296420,7 +296425,7 @@ CVE-2025-49450,0,0,fb4f52dbcabe6d10a7029fe4e63b7637345c171e5ff856e151d99f1496446 CVE-2025-49453,0,0,66b7e122d30d583eff84e0f9157cb5663586cb3b5d97be1749136fd19a39911b,2025-06-06T14:06:58.193000 CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 -CVE-2025-4948,0,0,2d8928ecccf769064199e618193b5181fd943840af74729dd43fad03a17cb71a,2025-06-04T04:15:53.497000 +CVE-2025-4948,0,1,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 CVE-2025-49599,0,0,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000 @@ -297032,9 +297037,13 @@ CVE-2025-5863,0,0,48c76b9bfa38e7e0a0f52b1b842aed688908b32d6a421ab601c1014d7706ec CVE-2025-5864,0,0,a8dfdc92ebae782cfb313fdf227d67ce16ff2d07e50f927ff70b066b1c4f2b62,2025-06-09T06:15:26.170000 CVE-2025-5865,0,0,a5836e94fbb60a125a2805660c473972fadb9903f2bf855f605cedbd858d9acd,2025-06-09T07:15:22.660000 CVE-2025-5866,0,0,1a1d40945c1633e902dcaac1351e4ba6f87f431ee14eece2cadb9e2cd6c656d1,2025-06-09T07:15:22.947000 -CVE-2025-5867,1,1,0585e70f0a94eebc82070f4c8d0acced7cd1326e1742022585ec325215d52f49,2025-06-09T08:15:22.140000 -CVE-2025-5868,1,1,68325a09b0aa436dd63f13057559ed756c9f827edede32bc436473ceb53e08f9,2025-06-09T08:15:22.370000 -CVE-2025-5869,1,1,7f9bd72ad4e67de286e93c718d5f458cff19ce714f432bf26be3f1bc93827c1d,2025-06-09T09:15:22.320000 -CVE-2025-5870,1,1,56cf0c38b24b464d756983b24deeb195e9267a0e2addbce31e23ff88c82e87be,2025-06-09T09:15:22.500000 +CVE-2025-5867,0,0,0585e70f0a94eebc82070f4c8d0acced7cd1326e1742022585ec325215d52f49,2025-06-09T08:15:22.140000 +CVE-2025-5868,0,0,68325a09b0aa436dd63f13057559ed756c9f827edede32bc436473ceb53e08f9,2025-06-09T08:15:22.370000 +CVE-2025-5869,0,0,7f9bd72ad4e67de286e93c718d5f458cff19ce714f432bf26be3f1bc93827c1d,2025-06-09T09:15:22.320000 +CVE-2025-5870,0,0,56cf0c38b24b464d756983b24deeb195e9267a0e2addbce31e23ff88c82e87be,2025-06-09T09:15:22.500000 +CVE-2025-5871,1,1,29fb930e3fc6aeb03b6c2faa5dfa0cd92581e7da02247233f876f7c627e17fa7,2025-06-09T10:15:26.030000 +CVE-2025-5872,1,1,065a51e37fdf65c7f966e875d4acfff2913805d1168d49fd45e4e7501750bd7d,2025-06-09T10:15:26.370000 +CVE-2025-5873,1,1,b51c403668b0fbf00c2f172c2e762b5adf681b1a42af63fcb0fa1bea768d4044,2025-06-09T11:15:22.240000 +CVE-2025-5874,1,1,540690cc4adc0a8d995ac70ac2198ed020bcd19f068d81699b6e311c6c1b09f4,2025-06-09T11:15:22.440000 CVE-2025-5893,0,0,db2cb20387f45cbfc876a64d8c459c328ded6b8c6c817ea819d837fda0dd41a7,2025-06-09T07:15:23.167000 -CVE-2025-5894,1,1,97e3391380d1ca8a2e75764d648c24bbcb0057a8ec46b60cdae81ae4f97e3d29,2025-06-09T08:15:22.607000 +CVE-2025-5894,0,0,97e3391380d1ca8a2e75764d648c24bbcb0057a8ec46b60cdae81ae4f97e3d29,2025-06-09T08:15:22.607000