Auto-Update: 2025-06-09T12:00:24.904043+00:00

This commit is contained in:
cad-safe-bot 2025-06-09 12:03:59 +00:00
parent 8d6ebe4b9d
commit 0f5149027a
15 changed files with 927 additions and 25 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27709",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:20.807",
"lastModified": "2025-06-09T11:15:20.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the Service Account Auditing reports."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-27709.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2784", "id": "CVE-2025-2784",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-03T03:15:18.113", "published": "2025-04-03T03:15:18.113",
"lastModified": "2025-06-04T04:15:47.827", "lastModified": "2025-06-09T10:15:22.457",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -88,6 +88,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:8482", "url": "https://access.redhat.com/errata/RHSA-2025:8482",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2025:8663",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2025-2784", "url": "https://access.redhat.com/security/cve/CVE-2025-2784",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-32049", "id": "CVE-2025-32049",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-03T14:15:43.410", "published": "2025-04-03T14:15:43.410",
"lastModified": "2025-06-04T04:15:52.440", "lastModified": "2025-06-09T10:15:24.673",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -88,6 +88,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:8482", "url": "https://access.redhat.com/errata/RHSA-2025:8482",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2025:8663",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2025-32049", "url": "https://access.redhat.com/security/cve/CVE-2025-32049",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-32914", "id": "CVE-2025-32914",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2025-04-14T15:15:25.633", "published": "2025-04-14T15:15:25.633",
"lastModified": "2025-06-04T04:15:52.977", "lastModified": "2025-06-09T10:15:24.927",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -88,6 +88,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:8482", "url": "https://access.redhat.com/errata/RHSA-2025:8482",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2025:8663",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2025-32914", "url": "https://access.redhat.com/security/cve/CVE-2025-32914",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36528",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:21.773",
"lastModified": "2025-06-09T11:15:21.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in Service Account Auditing reports."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/active-directory-audit/cve-2025-36528.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3835",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:21.913",
"lastModified": "2025-06-09T11:15:21.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine\u00a0Exchange Reporter Plus versions\u00a05721 and prior are vulnerable to Remote code execution in the\u00a0Content Search module."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-3835.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-40675",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-06-09T10:15:25.190",
"lastModified": "2025-06-09T10:15:25.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the parameter 'query' in '/search'.\u00a0This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-xss-bagisto",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-41437",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2025-06-09T11:15:22.053",
"lastModified": "2025-06-09T11:15:22.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine\u00a0OpManager,\u00a0NetFlow Analyzer,\u00a0Network Configuration Manager,\u00a0Firewall Analyzer and\u00a0OpUtils versions\u00a0128565 and below are vulnerable to Reflected XSS on the login page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/itom/advisory/cve-2025-41437.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-4948", "id": "CVE-2025-4948",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2025-05-19T16:15:36.790", "published": "2025-05-19T16:15:36.790",
"lastModified": "2025-06-04T04:15:53.497", "lastModified": "2025-06-09T10:15:25.730",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -88,6 +88,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:8482", "url": "https://access.redhat.com/errata/RHSA-2025:8482",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2025:8663",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2025-4948", "url": "https://access.redhat.com/security/cve/CVE-2025-4948",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-5871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-09T10:15:26.030",
"lastModified": "2025-06-09T10:15:26.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Papendorf SOL Connect Center 3.3.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://github.com/zeke2997/CVE_request_Papendorf_Software_Engineering_GmbH",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311630",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311630",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.585459",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-5872",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-09T10:15:26.370",
"lastModified": "2025-06-09T10:15:26.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in eGauge EG3000 Energy Monitor 3.6.3. It has been classified as problematic. This affects an unknown part of the component Setting Handler. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://github.com/zeke2997/CVE_request_eGauge_Systems_LLC",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311631",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311631",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.585486",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-5873",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-09T11:15:22.240",
"lastModified": "2025-06-09T11:15:22.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311632",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311632",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.585733",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5874",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-09T11:15:22.440",
"lastModified": "2025-06-09T11:15:22.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Redash up to 10.1.0/25.1.0. It has been rated as critical. This issue affects the function run_query of the file /query_runner/python.py of the component getattr Handler. The manipulation leads to sandbox issue. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 5.2,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 5.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
},
{
"lang": "en",
"value": "CWE-265"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/superboy-zjc/1f89d375e2408ed843dc2cf0bb1bb894",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/superboy-zjc/1f89d375e2408ed843dc2cf0bb1bb894#proof-of-concept",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311633",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311633",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.580255",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-06-09T10:00:21.251322+00:00 2025-06-09T12:00:24.904043+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-06-09T09:15:22.500000+00:00 2025-06-09T11:15:22.440000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,25 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
297039 297048
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `5` Recently added CVEs: `9`
- [CVE-2025-5867](CVE-2025/CVE-2025-58xx/CVE-2025-5867.json) (`2025-06-09T08:15:22.140`) - [CVE-2025-27709](CVE-2025/CVE-2025-277xx/CVE-2025-27709.json) (`2025-06-09T11:15:20.807`)
- [CVE-2025-5868](CVE-2025/CVE-2025-58xx/CVE-2025-5868.json) (`2025-06-09T08:15:22.370`) - [CVE-2025-36528](CVE-2025/CVE-2025-365xx/CVE-2025-36528.json) (`2025-06-09T11:15:21.773`)
- [CVE-2025-5869](CVE-2025/CVE-2025-58xx/CVE-2025-5869.json) (`2025-06-09T09:15:22.320`) - [CVE-2025-3835](CVE-2025/CVE-2025-38xx/CVE-2025-3835.json) (`2025-06-09T11:15:21.913`)
- [CVE-2025-5870](CVE-2025/CVE-2025-58xx/CVE-2025-5870.json) (`2025-06-09T09:15:22.500`) - [CVE-2025-40675](CVE-2025/CVE-2025-406xx/CVE-2025-40675.json) (`2025-06-09T10:15:25.190`)
- [CVE-2025-5894](CVE-2025/CVE-2025-58xx/CVE-2025-5894.json) (`2025-06-09T08:15:22.607`) - [CVE-2025-41437](CVE-2025/CVE-2025-414xx/CVE-2025-41437.json) (`2025-06-09T11:15:22.053`)
- [CVE-2025-5871](CVE-2025/CVE-2025-58xx/CVE-2025-5871.json) (`2025-06-09T10:15:26.030`)
- [CVE-2025-5872](CVE-2025/CVE-2025-58xx/CVE-2025-5872.json) (`2025-06-09T10:15:26.370`)
- [CVE-2025-5873](CVE-2025/CVE-2025-58xx/CVE-2025-5873.json) (`2025-06-09T11:15:22.240`)
- [CVE-2025-5874](CVE-2025/CVE-2025-58xx/CVE-2025-5874.json) (`2025-06-09T11:15:22.440`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `4`
- [CVE-2025-26873](CVE-2025/CVE-2025-268xx/CVE-2025-26873.json) (`2025-06-09T09:15:21.717`) - [CVE-2025-2784](CVE-2025/CVE-2025-27xx/CVE-2025-2784.json) (`2025-06-09T10:15:22.457`)
- [CVE-2025-32049](CVE-2025/CVE-2025-320xx/CVE-2025-32049.json) (`2025-06-09T10:15:24.673`)
- [CVE-2025-32914](CVE-2025/CVE-2025-329xx/CVE-2025-32914.json) (`2025-06-09T10:15:24.927`)
- [CVE-2025-4948](CVE-2025/CVE-2025-49xx/CVE-2025-4948.json) (`2025-06-09T10:15:25.730`)
## Download and Usage ## Download and Usage

View File

@ -288946,7 +288946,7 @@ CVE-2025-2687,0,0,e82d949c8e8faf8f2095b9e7808001f7f4f10627b483f5a22b60ecb356616b
CVE-2025-26870,0,0,dc7e8848de50d3fd2d459905abc0347a2d7cdc448dc5af1a96d9e0ede8c31570,2025-04-16T13:25:37.340000 CVE-2025-26870,0,0,dc7e8848de50d3fd2d459905abc0347a2d7cdc448dc5af1a96d9e0ede8c31570,2025-04-16T13:25:37.340000
CVE-2025-26871,0,0,2a55e987f92fea9189ceac5ee41ddd6e7a4f8d03cc64f6910d3d32ce60f6d5f0,2025-04-10T17:53:34.280000 CVE-2025-26871,0,0,2a55e987f92fea9189ceac5ee41ddd6e7a4f8d03cc64f6910d3d32ce60f6d5f0,2025-04-10T17:53:34.280000
CVE-2025-26872,0,0,61ed43a6639c0b98bdfb2ac4ce60a5c0e9fbaf830357837f339126574ffd4baa,2025-05-21T20:25:16.407000 CVE-2025-26872,0,0,61ed43a6639c0b98bdfb2ac4ce60a5c0e9fbaf830357837f339126574ffd4baa,2025-05-21T20:25:16.407000
CVE-2025-26873,0,1,d2be4af17ab93dc9a3e4061603b533262f8b353a47175752e1a9e3abd4a4b1da,2025-06-09T09:15:21.717000 CVE-2025-26873,0,0,d2be4af17ab93dc9a3e4061603b533262f8b353a47175752e1a9e3abd4a4b1da,2025-06-09T09:15:21.717000
CVE-2025-26874,0,0,3906c541d3c2328f17b778a284f8d8b03cca5035667b064d99481ac9bbf55d5c,2025-03-28T18:11:40.180000 CVE-2025-26874,0,0,3906c541d3c2328f17b778a284f8d8b03cca5035667b064d99481ac9bbf55d5c,2025-03-28T18:11:40.180000
CVE-2025-26875,0,0,1eb25a80831e545b4298e6aed92aca9e86c317dc16ff78bda859574fde302510,2025-03-15T22:15:13.690000 CVE-2025-26875,0,0,1eb25a80831e545b4298e6aed92aca9e86c317dc16ff78bda859574fde302510,2025-03-15T22:15:13.690000
CVE-2025-26876,0,0,22d5e3662987726006c8c5bdd9aefc0ed802e210686667cf89016011bdc03010,2025-02-25T15:15:24.180000 CVE-2025-26876,0,0,22d5e3662987726006c8c5bdd9aefc0ed802e210686667cf89016011bdc03010,2025-02-25T15:15:24.180000
@ -289619,6 +289619,7 @@ CVE-2025-27703,0,0,f41288ec5900955b0cf9466ed3e7f5c768dfb1d7c1369c8b047bdaee8bb89
CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000 CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000
CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000 CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000
CVE-2025-27706,0,0,366db5baaa6540a4830c30306563c995abcbb80dda2cc2e6aaf1e42c68352033,2025-06-04T19:59:30.750000 CVE-2025-27706,0,0,366db5baaa6540a4830c30306563c995abcbb80dda2cc2e6aaf1e42c68352033,2025-06-04T19:59:30.750000
CVE-2025-27709,1,1,3151dac52c56bb04a5541c9aac0632fde6a230c7b5dd16a3658326ff7d5ba294,2025-06-09T11:15:20.807000
CVE-2025-2771,0,0,669ee5eb97646afb82a0694c49c0b6d1df006accbc659c269487c2a90325f7e3,2025-04-29T13:52:47.470000 CVE-2025-2771,0,0,669ee5eb97646afb82a0694c49c0b6d1df006accbc659c269487c2a90325f7e3,2025-04-29T13:52:47.470000
CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000 CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000
CVE-2025-27716,0,0,65bcc3c5b3482c33d19a88cecf33eda0c46f0e6a542313f4127f96639786d02e,2025-03-28T18:11:40.180000 CVE-2025-27716,0,0,65bcc3c5b3482c33d19a88cecf33eda0c46f0e6a542313f4127f96639786d02e,2025-03-28T18:11:40.180000
@ -289722,7 +289723,7 @@ CVE-2025-27835,0,0,bfd55bfd7467fd1074b48c9c5b6d2f6f88f9d233c37b427ef5473af1632e7
CVE-2025-27836,0,0,f465c8991d790bdb41314bcd1316c06a9f596110c7a85fa30ce1c38f1408796a,2025-04-01T16:35:25.050000 CVE-2025-27836,0,0,f465c8991d790bdb41314bcd1316c06a9f596110c7a85fa30ce1c38f1408796a,2025-04-01T16:35:25.050000
CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e550,2025-04-01T16:35:15.650000 CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e550,2025-04-01T16:35:15.650000
CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000
CVE-2025-2784,0,0,c7c4808feb499cd702d0d960deffe60652f16bb117bf6bd01b028f137764cbe7,2025-06-04T04:15:47.827000 CVE-2025-2784,0,1,a8f30d5bfa2d3cb94a268e478af752e8103b971e3168ec97fef63ef7d1d50bec,2025-06-09T10:15:22.457000
CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000
CVE-2025-2786,0,0,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e17,2025-04-09T21:16:25.720000 CVE-2025-2786,0,0,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e17,2025-04-09T21:16:25.720000
CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000
@ -292124,7 +292125,7 @@ CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82
CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000
CVE-2025-32044,0,0,a71de1cf666447c00a842f33f324ff6f1e1b8218897a24a1ab72a6777d44e851,2025-04-29T13:52:28.490000 CVE-2025-32044,0,0,a71de1cf666447c00a842f33f324ff6f1e1b8218897a24a1ab72a6777d44e851,2025-04-29T13:52:28.490000
CVE-2025-32045,0,0,b17bdb427633d487b0808a2e4ae8cc6c6c54291aabbf23bed11ce2ff7243e639,2025-04-29T13:52:28.490000 CVE-2025-32045,0,0,b17bdb427633d487b0808a2e4ae8cc6c6c54291aabbf23bed11ce2ff7243e639,2025-04-29T13:52:28.490000
CVE-2025-32049,0,0,73d8468a84b8496428d7f4fc1116aaa1b2c4cace7f5ca71142bce123875e6901,2025-06-04T04:15:52.440000 CVE-2025-32049,0,1,8ce60c6bfcbf9933ffa2c4f6c8a3e4f1bbc46007033103b1f8f9283aaf242195,2025-06-09T10:15:24.673000
CVE-2025-3205,0,0,2fbe92de3997566680a1052e42bc5ae830a44caf727a733907db3320a0fb983b,2025-05-07T15:58:51.537000 CVE-2025-3205,0,0,2fbe92de3997566680a1052e42bc5ae830a44caf727a733907db3320a0fb983b,2025-05-07T15:58:51.537000
CVE-2025-32050,0,0,d0a186287f84675d733fc8adf7b721e0ef8373d24cc78f737949580577a7a0c2,2025-05-29T07:15:22.560000 CVE-2025-32050,0,0,d0a186287f84675d733fc8adf7b721e0ef8373d24cc78f737949580577a7a0c2,2025-05-29T07:15:22.560000
CVE-2025-32051,0,0,c5601bf30a2280db534481dc10ccb3d4bc49f5f6486729ed8c2da54db3bdca25,2025-04-07T14:18:34.453000 CVE-2025-32051,0,0,c5601bf30a2280db534481dc10ccb3d4bc49f5f6486729ed8c2da54db3bdca25,2025-04-07T14:18:34.453000
@ -292837,7 +292838,7 @@ CVE-2025-32910,0,0,240d5c7ee2b4c85daa5f41c88c38a0b1ff00089c1fa83111393e2a6ccde41
CVE-2025-32911,0,0,3dd5d330e5c87cf21d952d6d2f4ac7061b9425e4a5d7e13fec51bbce59ac67e5,2025-05-29T07:15:24.783000 CVE-2025-32911,0,0,3dd5d330e5c87cf21d952d6d2f4ac7061b9425e4a5d7e13fec51bbce59ac67e5,2025-05-29T07:15:24.783000
CVE-2025-32912,0,0,537b35ec8e3e7b56fc525d652e56f2627ca353a9690e505ad216d07c70358d3f,2025-05-14T00:15:18.100000 CVE-2025-32912,0,0,537b35ec8e3e7b56fc525d652e56f2627ca353a9690e505ad216d07c70358d3f,2025-05-14T00:15:18.100000
CVE-2025-32913,0,0,4c0909f1e764fc3bf7ac16dc571564afbd85a7a86a7370c78e55f528fa4db095,2025-05-29T07:15:24.957000 CVE-2025-32913,0,0,4c0909f1e764fc3bf7ac16dc571564afbd85a7a86a7370c78e55f528fa4db095,2025-05-29T07:15:24.957000
CVE-2025-32914,0,0,18343f5bbe2e070f0a9225de22c1034e115bf7870525c51d2a25dbefe7a56dc1,2025-06-04T04:15:52.977000 CVE-2025-32914,0,1,f111116292642a8d9075af57c1ff7064ec7337a57bd531d01793342b33c9f4d3,2025-06-09T10:15:24.927000
CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000 CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000
CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000 CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000
CVE-2025-3292,0,0,118c173f186dcc5720366632802764bcff206cc9d545c82cefbfbd5ae3208b31,2025-04-15T18:39:27.967000 CVE-2025-3292,0,0,118c173f186dcc5720366632802764bcff206cc9d545c82cefbfbd5ae3208b31,2025-04-15T18:39:27.967000
@ -293250,6 +293251,7 @@ CVE-2025-36513,0,0,40997ded6ccfa9f42a498c7fa3aba63677e185863eb779042a0e6b33a18b5
CVE-2025-36521,0,0,76dbe5c9e005eebc45d03f4e270884a68d88e62c1e707e433be80dfc20224dd6,2025-05-02T13:52:51.693000 CVE-2025-36521,0,0,76dbe5c9e005eebc45d03f4e270884a68d88e62c1e707e433be80dfc20224dd6,2025-05-02T13:52:51.693000
CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed45ac,2025-05-08T14:39:09.683000 CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed45ac,2025-05-08T14:39:09.683000
CVE-2025-36527,0,0,020ac4647f700215df1a929fd367ca00f7a928aa1186e2cc968570239b95437f,2025-05-23T15:54:42.643000 CVE-2025-36527,0,0,020ac4647f700215df1a929fd367ca00f7a928aa1186e2cc968570239b95437f,2025-05-23T15:54:42.643000
CVE-2025-36528,1,1,84cb3ba222d2976820b8b63f77b97f7f6d9e786f4a48b4ae46a753a221ac30e9,2025-06-09T11:15:21.773000
CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000 CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000
CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000 CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000
CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000 CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000
@ -293679,6 +293681,7 @@ CVE-2025-3830,0,0,3ca7fd35f12c00858d19906448614222a608b776fe97491b48d4786654ad32
CVE-2025-3832,0,0,4341ec7053cdfcd8a390d90346badb808517e6099d45c1d26164d2b6c67b7ee1,2025-04-29T13:52:47.470000 CVE-2025-3832,0,0,4341ec7053cdfcd8a390d90346badb808517e6099d45c1d26164d2b6c67b7ee1,2025-04-29T13:52:47.470000
CVE-2025-3833,0,0,7f9efddc434c5a834e34f9b02819bab78b434bce69954c54e0066db06f0e9e6b,2025-05-16T14:43:56.797000 CVE-2025-3833,0,0,7f9efddc434c5a834e34f9b02819bab78b434bce69954c54e0066db06f0e9e6b,2025-05-16T14:43:56.797000
CVE-2025-3834,0,0,6daa411c17b2f18e4970a27b87df8b22246e211d6c3f0c02245d64a4e9f7a3a2,2025-05-16T14:43:56.797000 CVE-2025-3834,0,0,6daa411c17b2f18e4970a27b87df8b22246e211d6c3f0c02245d64a4e9f7a3a2,2025-05-16T14:43:56.797000
CVE-2025-3835,1,1,325a4b4bbd7ae90a731b691596cf04dba1b50b650bbae52838262bdaede993ff,2025-06-09T11:15:21.913000
CVE-2025-3836,0,0,3d825a5448c3c664c47fd44654a8a7149f2c964d059aaec6aa397b77a376d670,2025-05-23T15:55:02.040000 CVE-2025-3836,0,0,3d825a5448c3c664c47fd44654a8a7149f2c964d059aaec6aa397b77a376d670,2025-05-23T15:55:02.040000
CVE-2025-3837,0,0,5a47b33afdb7e1907c95a70c26ce3ac05141d02d9782062528ed4ee5ab63acd5,2025-04-21T14:23:45.950000 CVE-2025-3837,0,0,5a47b33afdb7e1907c95a70c26ce3ac05141d02d9782062528ed4ee5ab63acd5,2025-04-21T14:23:45.950000
CVE-2025-3838,0,0,bb793984df5f3344ae8c93ea895951dc09f41cafe84f678ece4d6f95f3b2b330,2025-04-21T14:23:45.950000 CVE-2025-3838,0,0,bb793984df5f3344ae8c93ea895951dc09f41cafe84f678ece4d6f95f3b2b330,2025-04-21T14:23:45.950000
@ -294172,6 +294175,7 @@ CVE-2025-4067,0,0,dbc4fa5a3543fbd835e23dc834da9e648caa31287a34f63ada5ad254d564f7
CVE-2025-40671,0,0,434fcb0f85fca3f9d859442da381d4e1454f2c968132e3a6b8db7392906ce4f0,2025-05-28T15:01:30.720000 CVE-2025-40671,0,0,434fcb0f85fca3f9d859442da381d4e1454f2c968132e3a6b8db7392906ce4f0,2025-05-28T15:01:30.720000
CVE-2025-40672,0,0,16bc6b87ff9caf15184dbd8991107d7b17c5beb8ff9d9c80bdf9b979ca591b75,2025-05-28T15:01:30.720000 CVE-2025-40672,0,0,16bc6b87ff9caf15184dbd8991107d7b17c5beb8ff9d9c80bdf9b979ca591b75,2025-05-28T15:01:30.720000
CVE-2025-40673,0,0,b579e57f63d588753084335ab891fb47997b91677321939dfff9acbc408e6ab4,2025-05-28T15:01:30.720000 CVE-2025-40673,0,0,b579e57f63d588753084335ab891fb47997b91677321939dfff9acbc408e6ab4,2025-05-28T15:01:30.720000
CVE-2025-40675,1,1,e615c00d74c27a37f43fca862f9811ab3707789619e669102051f36c9b3f1b6c,2025-06-09T10:15:25.190000
CVE-2025-4068,0,0,3e3326c67789178a2e89dd2c7182f86f8b00ff853809cd66d0d99e3251986e87,2025-05-28T17:27:28.983000 CVE-2025-4068,0,0,3e3326c67789178a2e89dd2c7182f86f8b00ff853809cd66d0d99e3251986e87,2025-05-28T17:27:28.983000
CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f25,2025-05-28T17:26:13.450000 CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f25,2025-05-28T17:26:13.450000
CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000 CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000
@ -294283,6 +294287,7 @@ CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17
CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000 CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000
CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000 CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000
CVE-2025-41433,0,0,f6273c3cc0a212df803e85bf8ba3fed5695ff63848595dbd80f25b739ca0954c,2025-05-08T14:39:09.683000 CVE-2025-41433,0,0,f6273c3cc0a212df803e85bf8ba3fed5695ff63848595dbd80f25b739ca0954c,2025-05-08T14:39:09.683000
CVE-2025-41437,1,1,6c6681b37c65d506133f6f652ea4a4550aad857521bf4230242b07ead60c9ae7,2025-06-09T11:15:22.053000
CVE-2025-41438,0,0,11ba6504cbbbf79eb2cd396e9c090ab75fa4dee3d0b15e980e071c03e0563d88,2025-05-30T16:31:03.107000 CVE-2025-41438,0,0,11ba6504cbbbf79eb2cd396e9c090ab75fa4dee3d0b15e980e071c03e0563d88,2025-05-30T16:31:03.107000
CVE-2025-4144,0,0,ed44a24e80e1487d547bfe32499c8ba4450309e0e9d0acd2df7ebfcd519c74a9,2025-05-12T19:39:31.053000 CVE-2025-4144,0,0,ed44a24e80e1487d547bfe32499c8ba4450309e0e9d0acd2df7ebfcd519c74a9,2025-05-12T19:39:31.053000
CVE-2025-41441,0,0,3b51a802d5e876ef5e3db952c79744bda892bc6a2133cce8cddd52ad9c2cfab2,2025-06-03T15:42:40.710000 CVE-2025-41441,0,0,3b51a802d5e876ef5e3db952c79744bda892bc6a2133cce8cddd52ad9c2cfab2,2025-06-03T15:42:40.710000
@ -296420,7 +296425,7 @@ CVE-2025-49450,0,0,fb4f52dbcabe6d10a7029fe4e63b7637345c171e5ff856e151d99f1496446
CVE-2025-49453,0,0,66b7e122d30d583eff84e0f9157cb5663586cb3b5d97be1749136fd19a39911b,2025-06-06T14:06:58.193000 CVE-2025-49453,0,0,66b7e122d30d583eff84e0f9157cb5663586cb3b5d97be1749136fd19a39911b,2025-06-06T14:06:58.193000
CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000 CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000
CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000
CVE-2025-4948,0,0,2d8928ecccf769064199e618193b5181fd943840af74729dd43fad03a17cb71a,2025-06-04T04:15:53.497000 CVE-2025-4948,0,1,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000 CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
CVE-2025-49599,0,0,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000 CVE-2025-49599,0,0,f422e579100d81619126fdb05172f6f63b5a43123a5c3cb8a9e2e7d97f2a064c,2025-06-06T17:15:36.147000
@ -297032,9 +297037,13 @@ CVE-2025-5863,0,0,48c76b9bfa38e7e0a0f52b1b842aed688908b32d6a421ab601c1014d7706ec
CVE-2025-5864,0,0,a8dfdc92ebae782cfb313fdf227d67ce16ff2d07e50f927ff70b066b1c4f2b62,2025-06-09T06:15:26.170000 CVE-2025-5864,0,0,a8dfdc92ebae782cfb313fdf227d67ce16ff2d07e50f927ff70b066b1c4f2b62,2025-06-09T06:15:26.170000
CVE-2025-5865,0,0,a5836e94fbb60a125a2805660c473972fadb9903f2bf855f605cedbd858d9acd,2025-06-09T07:15:22.660000 CVE-2025-5865,0,0,a5836e94fbb60a125a2805660c473972fadb9903f2bf855f605cedbd858d9acd,2025-06-09T07:15:22.660000
CVE-2025-5866,0,0,1a1d40945c1633e902dcaac1351e4ba6f87f431ee14eece2cadb9e2cd6c656d1,2025-06-09T07:15:22.947000 CVE-2025-5866,0,0,1a1d40945c1633e902dcaac1351e4ba6f87f431ee14eece2cadb9e2cd6c656d1,2025-06-09T07:15:22.947000
CVE-2025-5867,1,1,0585e70f0a94eebc82070f4c8d0acced7cd1326e1742022585ec325215d52f49,2025-06-09T08:15:22.140000 CVE-2025-5867,0,0,0585e70f0a94eebc82070f4c8d0acced7cd1326e1742022585ec325215d52f49,2025-06-09T08:15:22.140000
CVE-2025-5868,1,1,68325a09b0aa436dd63f13057559ed756c9f827edede32bc436473ceb53e08f9,2025-06-09T08:15:22.370000 CVE-2025-5868,0,0,68325a09b0aa436dd63f13057559ed756c9f827edede32bc436473ceb53e08f9,2025-06-09T08:15:22.370000
CVE-2025-5869,1,1,7f9bd72ad4e67de286e93c718d5f458cff19ce714f432bf26be3f1bc93827c1d,2025-06-09T09:15:22.320000 CVE-2025-5869,0,0,7f9bd72ad4e67de286e93c718d5f458cff19ce714f432bf26be3f1bc93827c1d,2025-06-09T09:15:22.320000
CVE-2025-5870,1,1,56cf0c38b24b464d756983b24deeb195e9267a0e2addbce31e23ff88c82e87be,2025-06-09T09:15:22.500000 CVE-2025-5870,0,0,56cf0c38b24b464d756983b24deeb195e9267a0e2addbce31e23ff88c82e87be,2025-06-09T09:15:22.500000
CVE-2025-5871,1,1,29fb930e3fc6aeb03b6c2faa5dfa0cd92581e7da02247233f876f7c627e17fa7,2025-06-09T10:15:26.030000
CVE-2025-5872,1,1,065a51e37fdf65c7f966e875d4acfff2913805d1168d49fd45e4e7501750bd7d,2025-06-09T10:15:26.370000
CVE-2025-5873,1,1,b51c403668b0fbf00c2f172c2e762b5adf681b1a42af63fcb0fa1bea768d4044,2025-06-09T11:15:22.240000
CVE-2025-5874,1,1,540690cc4adc0a8d995ac70ac2198ed020bcd19f068d81699b6e311c6c1b09f4,2025-06-09T11:15:22.440000
CVE-2025-5893,0,0,db2cb20387f45cbfc876a64d8c459c328ded6b8c6c817ea819d837fda0dd41a7,2025-06-09T07:15:23.167000 CVE-2025-5893,0,0,db2cb20387f45cbfc876a64d8c459c328ded6b8c6c817ea819d837fda0dd41a7,2025-06-09T07:15:23.167000
CVE-2025-5894,1,1,97e3391380d1ca8a2e75764d648c24bbcb0057a8ec46b60cdae81ae4f97e3d29,2025-06-09T08:15:22.607000 CVE-2025-5894,0,0,97e3391380d1ca8a2e75764d648c24bbcb0057a8ec46b60cdae81ae4f97e3d29,2025-06-09T08:15:22.607000

Can't render this file because it is too large.